Skip Links

IDS/IPS Research Center

Your source for the latest news, opinion, product comparisons and reviews of IDS and IPS tools.

IDS/IPS News
Why we are losing the cyber security war and what we can do about it
Why are the world’s most IT savvy companies unable to keep attackers out of their networks?
NSA reportedly compromised more than 50,000 networks worldwide
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering...
Browser extension creates 'disposable' data for privacy
A Boston-based company, Abine, is beefing its anti-tracking browser extension to let users shield their real credit card details, email addresses and...
A holistic approach to combating advanced persistent threats
Security researcher Michael Sutton is really concerned. He says most companies haven’t advanced their security strategies to keep pace with today’s...
Mining companies caught flat-footed by cyberattacks
Mining companies increasingly are being targeted by hackers trying to steal information and disrupt operations, as the metals industry expands its...
Hackers reportedly stole 42 million customer records from online dating network Cupid Media
Hackers reportedly stole 42 million customer records including email addresses and clear-text passwords from Cupid Media, a network of dating...
GitHub bans weak passwords after brute-force attack results in compromised accounts
Popular source code repository service GitHub has recently been hit by a brute-force password-guessing attack that successfully compromised some...
Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the...
Attackers used known exploit to steal customer log-in credentials, vBulletin maker says
The vBulletin.com forum was not compromised by exploiting a previously unknown vulnerability as a group of hackers claimed, according to vBulletin...
Hackers claim they used zero-day vulnerability to breach vBulletin support forum
A group of hackers claim to have exploited an undocumented vulnerability in the vBulletin Internet forum software in order to break into the...
Derivatives trading company struck by hackers
A Chicago-based company that runs derivatives exchanges said Friday it was the victim of a July cyberattack that compromised customer information.
Dropbox makes its play for business users
Dropbox is hoping to capitalize on the growing use of its file hosting service among businesses with a new product built from scratch that is...
Facebook forces some users to reset passwords because of Adobe data breach
Facebook locked some users out of their accounts after determining that their log-in credentials were exposed as a result of a security breach at...
Arbor Networks introduces cloud-based anti-DDoS service
Arbor Networks today introduced its first cloud-based distributed denial-of-service (DDoS) mitigation service to protect enterprises against...
British spies reportedly spoofed LinkedIn, Slashdot to target network engineers
British intelligence agency Government Communications Headquarters (GCHQ) reportedly used spoofed LinkedIn and Slashdot pages to compromise the...
Despite patches, Supermicro's IPMI firmware is far from secure, researchers say
The Intelligent Platform Management Interface (IPMI) implementation found in motherboards from server manufacturer Supermicro suffers from serious...
Bruce Schneier wants to make surveillance costly again
The ongoing revelations of governmental electronic spying point to a problem larger than National Security Agency malfeasance, or even of security...
Spike in traffic with TCP source port zero has some researchers worried
A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more...
IDC tabs 'Specialized Threat Analysis and Protection' as new security segment
Products that can detect stealthy malware-based attacks aimed at cyber-espionage and data exfiltration should be considered a specialized area of the...
11 sure signs you've been hacked
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate,...