Months ago, Wikileaks posted many Top Secret CIA documents in their Vault 7 leak. Late last week, they released even more documents, outlining the CIA's Wi-Fi router hacking capabilities. Cherry Blossom is the set of tools and techniques the CIA uses to hijack consumer Wi-Fi and wireless routers. If they can gain access to a target's router, they can replace its firmware with a … [Read more...]
Search Results for: data loss
Is Data Encryption Compromising Network Performance? Not with WatchGuard.
New WatchGuard Firebox M400 and M500 NGFW and UTM appliances outperform the competition by 61 percent, delivering uncompromised security to meet the rise of encrypted traffic head-on. Rising Network Traffic Leads to Compromised Security Encrypted network traffic growth is exploding! Enterprises and service providers are adopting data encryption as a security precaution – … [Read more...]
Five Top Tips to Help Protect Your Critical Data
I often question the validity of the term Information Security. While it has “information” in the name, I feel we spend more time protecting our technologies and devices than we do figuring out what information is most critical to our businesses, and catering our protections to that data. As information security professionals, we need to focus more on directly defending … [Read more...]
Oracle Releases Out-of-Cycle Update for Blackhat Database Server Flaw
If you're an Oracle administrator, hopefully you saw the text version of WatchGuard Security Week in Review a few weeks ago, where I mentioned Oracle's big quarterly patch day for July 2012. If you missed that, you better check out their July CPU update, and apply all its patches. However, even if you managed to apply Oracle's July patches, they have one more update in store … [Read more...]
Another City Cyber Attack: Johannesburg
Another day, another cyber attack. Not just on a business entity though, but rather another city! About 24 hours ago, the city of Johannesburg detected unauthorized access to their networked systems and have taken immediate action. Check out their Twitter post below. Click here for direct access to their Twitter page. The investigation will take about 24 hours … [Read more...]