News

Cybersecurity researchers have discovered a critical security vulnerability in RADIUS, a widely used network authentication protocol dating back to the 1990s that’s still in widespread use today ...
RADIUS is a common user authentication protocol used for network connections. It was originally developed in 1991 with dial-up connections in mind, but at the time of writing, it is supported by ...
The attack affects RADIUS, a networking protocol used across various applications, including VPNs, Wi-Fi, and home internet connections from ISPs.
It recommends stronger language in RADIUS-related RFCs for protecting RADIUS communications, since so many security architectures now rely upon the protocol.
Long-known vulnerabilities can be the downfall of the RADIUS protocol, which is used in many networks, especially in the enterprise environment.
Paul Funk, president of Funk Software, traces the evolution of the RADIUS server through different network mediums and its growing role in wireless technologies.
OTTAWA, Ontario--(BUSINESS WIRE)--The BlastRADIUS vulnerability announced July 9 by cybersecurity researchers involves the RADIUS protocol which underlies most network connections worldwide. When ...
A research team led by University of California San Diego computer scientists investigated the Remote Authentication Dial-In User Service (RADIUS) protocol and found a vulnerability they call ...
It's available in some products, but RADIUS is by far the more popular protocol because of the guaranteed compatibility, and because so many people are familiar with setting it up.
Security researchers have discovered a vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol, which attackers could use to gain unauthorised access to corporate ...