Net neutrality refers either to the inherent necessity to ensure that all data that traverses the Internet gets treated equally (if you are “pro” neutrality), or to the inherent necessity that business that drive more data through those “tubes” pay more for passage (the “con” neutrality stance). So if you use more water, you should…Details
By Kim Zetter 02.24.15 | When Kaspersky Lab revealed last week that it had uncovered a sophisticated piece of malware designed to plant malicious code inside the firmware of computers, it should have surprised no one. And that’s not just because documents leaked by Edward Snowden have shown that spy agencies like the NSA have…Details
Introduction Modern UTM (unified threat management) firewalls provide far broader feature sets than most businesses get around to using. These devices are simply configured for the Internet circuit (or circuits), setup with some basic remote access functionality and configured to support a wireless network…Details
Today’s critical update was one of two delayed from last week.
Let’s talk about the basics of secure wireless networking here. First, we’ll work with managing power and the placement of your access point (AP) or router in order to minimize its “signal leakage” to those outside the desired coverage area. Next up is WPA2 encryption, and finally, we’ll address MAC address filtering. Interestingly, until recently it was believed that…Details
Recently, Verizon was caught tampering with its customer’s web requests to inject a tracking super-cookie. Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks.
Advanced Firewalling Part Two – The Harder Stuff Once you’ve done the easy stuff, like GEO IP filtering, Botnet filtering and setup Layer7 traffic handling (if your firewall has the capability to do so), the really good stuff is next. First on the list, assuming your firewall can do it, comes SSL DPI traffic scanning (scanning of…Details
Part One – Advanced Firewalling Easy Stuff Modern UTM (unified threat management) firewalls provide far broader feature sets than mostbusinesses get around to using. These devices are simply configured for the Internet circuit (or circuits), setup with some basic remote access functionality and configured to support a wireless network or two, if they have that capability. Otherwise,…Details
Two Factor Authentication (TFA) – Beyond Passwords We all know that good passwords are complicated, should be different for every use and change frequently. We also know how hard that is to implement, enforce and track. So what do we do about this? Two factor authentication (TFA), which combines your username and password with something you have (tokens)…Details