Linux Network Security - Page 60

Discover Network Security News

Keep Pace With WLAN Security Developments

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless security is a complicated topic, and one that requires much education and know-how. Unfortunately, this education is largely lacking, according to experts. Deploying first-rate wireless security tools is a worthless endeavor if the enterprise is not diligent in keeping . . .

Are Wireless Networks Secure Yet?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It is no secret that wireless local area networks, or WLANs Latest News about WLAN, can be probed by anyone within range of their radio signal, leaving them vulnerable to eavesdropping, unauthorized access and even viruses. In short, most WLANs have . . .

Egress Filtering: Fencing in the Bad Guys

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Carefully constructing walls and moats to keep the bad guys out of our systems is an everyday task. It's equally important to build walls and moats to keep them in, should they successfully penetrate our defenses. . .

WLANs Spur Security Questions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ziff Davis Media Inc.'s Feb. 26 eSeminar, "How to Lock Down Wireless LANs," was testament to the interest in and questions about WLANs in the enterprise. The seminar broke registration and attendance records, and attendee questions came in faster than seminar . . .

CEOs Team on Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Now that the federal government has shown its cards on the issue of Internet security, a newly formed task force of security company executives is planning a response that it hopes will make some measurable progress in the effort to improve computer security. . .

Wireless LAN Analyzers: The Ultimate Hacking Tools?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a Wireless LAN (WLAN), things are different. Its physical medium is the electromagnetic spectrum, which exists everywhere and respects few boundaries. Wi-Fi is now available at two different frequencies-IEEE 802.11b at 2.4GHz and IEEE 802.11a at 5GHz-and both can suffer interference from neighboring networks and other sources.. . .

Study Exposes WLAN Security Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As wireless networks continue to gain acceptance and become integral to corporate computing environments, IT departments continue to ignore the myriad security problems inherent to wireless LANs, according to a new study by RSA Security Inc. . . .

IP Spoofing: An Introduction

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Matthew Tanase of SecurityFocus.com writes, "Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on . . .

The WLAN's Weakest Link

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After two years of rousing debate, the body responsible for the Wi-Fi standard is finally putting the finishing touches on its new security standard, IEEE 802.11i. Although this standard's Robust Security Network feature will deliver the level of security the wireless . . .

Honeynet Project: Research Projects

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lance Spitzner submits, The Project has a new section on its site "Research Projects". The purpose of this site is to give universities, students, or research organizations topics for security related research projects. If you are in need of a thesis topic or research goal this is a great place to start.. . .

VPN experts downplay 'splitting' headache

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At a time when protecting corporate networks is paramount, many users are steering clear of a feature of IP Security VPNs called split tunneling, a move that can give a false sense that remote-access networks are more secure than they really are, experts say. . . .

A CIO's Guide to New Antivirus Tech

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It sounds like a chat-room joke: How many script kiddies does it take to crank trojans out of a malware kit? But this is no joke. The current plague of viruses, worms and trojans can be described as an expanding . . .

How To Build a Secure WLAN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless LANs have experienced tremendous growth since the introduction of the 802.11b wireless networking standard spurred the development of a wide range of "Wi-Fi" solutions developed by network equipment vendors. Flexibility, ease of deployment and low component costs constitute three major . . .

Wireless LAN Lockdown

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The drastic drop in the cost of WLAN (wireless LAN) gear, along with the great extent to which 802.11b networking is now being built into notebook and handheld computers, virtually guarantees that wireless networking will secure a spot on your agenda . . .

IM A Rampant Security Risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Instant messaging (IM) is taking off in companies but self-installed consumer versions of software that allows this type of communication are posing a "rampant security risk" on networks. Already some companies see IM as a time wasting technology - as . . .

Safety: Open Networks Pose Dilemma

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you want to know how insecure today's wireless networks are, just ask the people who make it their mission to locate the access points designated by companies and consumers around the world. . .

Firewall Geeks Meet the Night Watchmen

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the information-technology director for Indianapolis Motor Speedway, Jon Koskey keeps a close eye on computer security at the venerable Brickyard, home to the Indy 500. His three-person staff monitors 450 networked devices including servers, desktops, and printers. With security concerns . . .

Combating the aerial threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless local area network (wireless Lan) technology frees businesses and home users from the tyranny of computer cabling. But it also brings new threats, potentially opening another door to attack from unscrupulous competitors, hackers and other criminals intent on obtaining . . .