Skip to main content
Open mobile navigation menu
  • Log In
  • Contact Us
  • Global Sites

    Français
    Deutsch
    Italiano
    Português
    Español
    日本語
Home
  • Back

    Platform

    • Platform Overview
    • Unified Security Platform
    • Unified Security Agent
    • Centralized Management
    • AI-Powered XDR
    • RMM & PSA Integrations
    • Compliance Reports
    • Managed Services for MSPs
    • Managed Detection & Response
    • Security Operations Center (SOC)
    • Network Security
    • Firewalls
    • Firewall Security Services
    • Network Detection & Response (NDR)
    • Secure Wi-Fi
    • Endpoint Security
    • Endpoint Detection and Response
    • Endpoint Security Modules
    • Identity Security
    • Multi-Factor Authentication (MFA)
    • Total Identity Security
    • Hardware Token
    • Zero Trust
    • Secure Access Service Edge (SASE)
    • View All Products
  • Back

    Why WatchGuard

    • Why WatchGuard
    • WatchGuard vs The Competition
    • Compare SonicWall
    • Compare Microsoft
    • Compare Fortinet
    • Compare Sophos
    • Compare CrowdStrike
    • Case Studies
    • Case Studies
    • Partner Success Stories
    • Solutions
    • Industries
    • Regulations
    • Organizations
    • Security Models
    • spacer
    • Industry Recognition
    • Awards & Recognition
    • Customer Reviews
    • Compliance & Regulations
  • Back

    Learn

    • Cybersecurity 101
    • AI & Automation
    • Cyber Attacks & Threats
    • Endpoint Security
    • VPN
    • Managed Detection & Response

    • Blogs
    • Corporate News Blog
    • Product & Support Blog
    • Secplicity
    • Threat Lab
    • Internet Security Report
    • Ransomware Tracker
    • The 443 Podcast
    • Cybersecurity Trends
    • SD-WAN
    • XDR Security
    • Zero Trust Security
    • MSP vs MSSP
    • Webinars & Events
    • Register for a Webinar
    • Upcoming Live Demos
    • On Demand Webinars
    • Help Me Buy
    • Demos & Free Trials
    • Find a Reseller
    • Online Store (Renewals Only)
    • View All Resources
  • Back

    Company

    • News Room
    • Press Releases
    • Press Coverage
    • Corporate News Blog
    • Webinars & Events
    • Awards & Recognition
    • Media Contacts
    • About WatchGuard
    • Leadership
    • 30 Years of Innovation
    • Real Security for the Real World
    • Careers
    • WatchGuard Brand Partners
    • Seattle Kraken
    • Girona FC
    • Trust Center
    • PSIRT
    • Product Certifications
  • Back

    Partners

    • Partners
    • Become a Partner
    • Channel Partner Program
    • Benefits for the MSP
    • Getting Started as a Partner
    • Join the WatchGuardONE Program
    • Partner Resources
    • WatchGuard Cloud for Partners
    • Unified Security Platform for Partners
    • Specializations & Certifications
    • Partner Tools
    • Partner Success Stories
    • Find A Partner
    • Find a Reseller
    • Find a Distributor
  • Back

    Support

    • Support
    • Technical Resources
    • Technical Search
    • User Forums
    • Technical Documentation
    • Product & Support Blog
    • Software Downloads
    • Security Portal
    • Training
    • Certification
    • WatchGuard Learning Center
    • Locate a Training Partner
    • Training Schedule
    • Video Tutorials
    • Support Services
    • Hire an Expert
    • Support Levels
    • Additional Support Services
    • spacer
    • Security Advisory List
    • Status Dashboard
  • Close search
  • Try Now
Close search
  • Solutions
  • Products & Services
  • Research
  • Partner Program
  • Support
  • News
  • Careers
  • Portal Login
  • Contact Us
  • Try Now

Secplicity Blog

Cybersecurity Headlines & Trends Explained

Go to 

Cybersecurity

  • Cybersecurity Hub
  • Internet Security Report
  • Ransomware Tracker
  • Secplicity Blog
  • The 443 Podcast

Historical Cryptography Ciphers

25 May 2017 By The Editor
WatchGuard logo

Like most technologies, encryption has evolved throughout the years from simple origins. While modern encryption relies on complex computational operations, older encryption ciphers were rudimentary and easy to break. Regardless of each cipher’s strength, all encryption methods share a common goal…

Read more

Once Stolen, What Do Hackers Do With Your Data?

18 May 2017 By The Editor
WatchGuard logo

It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview…

Read more

Responsible Disclosure: Ouvis C2 HD Security Camera

09 May 2017 By The Editor
WatchGuard logo

As a part of our ongoing IoT vulnerability research project, one of the recently tested devices included the Ouvis C2 HD Wireless Security Camera. This is a wireless camera which includes Android, iOS and browser-based remote viewing. Open Telnet Access Vulnerability After connecting an IoT device…

Read more

WatchGuard's Q4 2016 Internet Security Report

29 March 2017 By The Editor
WatchGuard logo

Today, I am very excited to share WatchGuard's first formal Internet Security Report. For over a decade, WatchGuard's threat team has educated the general public and our customers about the latest threats, vulnerabilities, and security stories through articles, podcasts, and videos. In this new…

Read more

Responsible Disclosure: Amcrest View Web Portal

18 January 2017 By The Editor
WatchGuard logo

Recently I purchased a number or IoT devices for a vulnerability research project. Among them was the Amcrest IPM-721S Wireless IP camera, a wireless pan-and-tilt camera, which at the time had 6,381 reviews on Amazon.com (interestingly, that number is down to 1,425 at the time of this writing)…

Read more

What is the TCP Split-Handshake Attack and Does It Affect Me?

15 April 2011 By The Editor
WatchGuard logo

If you've followed security news over the past few days, you've probably seen a lot of hoopla about a TCP split-handshake vulnerability that can affect firewalls and other networking and security devices. Many of the Media's articles characterize this complicated TCP connection attack as, "a hacker…

Read more

Pagination

  • « first
  • ‹ previous
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • next ›
  • last »

Email Updates

Sign up to get the latest security news and threat analysis delivered straight to your inbox.

Subscribe

Subscribe Via RSS

Secplicity Blog via RSS

Looking For More?


browser bar showing the SSL lock icon

443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers.

Learn more


red caution symbol standing on a red circuit board

Ransomware Tracker

The Ransomware Tracker is a dynamic, all-in-one hub for IT professionals, researchers, and cybersecurity-minded folks to learn about the entire ransomware landscape. This information-laden resource brings together WatchGuard Threat Labs' research with evidence from all over the Internet into one single convenient location.

Learn more

  • About Us
  • Contact Us
  • Real Security
  • Careers
  • Product List & SKUs
  • Media & Brand Kit
  • Support
  • Trust Center
  • PSIRT
  • Cookie Policy
  • Privacy Policy
  • Manage Email Preferences
LinkedIn X Facebook Instagram YouTube

Email Us

Global Sites

Français
Deutsch
Italiano
Português
Español
日本語

Copyright © 1996-2026 WatchGuard Technologies, Inc. All Rights Reserved.
Terms of Use | California Collection Notice | Do Not Sell or Share My Personal Information