Articles about Firewall

'BlackNurse' DDoS attack targets firewalls vulnerable to ping flood

Security researchers have discovered a new distributed denial of service (DDoS) method that requires less effort to launch large-scale attacks that can bring down servers or firewalls from a single laptop.

The new method of launching DDoS attacks called BlackNurse was discovered by researchers at the Security Operations Center of the Danish telecom operator TDC (TDC SOC). It operates by using attacks based on low volume Internet Control Message Protocol (ICMP) to overload firewalls to the point where they shut down.

Continue reading

GCHQ plans Great British Firewall to protect web users

Union flag keyboard

The UK's cyber intelligence agency GCHQ is planning what has been labelled a 'Great British Firewall' to protect individuals and companies against cyber attacks.

The idea emerged in a speech delivered by the head of GCHQ's national cybersecurity centre, Ciaran Martin, at the Billington Cyber Security Summit in Washington DC.

Continue reading

Limelight launches web application firewall

Firewall

Increased reliance on the Internet means businesses face a number of different security threats aimed at bringing down websites, impacting performance or stealing information.

Many of these attacks are aimed at the application layer. Content delivery specialist Limelight Networks is adding to its Cloud Security services with the launch of a new Web Application Firewall (WAF).

Continue reading

Why businesses should build 'human firewalls'

It is often the illusive H Factor -- the human element -- that ends up being the weakest link that makes cyber-attacks and data breaches possible, sometimes even more so than hackers exploiting zero-day system vulnerabilities or employing new malware.

According to the 2016 Verizon DBIR, human errors are a major factor in most data breaches. This human touch is especially true with the growing mobility of employees and BYOD (Bring Your Own Device) policies that are becoming more widespread. Therefore, while technological cybersecurity solutions take center stage in many businesses' cybersecurity plans, addressing the human element is as important as the technological one.

Continue reading

Behavioral firewall helps guard against data breaches

firewall

When a data breach is just as likely to originate from inside the organization as outside, protecting an enterprise can be a difficult task.

Californian company Preempt is launching a new proactive approach that allows organizations to spot threats in real-time without engaging already overwhelmed security teams.

Continue reading

The changing role of the firewall in network security

firewall

The firewall is still at the center of most network security strategies, but it needs to evolve as cloud technology, software defined networks and next generation firewalls take hold.

This is among the conclusions of the latest State of the Firewall Report from network security specialist FireMon, which finds that 91 percent of IT security professionals believe firewalls are still as critical or more critical than ever to their security architecture.

Continue reading

How reliable is your firewall? Atelier Web Firewall Tester finds out

Just about every firewall claims to protect your personal data by checking for illicit web connections -- but do they really work?

Atelier Web Firewall Tester (32-bit and 64-bit) is a once commercial, now free Windows product which tries to find out.

Continue reading

Warning: Comodo Antivirus included insecure remote tech support tool

A researcher from Google Project Zero discovered a serious security issue with the technical support tools supplied with Comodo software products. Tavis Ormandy found that Comodo Antivirus, Comodo Firewall, and Comodo Internet Security all included a bundled VNC server with either no password protection, or a very weak password.

GeekBuddy is a remote desktop tool used by support staff to troubleshoot customer problems, but it also serves as a backdoor that allows for near-unrestricted access to users' computers. The tool installs with full admin rights, meaning that an attacker could very easily gain complete control of a remote computer.

Continue reading

Cisco announces Firepower Next-Generation Firewall

Cisco has released a new firewall solution which aims to completely change how security services tackle cyber-threats.

The new product, Cisco Firepower Next-Generation Firewall (NGFW), is built to detect threats on a system, and not keep the system on a lockdown. Here’s how Cisco explains the new product

Continue reading

Fortinet firewalls feature hard-coded password that acts as a backdoor

Just weeks after Juniper was found to be using insecure code in its products, a security issue has been found in Fortinet's FortiOS. It's a problem that affects the software in older NetScreen firewalls from Fortinet and could allow for remote access of unpatched system.

Buried in the firewall software is a hardcoded password (FGTAbc11*xy+Qqz27) that could be easily used to exploit servers running FortiOS. Ralf-Philipp Weinmann is one of the security researchers who unearthed the problem with Juniper hardware, and he has confirmed the problem which is being referred to as the FortiOS SSH Undocumented Interactive Login Vulnerability.

Continue reading

Critical patches issued after spying backdoors found built into Juniper firewalls

Backdoor button

Networking manufacturer Juniper has discovered backdoors built into its firewalls. The company says that a number of its devices running the ScreenOS operating system include serious vulnerabilities that could be used to take remote control of networked devices, or to decrypt VPN traffic.

The company says that the security issues were unearthed during an internal code review and has issued an out-of-cycle fix to address the vulnerabilities. Network admins are advised to treat the threats seriously, and to make use of the available patches immediately.

Continue reading

The best enterprise firewalls based on user reviews [Infographic]

A good firewall will keep your company’s and customers’ private information secure in order to prevent issues such as identity theft, hackers and viruses by shutting off access to your network where necessary.

With recent data breaches like that of the U.S. Office of Personnel Management and at Harvard, firewalls are gaining increasing importance in business.

Continue reading

New firewall provides stronger protection for hybrid cloud systems

firewall

As more apps move to the cloud business infrastructures are increasingly fragmented. This can make traditional on-site security tools ineffective in fighting off cyber attacks.

The threat of attacks remains, however, and a new release from security software company Radware is aimed at protecting both on-premise and cloud-based applications, using just one solution.

Continue reading

Meraki MX Firewalls: Why cloud managed networking simply rocks [Review]

Two of the largest network gaming services, Xbox Live and PlayStation Network, took unplanned hiatuses on Christmas Day 2014. And for their credit, both Sony and Microsoft were not the culprits for the outages. Newly infamous hacking group Lizard Squad used DDoS attacks against the gaming networks to chalk up part publicity stunt and part targeted advertising for their new DDoS-for-hire service.

At this point, the who and why of this story aren't anything new if you've been watching IT news the last few weeks. But something that hasn't gotten as much attention is the "how" of Lizard Squad's Xmas Day barrage last year.

Continue reading

2015 -- the year automated malware protection and firewalls become worthless?

endpoint protection

Whether you're a home or business user, one thing you've probably had drummed into you for years is the importance of virus protection, an effective firewall and malware guards. Well, as we start our journey into 2015 such security tools may not be anywhere near as effective as they used to be. Is it worth investing in them at all?

The suggestion isn’t that we should ditch firewalls and malware protection altogether -- that would be insanity. But security expert Ilia Kolochenko says that we need to rethink our reliance on automated security tools.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.