Category: Network Security

Read about how security administrators protect their networks .

Your Home Router Could Be Infected – The Destructive VPNFilter Malware Is Worse Than We Thought

According to new research by Cisco Talos and its additional intelligence groups, the VPNFilter malware that was discovered in the previous months is much worse than originally thought. New modules in stage 3 were discovered. Also, the list of known affected devices has expanded, effectively increasing VPNFilter's attack surface. In the days Cisco's first findings ...

This Month in Cybersecurity News [June 2018]

I've been neglectful on posting cybersecurity news lately. To make up for it, here are some of the hot cybersecurity events that occurred this month. The New OnePlus 6 Smartphone - Serious Bootloader Vulnerability The Chinese smartphone manufacturer, OnePlus, just released the all new OnePlus 6 smartphone last month. With its high-end specifications, glass-design, large ...

Firewalls: A Fundamental Introduction

The defense in-depth design is a security philosophy that proposes we protect our assets and networks with multiple levels of security. The idea is not strictly limited to technical security controls, as management and operational controls have their rightful place in the defense in-depth approach. However, many aspiring and enthusiastic young learners falsely attribute the ...

PenTest Edition: Cracking Wi-Fi Passwords with Aircrack-ng

Aircrack-ng is a suite of wireless penetration testing tools used to assess the security of Wi-Fi networks, specifically through various monitoring, attacking, testing, and cracking methods that you'll learn here. Aircrack-ng is compatible with various IEEE 802.11 standards, which is great, but it will only work if you're wireless NIC supports "monitor" mode. If you ...

HTTPS: The TLS Handshake Using Diffie-Hellman Ephemeral

A client securely connects to a web server via the TLS 1.2 transport encryption protocol. This is a process that starts with asymmetric cryptography and ends with symmetric cryptography. As a refresher, recall that asymmetric cryptography uses a public and private key pair, whereas symmetric cryptography uses only one shared key. I published a blog ...