Networks

  • Blog

    Bandwidth Management for Wi-Fi 6E and Wi-Fi 7 Networks

    The advent of Wi-Fi 6E and Wi-Fi 7 represents a significant leap in wireless technology, offering ultra-high speeds, improved reliability, and increased network capacity. As homes and businesses deploy these new Wi-Fi standards, one of the major challenges they face is managing the substantial increase in bandwidth demand. In environments with multiple devices demanding simultaneous access to the network, ensuring…

    Read More »
  • Blog

    Europol Warns Criminal Networks Are Embracing AI, Making Fraud Smarter and Harder to Detect

    Image: DC_Studio/Envato Elements Organised crime gangs are using artificial intelligence for fraud, data theft, and money laundering, according to a new report by Europol. The European law enforcement agency revealed the extent to which criminals are exploiting the technology and said it has “fundamentally reshaped the organised crime landscape.” “The same qualities that make AI revolutionary — accessibility, adaptability and…

    Read More »
  • Blog

    Optimizing Performance in Virtual Networks & Best Tools for 2025

    Virtual networks, driven by software-defined networking (SDN) and network virtualization, have revolutionized the way IT infrastructure is managed. These networks provide flexibility, scalability, and efficiency by abstracting the hardware components and enabling network configurations to be created and adjusted through software. However, as networks become more virtualized, it becomes increasingly essential to ensure their performance is optimized to meet the…

    Read More »
  • Blog

    ‘Redact’ Can Delete Your Posts From 28 Different Social Networks

    From security and privacy concerns to good old-fashioned cringe, there are all kinds of reasons you might want to delete your old social media posts. And there are plenty of tools for the job out there. The problem: most tend to focus on one or two social media networks. Redact, however, is a paid tool with support for deleting posts…

    Read More »
  • Blog

    94% of Wi-Fi networks are vulnerable to deauthentication attacks

    Research shows the vast majority of Wi-Fi networks are vulnerable to a popular type of denial-of-service (DoS) attack that is frequently deployed in larger cyber intrusion efforts. A new report from Nozomi Networks that analysed telemetry from hundreds of OT and IoT environments found 94% of Wi-Fi networks lacked the proper protections against deauthentication attacks. Deauthentication attacks are a form…

    Read More »
  • Blog

    Silk Typhoon hackers now target IT supply chains to breach networks

    Microsoft warns that Chinese cyber-espionage threat group ‘Silk Typhoon’ has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers. The tech giant has confirmed breaches across multiple industries, including government, IT services, healthcare, defense, education, NGOs, and energy. “They [Silk Typhoon] exploit unpatched applications that allow them…

    Read More »
  • Blog

    Wireless networks are a prime target for hackers – here’s how to combat rising threats

    Security experts have issued a warning over surging threats faced by wireless networks, with many left woefully unprotected . Analysis of more than 500,000 ‘honeypot’ wireless networks by Nozomi Networks Labs found only 6% are adequately protected against wireless deauthentication attacks. The rest are vulnerable to unauthorized access to data or interference with critical systems, the study noted. For example,…

    Read More »
  • Blog

    Zyxel Networks names Ken Tsai as new president

    Cloud networking solutions provider Zyxel Networks has announced the appointment of Ken Tsai as the company’s new president. Across a 19-year stint at the business, Tsai has previously served in various key positions across various strategic operations and product management units, including the firm’s Gateway business unit, management center, corporate HR service division, and business supporting center. The seasoned veteran…

    Read More »
  • Blog

    Chinese hackers use custom malware to spy on US telecom networks

    The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially capture sensitive data in cyberattacks on U.S. telecommunication providers. Salt Typhoon (aka Earth Estries, GhostEmperor, and UNC2286) is a sophisticated hacking group active since at least 2019, primarily focusing on breaching government entities and telecommunications companies. Recently, the U.S. authorities have…

    Read More »
  • Blog

    Extreme Networks targets simplicity with Platform ONE for MSPs

    Networking automation provider Extreme Networks has announced a new program for MSPs, which includes access to its Extreme Platform ONE to address modern cost and billing challenges. Available from March 31, the firm said the initiative features the industry’s first and only consumption-based billing model and has been designed to equip MSPs with increased flexibility, simplicity, and cost savings. The…

    Read More »
Back to top button
close