Rethinking Routers: A Fresh Take

With our company’s three plus decades of cellular expertise, millions of field-deployed devices, and a relentless drive to innovate, our family of routers have quite the history. From the early days of 2G, deep into the 5G era, two factors have consistently guided us: providing the ultimate in performance while ensuring longevity and reliability.

Thousands of online systems could be hit by new DoS attack

Hackers can render network services completely useless, by putting them in an infinite communications loop. The loop generates large volumes of traffic, which is why the attack is being dubbed “Loop DoS”. This looped denial-of-service attack was discovered by cybersecurity researchers at the CISPA Helmholtz-Center for Information Security, BleepingComputer reports. It abuses a vulnerability in…

Thousands of online systems could be hit by new DoS attack

Hackers can render network services completely useless, by putting them in an infinite communications loop. The loop generates large volumes of traffic, which is why the attack is being dubbed “Loop DoS”. This looped denial-of-service attack was discovered by cybersecurity researchers at the CISPA Helmholtz-Center for Information Security, BleepingComputer reports. It abuses a vulnerability in…