The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: Networking

Android P to Block Apps From Monitoring Device Network Activity

Android P to Block Apps From Monitoring Device Network Activity

May 06, 2018Swati Khandelwal
Do you know that any app you have installed on your Android phone can monitor the network activities—even without asking for any sensitiv...
Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking

April 04, 2018Swati Khandelwal
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow a...
Hands-On Review: Converged Networking and Security with Cato Networks

Hands-On Review: Converged Networking and Security with Cato Networks

May 08, 2017Mohit Kumar
Nobody likes to do router and firewall management. It often requires a lot of hard labor just keeping the infrastructure up and running. ...
uh-oh! North America Runs Completely Out of IPv4 Internet Addresses

uh-oh! North America Runs Completely Out of IPv4 Internet Addresses

September 25, 2015Khyati Jain
Two months ago, THN reported about a similar announcement made by The American Registry for Internet Numbers (ARIN), which said that the...
Microsoft has Built its own Linux Operating System

Microsoft has Built its own Linux Operating System

September 18, 2015Mohit Kumar
Sit Tight on your seats, because you're gonna get a Shock. Microsoft has developed an Operating System powered by LINUX. C...
North America Runs Out of IPv4 Addresses

North America Runs Out of IPv4 Addresses

July 02, 2015Mohit Kumar
The Internet is running out of IPv4 (Internet Protocol version 4) addresses — a computer’s unique address on the Internet. It’s just bec...
Malware Exploits SHELLSHOCK Vulnerability to Hack NAS Devices

Malware Exploits SHELLSHOCK Vulnerability to Hack NAS Devices

December 16, 2014Wang Wei
The year is about to end, but serious threats like  Shellshock is " far from over ". Cyber criminals are actively exploiting ...
81% of Tor Users Can be Easily Unmasked By Analysing Router Information

81% of Tor Users Can be Easily Unmasked By Analysing Router Information

November 18, 2014Swati Khandelwal
Tor has always been a tough target for law enforcement for years and FBI has spent millions of dollars to de-anonymize the identity of ...
Satellite Communication (SATCOM) Devices Vulnerable to Hackers

Satellite Communication (SATCOM) Devices Vulnerable to Hackers

April 17, 2014Swati Khandelwal
The growing threat of cyber-attacks and network hacking has reached the satellite-space sector, posing a growing challenge to the satel...
Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

March 15, 2014Swati Khandelwal
So, How do you currently monitor your logs and events, including network, servers, databases, applications, your router, firewall or Win...
AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

March 14, 2014Swati Khandelwal
IT Infrastructure of organizations is growing ever more distributed, complex and difficult to manage. To manage such networks, a log man...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.