Read more about networking
Bookmark and Share
  • The Apple and WoW effect

    08.10.2013

    Modern living is defined by pop culture phenomena. In the last few months alone, 4G rollouts, the release of smart watches and launch of long-awaited video games have all generated huge publicity and attention with legions of adoring fans lining up outside stores to get a hold of the latest ‘must-have’.

  • Video: Recent advances in IPv6 security

    08.10.2013

    There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint.

  • High-performance wireless router from Netgear

    04.10.2013

    NETGEAR launched its newest dual-band 802.11ac wireless router, Nighthawk AC1900 Smart WiFi Router (R7000).

  • Aruba Networks releases cloud Wi-Fi solution

    03.10.2013

    Aruba Networks announced a new cloud-managed Wi-Fi solution that combines the simplicity of a cloud service with the performance, manageability and reliability of enterprise-grade WLANs.

  • Is wireless the Trojan horse in your network security?

    02.10.2013

    According to Roger Klorese of WatchGuard technologies, smartphones and tablets now account for about 25% of devices used for work in the US.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //