Tags: router

Router Vulnerability and the VPNFilter Botnet

On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security, and it’s a harbinger of the sorts of pervasive threats — from nation-states, criminals and hackers — that we should expect in coming years...
Read 0 Comments

VPNFilter: New Router Malware with Destructive Capabilities

Unlike most other IoT threats, malware can survive reboot. A new threat which targets a range of routers and network-attached storage (NAS) devices is capable of knocking out infected devices by rendering them unusable. The malware, known as VPNFilter, is unlike most other IoT threats because it...
Read 0 Comments

The Ars Guide to Building a Linux Router from Scratch

After finally reaching the tipping point with off-the-shelf solutions that can't match increasing speeds available, we recently took the plunge. Building a homebrew router turned out to be a better proposition than we could've ever imagined. With nearly any speed metric we analyzed, our little DIY...
Read 0 Comments

Review: 6 Slick Open Source Routers

If you want to buy a router specifically to be modded, you might be best served by working backward. Start by looking at the available offerings, picking one of them based on the feature set, and selecting a suitable device from the hardware compatibility list for that offering. In this article. I’...
Read 0 Comments

AT&T Wants White Box Routers with an Open Operating System

AT&T says it’s not enough to deploy white box hardware and to orchestrate its networks with the Open Network Automation Platform (ONAP) software. “Each individual machine also needs its own operating system,” writes Chris Rice, senior vice president of AT&T Labs, Domain 2.0 Architecture, in...
Read 0 Comments

Serious Flaw in WPA2 Protocol Lets Attackers Intercept Passwords and Much More

Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a...
Read 0 Comments

soderskar-island.jpg

island network
Without routers and bridges, we would be lonely little islands; learn more in this networking tutorial.

Linux Networking Hardware for Beginners: Think Software

Last week, we learned about LAN (local area network) hardware. This week, we'll learn about connecting networks to each other, and some cool hacks for mobile broadband. Routers Network routers are everything in computer networking, because routers connect networks. Without routers we would be...
Read 0 Comments

Behind the Masq: Yet More DNS, and DHCP, Vulnerabilities

Our team has previously posted about DNS vulnerabilities and exploits. Lately, we’ve been busy reviewing the security of another DNS software package: Dnsmasq. We are writing this to disclose the issues we found and to publicize the patches in an effort to increase their uptake.Dnsmasq provides...
Read 0 Comments
Click Here!