Linux Network Security - Page 51

Discover Network Security News

Welcome to yet another year of viruses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MessageLabs predicts that spam will account for over 70 percent of e-mail traffic by April of 2004. Given that current antispam legislation is largely ineffective, the onus will continue to be on you and me to protect ourselves. . . .

Defenses lacking at social network sites

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Services like LiveJournal and Tribe are poised to be the next big thing on the Web in 2004, but their security and privacy practices are more like 1997. Brad Fitzpatrick is president of LiveJournal.com, a social discovery Web site where over 1.5 million users post diary entries they want to share with friends. Although members post extremely sensitive information in their journals -- everything from their plans to commit suicide or sabotage their boss to their latest sexual adventures -- Fitzpatrick admits that security on his site isn't a priority. . . .

Wireless Not Yet the Recommended Answer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Wireless security can be implemented properly but there is a significant amount of integration required," he said. "This means increased costs and more time spent with deployment which contribute to the reluctance." From the business case stance for replacing wired networks with wireless, Munch said it's not recommended. . . .

Experts: 2004 seen bringing more, worse cyberattacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The New Year will offer weary network administrators little respite from a new generation of Internet worms, viruses and targeted hacks that appeared in 2003, according to security experts. While many of those attacks will target Microsoft operating systems, malicious hackers may also look for ways to exploit RPC security holes in Unix and Linux. . . .

Security Threats: Bad In 2003, Worse In 2004?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bad in 2003? Worse in 2004? There is a glimmer of hope, said Hughes. He pinned his on the partnership between government and the private sector in bringing virus writers to justice. "The government is getting more and more serious and Microsoft is putting out bounties on hackers," he said. "If they catch someone important, like the author of Blaster or Sobig, they're going to make an example and throw the book at him." . . .

Looking Back At Wireless Security In 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While the majority of readers think that wireless networks are generally insecure, we all know that the human factor is the biggest problem. It is up to us, the users and the administrators, to watch the new technologies and to keep updated with the events - which will finally lead to a phrase "wireless security", that won't any longer be an oxymoron.. . .

Online crime up in 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It seems 2003 was a productive year for phishers, online auction scammers and Nigerians professing a deep sense of purpose and utmost sincerity, judging from the latest stats from the Internet Fraud Complaint Center. The center reports receiving over 120,000 online fraud complaints through its website this year -- an increase of 60% over the 75,000 complaints counted in 2002.. . .

How do you stop the threat from within?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just ten years ago, security professionals had almost total control over what end-users ran on their computers. Today, the IT landscape looks very different and leading analysts and security experts are warning companies that, no matter what perimeter defenses and technologies they might implement, the biggest threat lies within the company - the system users, the human beings.. . .

Proliferation of wireless data forms new security market

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Additionally, wireless networks are complicating the security equation, as devices that once were predominantly corporate in nature, are now also accessing wireless data networks via hotspots and public areas. These wireless users may be providing malicious users with a backdoor . . .

Network Monitoring with Ethereal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We all hope that our networks just do what they are supposed to but that often is not the case. Two systems that should talk to each other, don't; a network becomes saturated with traffic for no apparent reason; you need . . .

Clear and present danger or phantom menace?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The UK is taking a less alarmist approach to the potential of an electronic attack but remains concerned. Responding to a parliamentary question recently, the home secretary, David Blunkett, said the threat from computer-related attacks by terrorists or their supporters is . . .

Wi-Fi Show Was Security Battleground, Vendor Claims

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A behind-the-scenes security war raged at a recent Wi-Fi trade show, according to a company that provides wireless LAN security monitoring products. Most attendees and exhibitors didn't know they were the subjects of the often-successful attacks, according to AirDefense, Inc. The company monitored the airwaves at the Wi-Fi Planet Expo held earlier in December in San Jose.. . .

A Look Into The Viruses That Caused Havoc In 2003

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a recently published report by managed e-mail security provider Message Labs, we can see a dramatical increase in e-mail borne viruses - ratio of virus infected emails to clean e-mails increased 84 percent to 1:33 against 1:212 a year ago.. . .

Securing the Network in a K-12 Public School Environment

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In many ways, a K-12 public education data network will be designed and constructed in the same manner as any other business data network. While all business networks will have some degree of security built into them, a K-12 school environment presents special needs and requirements. It goes beyond the obvious items such as physical security, routers, sub-netting, firewalls, and anti-virus. These will be addressed as well, but we will be looking at several other very important issues, which include privacy (confidentiality), data integrity, and content filtering.. . .

Is Wireless Security a Lost Cause?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As enterprises continue to invest in wireless devices and networks, IT specialists will be faced with the growing challenge of maintaining and improving the security of those networks. In many cases, they are getting the financial assistance they need . . .

Wireless Traffic Alerts Ahead

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal regulators on Wednesday set aside a swath of spectrum for a new wireless technology that would let motorists use small display screens to get traffic updates, buy fast food or find a nearby hotel. The Federal Communications Commission . . .

Bluetooth security 'crisis' looming

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Class 1 standard easy for hackers to exploit, says security firm. Security experts have warned of the need to take care as new Bluetooth devices with a transmission range of up to 100 metres arrive.. . .

Using a five-layer filter to cut spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We have elected to put a substantial portion of our defenses on the client rather than the server as it makes our system less vulnerable. It is annoying to administer, but worth the effort as it has prevented virus- and worm-based . . .

Year of spam blamed on Sobig

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Sobig worm is to thank for a massive increase in spam e-mail during 2003 and the problem of unsolicited commercial junk e-mail is set to get worse in 2004.. . .

Complacency is IT security's worst enemy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report issued by Datamonitor found that although 69 percent of companies do not feel that they are at risk of being the victim of a specific and targeted attack, more than 77 percent reported that they had fallen victim to a worm or a virus. Only 18 percent of those surveyed reported no security breach at all.. . .