Security Corner:

Routers


February 26, 2013  12:25 AM

Could you pass this LAN Engineer test?



Posted by: Ken Harthun
Internet, Networking, Remote management, Routers, Secure Computing, Security

Back in July, 2009, when I found myself looking for a new gig, one of the firms I contacted gave me written test as part of their recruiting and interview process.  Part of that test included a hacking skills challenge (something I have included here in quite a while). I thought you, dear reader,...

December 29, 2011  11:34 PM

Router reboot can open your system to hackers



Posted by: Ken Harthun
cyber security, hackers, Hacking, NAT, Routers

[caption id="attachment_777" align="alignleft" width="185" caption="Hmm...."]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 15, 2010  2:53 AM

What’s Your System’s Survival Time?



Posted by: Ken Harthun
Patch Tuesday, Routers, Security, Vulnerabilities

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 11, 2010  6:58 PM

Why DNS Rebinding Is in the News Again



Posted by: Ken Harthun
Black Hat conference, DNS Rebinding Attack, Routers, Security, Security Now!

[caption id="attachment_449" align="alignleft" width="260" caption="Linksys Router "]

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 24, 2010  12:49 AM

The Router Attack is Back in the News – Ho-Hum



Posted by: Ken Harthun
Black Hat conference, Hacking, Routers, Vulnerabilities

Subtitle: "How to Hack Millions of Routers" This really isn't anything new, it's just back in the news again. According to this article on Forbes.com:

Craig...


May 17, 2010  2:06 AM

Should You Be Held Liable for Illegal Activity on Your Unsecured WiFi?



Posted by: Ken Harthun
cyber security, Cyberlaw, Routers, Wireless security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 25, 2009  2:04 AM

Golden Rule #3: Omit This Setup Step and Your Router Can Be Easily Compromised



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Password, Routers, Security

Golden Rule #2 stressed having a NAT router–or router/firewall–between your PC and the Internet as a first line of defense. This is without question the first, most important security step, but it can be useless unless you have it properly configured; in fact, omitting one crucial first step...


November 24, 2009  3:44 AM

Golden Rule #2: How Not to Invite Attackers into Your PCs or Network – the First Line of Defense



Posted by: Ken Harthun
14 Golden Rules of Computer Security, NAT, Routers, Secure Computing, Security, Security practice

Golden Rule #1 gives what I consider to be the most basic security maxim, one on which I base all of my security practices, so let me repeat: The best security measures are completely useless if you invite attackers into your PCs or networks. Windows users will...


September 5, 2009  3:03 PM

Good PC Security Begins With a Baseline



Posted by: Ken Harthun
Anti-malware, Anti-virus, Browsers, Critical update, Firewalls, Malware, Microsoft Windows, NAT, Patch management, Routers, Security

I received some good feedback on my “14 Golden Rules of Computer Security” list, in particular, this comment from Michael: “…you encourage people to go through...


March 25, 2009  1:49 PM

Worm Targets Home Networking Equipment



Posted by: Ken Harthun
Botnet, Firmware security, Routers, Security, Security management, Vulnerabilities

As reported yesterday in The Register, the "psyb0t" worm targets home routers and modems and may be the first piece of malware to do so. Researchers from

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: