Unraveling open port threats and enhancing security with port scanning tools

From exposing your network vulnerabilities to becoming a passageway for intruders, open ports can pose several risk vectors that threaten your network’s confidentiality, integrity, and availability. This is why it’s a best practice to close your open p… Continue reading Unraveling open port threats and enhancing security with port scanning tools

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches?
 In the first, second, and third parts of the Are you listening to your logs? series, we saw how logs can be …
The post Are you listening to your logs? Part 4: … Continue reading Are you listening to your logs? Part 4: Open ports

The Pitfalls of Keeping Your Ports Wide Open

By David Balaban
Based on security assessment results, penetration testers often recommend hiding an enterprise network’s ports behind a whitelist. However, corporate IT teams don’t always understand the need for such a countermeasure. Even some admins… Continue reading The Pitfalls of Keeping Your Ports Wide Open

Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking

A team of researchers from the University of Michigan discovered that hundreds of applications in Google Play Store have a security hole that could potentially allow hackers to steal data from and even implant malware on millions of Android smartphones.

The University of Michigan team says that the actual issue lies within apps that create open ports — a known problem with computers — on

Continue reading Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking