Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
Intro Wireless LANs are popping up here, there and everywhere. Many businesses are implementing wireless LAN segments on their internal LANs because it is easy to setup and obviously there are no wires to run. Wireless allows users with laptops and . . .
Security is essential if you are to get the most out of wireless technology. Despite the hype it is perfectly possible to have secure wireless computing, but there are some common mistakes to avoid. This top 10 list of tips . . .
Ross Vandegrift explains that he "Made it into the showing last night at Newark shopping center. There's this scene where Trinity needs to crack into a system. So what does she use?" Read on to find out.. . .
Crystal Ferraro submits After a slow start late last week, spread of the mass-mailing worm soared on Monday as enterprises returned to work worldwide. UK-based e-mail scanning outsourcer MessageLabs intercepted 56,669 copies of the worm by midmorning Tuesday. More . . .
Wireless technology has advanced noticeably lately and organisations are beginning to realise the tremendous potential the technology holds. Users are becoming more mobile than ever before. With the increasing demand to work on the move, wireless technology has an important role . . .
Graduate students from Carnegie Mellon University on Monday proposed two methods aimed at greatly reducing the effects of Internet attacks. In two papers presented at the IEEE Symposium on Security and Privacy here, the graduate students suggested simple modifications to . . .
Although wireless security was center stage during last week's Networld+Interop trade show in Las Vegas, behind the scenes was a convention floor full of misconfigured hardware resulting in malicious attacks on computers and undoubtedly many red faces. . .
Enterprises continue to battle the installation of unauthorized, or rogue, wireless LAN access points (AP) on corporate networks by employees who install the increasingly cheap devices unmindful of the security risks, according to speakers here today at Computerworld's Mobile and Wireless . . .
Increasing use of voice-over-IP technology could result in a return to "phreaking" - hacking of telephony systems to make free calls. Security expert Matt Barrie said VoIP was cheap and increasingly popular, but it introduced many vulnerabilities of traditional Internet . . .
ROI (return on investment) is a key concept in IT spending today. The board is much more likely to spend money on IT, if ROI can be demonstrated in a reasonable period of time. It's a very sensible, sound business idea. Yet, many companies are actually practicing what could be called negative ROI - they choose IT products which cost them more money the longer they have them. In the current business environment, this could be described as corporate stupidity.. . .
Lance Spitzner submits, "This one should shake up the IDS community!" This is the fourth article in an ongoing series examining honeypots. In previous installments, we have covered two different honeypot solutions: Honeyd and Specter. Both honeypots are low-interaction production solutions; their purpose is to help protect organizations, as opposed to research honeypots, which are used to gather information.. . .
Wireless LANs are a blessing and a curse. They offer tremendous relief to large organizations whose employees need greater flexibility and mobility. But a wireless access point is also a radio station broadcasting your company's private information. . .
I just recently finished yet another security review on the network at my place of employment. I designed the different security features from scratch and I am using a variety of devices and software (firewalls, IDS, DMZs, and so on). I . . .
The deployment of various wireless LANs and Wi-Fi networks or configurations are under consideration by many organizations, and network security is a major concern. The problems with security on 802.11 networks have, of course, long been widely reported (see Resources for . . .
Secure wireless software developer Columbitech of Stockholm and New York, whose wireless VPN technology powers Symbol's AirBEAM brand of products, is supporting Linux servers in its latest version. This move is key for the company because it helps customers save . . .
Radio waves know no boundaries. Therein lies the Wi-Fi rub. Even as enterprises equip their employees with Smartphones, PDAs, and wireless laptops, the data traversing the wireless LAN can be intercepted all too easily. . .
Nearly three-quarters of malicious connections to wireless networks are used for sending spam, according to new research. Security consultant Z/Yen set up two wireless local area networks (Lans) on behalf of RSA Security to monitor unauthorised connections - a so-called . . .
You've heard horror tales about attacks on wireless networks, so how do you go about building a secure Wi-Fi infrastructure? Here's a guide. The growing number of threats and exploits against a wireless network can be staggering. And with so . . .
An interesting piece of news has surfaced that will have sys admins fainting in disbelief. Eight states have put forward bills that would have a devastating effect on network security and even networks themselves if they come to pass. The wording . . .
On Thursday, February 20, 2003, at about 0130 GMT, the popular LiveJournal site became the victim of a massive distributed denial-of-service attack. LiveJournal staffers and upstream providers first tried to filter by IP, but they soon discovered what the "D" in . . .