Linux Network Security - Page 52

Discover Network Security News

Using a five-layer filter to cut spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We have elected to put a substantial portion of our defenses on the client rather than the server as it makes our system less vulnerable. It is annoying to administer, but worth the effort as it has prevented virus- and worm-based . . .

Year of spam blamed on Sobig

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Sobig worm is to thank for a massive increase in spam e-mail during 2003 and the problem of unsolicited commercial junk e-mail is set to get worse in 2004.. . .

Complacency is IT security's worst enemy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report issued by Datamonitor found that although 69 percent of companies do not feel that they are at risk of being the victim of a specific and targeted attack, more than 77 percent reported that they had fallen victim to a worm or a virus. Only 18 percent of those surveyed reported no security breach at all.. . .

Review: Wireless Hacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a couple of copies, I've already had a book or . . .

IPv6 will need security, too, experts warn

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security has been one of the selling points for the new Internet protocol, but IPv6 is not inherently secure, say those planning its implementation. "The biggest challenge we have of the next decade or so is security," Latief Ladid, president of . . .

Worm hits Windows-based ATMs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Automated teller machines at two banks running Microsoft's popular Windows software were infected by a computer virus in August, the maker of the machines said Monday.. . .

New era of security cooperation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Who would have thought that Microsoft would be in a position of snubbing Linux for 'security' reasons? It seems very possible that Redmond would like to have vast swathes of Microsoft and Cisco networking disable all Linux traffic and connectivity by default.. . .

SSL VPN Case Study

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When more and more doctors started asking for access to patients' test results online, Sydney Adventist Hospital explored alternatives to some of the solutions being used elsewhere in healthcare. The hospital's first priority was to keep patients' health information secure and . . .

Network Security: Double Impact

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Should there be two security guards, one to spot potential intruders to your house and another one to stop him from getting in? If you transpose this to the enterprise-network situation, we are faced with a classic debate challenging CIO's and . . .

Expert exposes security flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kevin Curran, an IT lecturer at the University of Ulster's Magee campus, said companies across the province using wireless computer networks were leaving themselves open to hackers who can use their systems to surf the net for free - even for . . .

Former Intel exec sets Wi-Fi crowd straight

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Those of you that are involved in creating these products, I don't know what the hell you are thinking of. Are you designing these products for the fellow in the next cubicle, or for consumers?" Vadasz asked a crowd of WLAN . . .

If security keeps you up at night, take this pill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security. It's a bad dream and getting more nightmarish all the time. Aside from the mounting attacks by hackers, think also of how increasingly complex and far flung the territory is you must now defend. Sure, maybe you have your . . .

Security in 6 Easy Steps: Wireless

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of . . .

Sniffed password used for Debian server compromise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A member of the Debian GNU/Linux system administration team believes there is an unknown local root exploit for the Linux kernel circulating in the wild and says it may have been used to compromise four servers belonging to the free software . . .

Wireless World Gets a New Worry: Viruses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Telecommunications companies spend as much as $8 billion a year fixing phones with programming errors, faulty mechanics and other problems. Now some are scrambling to prevent virus attacks that could cost carriers millions of dollars more in repairs and lost business.. . .

Routers don't protect by default

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Routers are a good way to protect your computer from malicious attacks, but they are ineffective if not configured correctly. For example, wireless routers are inherently less secure than wired ones since they broadcast data back and forth between your computer . . .

DoS attack blamed for Internet outage

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A denial of service attack on security website Zonelabs has been blamed for major disruption of the Internet over the past couple of days. According to an anonymous NTL employee's posting on www.frogger.uklinux.net, the DoS attack was launched from 'someone in . . .