Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
Securing a wireless Lan remains complex and costly because of immature standards and a lack of interoperability, according to a report by Meta Group. Several approaches have emerged over the past two years that adequately address some of the security . . .
Despite fears that a flaw in the software that controls most of the routers and switches in the Internet would lead to widespread attacks and outages, security monitoring companies say they have seen little indication of that happening. . .
Port scanning is a prosaic area of network security . For the network administrator, it is the equivalent of knocking on all the doors of a house to see if anyone is around. In an age when any open holes in . . .
As Wi-Fi standards get sorted out and customers clamor for better security, two vendors this week are set to introduce WLAN security products that give IT staffs greater power and flexibility in locking down their networks. Offerings from AirDefense Inc. and . . .
A software flaw in routers discovered by networking giant Cisco (Nasdaq: CSCO) has forced Internet carriers and others to apply fixes quickly before attackers cause network outages by exploiting the vulnerability. Exploit code that takes advantage of the flaw was . . .
With more of us using high-speed Internet access such as DSL or cable modems at home, the chances for security breaches have increased dramatically. The following tips can help you keep your systems and network connections secure and operational. 1. Install . . .
A week before publishing this paper, I opened an anonymous ftp site on my home machine, expecting a few connections. I also wanted to see what people would do if I gave them write access. Within 3-4 days of my server . . .
It's a boring Friday evening - mortals with brains the size of peanuts fill up the local joint exposing whatever is left of their gray matter to the savageness of fermented glucose whilst my DNA donors enjoy the comforts of the . . .
Cisco Systems Inc. has found a serious vulnerability that can be used to essentially disable virtually any device running the company's Internetwork Operating System software, including its ubiquitous routers and switches. The vulnerability arises from IOS' failure to correctly handle . . .
Scanning helps one to know what services are running on a machine. This will show the open ports on which services are listening for connections. First we will determine whether the target machine is alive or not. This can be . . .
Several computer and Internet security experts warned this week that while threats are on the rise and the lag time between vulnerability and attack is shrinking, government and the private sector have failed to team effectively on Internet security, leaving infrastructure . . .
Sergei Egorov submits This paper describes a Network Content Analysis Platform (NCAP) suitable for a variety of applications requiring access to all layers of network traffic including the content of TCP/IP network data exchanges. NCAP is capable of operating . . .
At the recent Boston 802.11 Planet Conference and Expo, the aisles and booths were bustling with activity, giving ample proof that Wi-Fi (Wireless Fidelity, or more properly, wireless networking) has finally come of age. The hardware gear venders - switch, carriers, . . .
We've got 12 . . . wait, 13. Another just came in!'' On the hunt for 30 seconds, Gary Morse is jazzed. We've walked about 45 feet down Avenue of the Americas in Midtown Manhattan, and he has been counting . . .
Public relations flacks eager to win the public over to the benefits of mass RFID (Radio Frequency Identification) chip proliferation have ironically managed to leave their own confidential plans unprotected on the Web.. . .
It requires constant vigilance, with regular applications of available network patches. The ideal approach for most companies is to have a day-to-day scanning program along with patch management--done either internally or outsourced to a consultant. It's a jungle out there. Just . . .
While no Ethernet-based network can be considered a "secure" communications medium, network operators take some solace that the exposure of traffic for a LAN is limited to those stations that have "physical access" to it. With a wireless LAN (WLAN), there . . .
More people are using PDAs for keeping business data, increasing the security problems faced by corporates, according to the second annual PDA Usage Survey. Billions of pounds continue to be wasted each year on corporate security that is easily bypassed . . .
Local networking and maintenance specialist Des Little, MD of black-owned Computer Pro, says local companies will have to up their security as SA's telecommunications industry is deregulated. Little says local companies and local telecoms service providers are going to have . . .
If you are reading this article, you should have a good understanding of how computers work and a working knowledge of how to use Internet tools such as web browsers, Telnet, and e-mail. In addition, you're probably already aware of the . . .