Networks
-
Blog
Bandwidth Management for Wi-Fi 6E and Wi-Fi 7 Networks
The advent of Wi-Fi 6E and Wi-Fi 7 represents a significant leap in wireless technology, offering ultra-high speeds, improved reliability, and increased network capacity. As homes and businesses deploy these new Wi-Fi standards, one of the major challenges they face is managing the substantial increase in bandwidth demand. In environments with multiple devices demanding simultaneous access to the network, ensuring…
Read More » -
Blog
Europol Warns Criminal Networks Are Embracing AI, Making Fraud Smarter and Harder to Detect
Image: DC_Studio/Envato Elements Organised crime gangs are using artificial intelligence for fraud, data theft, and money laundering, according to a new report by Europol. The European law enforcement agency revealed the extent to which criminals are exploiting the technology and said it has “fundamentally reshaped the organised crime landscape.” “The same qualities that make AI revolutionary — accessibility, adaptability and…
Read More » -
Blog
Optimizing Performance in Virtual Networks & Best Tools for 2025
Virtual networks, driven by software-defined networking (SDN) and network virtualization, have revolutionized the way IT infrastructure is managed. These networks provide flexibility, scalability, and efficiency by abstracting the hardware components and enabling network configurations to be created and adjusted through software. However, as networks become more virtualized, it becomes increasingly essential to ensure their performance is optimized to meet the…
Read More » -
Blog
‘Redact’ Can Delete Your Posts From 28 Different Social Networks
From security and privacy concerns to good old-fashioned cringe, there are all kinds of reasons you might want to delete your old social media posts. And there are plenty of tools for the job out there. The problem: most tend to focus on one or two social media networks. Redact, however, is a paid tool with support for deleting posts…
Read More » -
Blog
94% of Wi-Fi networks are vulnerable to deauthentication attacks
Research shows the vast majority of Wi-Fi networks are vulnerable to a popular type of denial-of-service (DoS) attack that is frequently deployed in larger cyber intrusion efforts. A new report from Nozomi Networks that analysed telemetry from hundreds of OT and IoT environments found 94% of Wi-Fi networks lacked the proper protections against deauthentication attacks. Deauthentication attacks are a form…
Read More » -
Blog
Silk Typhoon hackers now target IT supply chains to breach networks
Microsoft warns that Chinese cyber-espionage threat group ‘Silk Typhoon’ has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers. The tech giant has confirmed breaches across multiple industries, including government, IT services, healthcare, defense, education, NGOs, and energy. “They [Silk Typhoon] exploit unpatched applications that allow them…
Read More » -
Blog
Wireless networks are a prime target for hackers – here’s how to combat rising threats
Security experts have issued a warning over surging threats faced by wireless networks, with many left woefully unprotected . Analysis of more than 500,000 ‘honeypot’ wireless networks by Nozomi Networks Labs found only 6% are adequately protected against wireless deauthentication attacks. The rest are vulnerable to unauthorized access to data or interference with critical systems, the study noted. For example,…
Read More » -
Blog
Zyxel Networks names Ken Tsai as new president
Cloud networking solutions provider Zyxel Networks has announced the appointment of Ken Tsai as the company’s new president. Across a 19-year stint at the business, Tsai has previously served in various key positions across various strategic operations and product management units, including the firm’s Gateway business unit, management center, corporate HR service division, and business supporting center. The seasoned veteran…
Read More » -
Blog
Chinese hackers use custom malware to spy on US telecom networks
The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially capture sensitive data in cyberattacks on U.S. telecommunication providers. Salt Typhoon (aka Earth Estries, GhostEmperor, and UNC2286) is a sophisticated hacking group active since at least 2019, primarily focusing on breaching government entities and telecommunications companies. Recently, the U.S. authorities have…
Read More » -
Blog
Extreme Networks targets simplicity with Platform ONE for MSPs
Networking automation provider Extreme Networks has announced a new program for MSPs, which includes access to its Extreme Platform ONE to address modern cost and billing challenges. Available from March 31, the firm said the initiative features the industry’s first and only consumption-based billing model and has been designed to equip MSPs with increased flexibility, simplicity, and cost savings. The…
Read More »