Networking giant Juniper said that it found unauthorized code in ScreenOS designed to spy on encrypted traffic. This code made it possible for an attacker with the right access on the device to monitor VPN communications and decrypt the data.
As someone who works exclusively from a home office, I have a good setup. I do my own thing. The network is fairly basic. I keep my OS patched, my software-based firewall active and my antivirus updated. But because of the simplicity and consumer nature of my so-called architecture, I'm also missing certain features that could help to troubleshoot problems when they arise.
A bug in Apple's iOS 9 update disrupted split tunneling used by Cisco's popular AnyConnect VPN client for iOS. The bug was not fixed in Apple's subsequent updates to iOS 9, but Cisco said Thursday that the problem has been fixed.
While Apple and vendors are touting the security benefits of the latest Apple mobile operating system, at least one security feature has been disrupted by the release of iOS 9. It seems iOS 9 breaks virtual private network connections to corporate servers.
Free peer-to-peer VPN service Hola is apparently not as secure as the company likes to claim. According to a Network World article, Hola sold bandwidth of its 47 million users and also contains several security vulnerabilities that could open up users to botnet infections and other malicious types.
Pulse Secure, a security spinoff of Juniper Networks, unveiled Tuesday at RSA its Pulse One central policy manager for remote access of mobile devices and PCs.
Session border controllers used to control VoIP traffic can also be employed to secure BYOD devices, argues Zeus Kerravala, founder and principal analyst with ZK Research.
Fifty-one percent of organizations have an enterprisewide mobility strategy in place with clearly defined initiatives, while 49 percent do not, finds an Illuminas survey, commissioned by Cisco. The survey polled 400 mid-market and enterprise-IT decision makers.
An Android vulnerability could enable an attacker to bypass a secure virtual private network connection and divert traffic from the Android device to a system controlled by the attacker, according to researchers at Ben-Gurion University's Cyber Security Labs in Israel.
Need help assessing the strengths and weaknesses of commercial mobility platforms for your enterprise but can't bear the expense of hiring a consultant or purchasing a pricey analyst report? Look no further than our friends across the pond.