Linux Network Security - Page 61

Discover Network Security News

CVS flaw could give hackers access to servers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

THE CERT COORDINATION Center (CERT/CC) security organization has warned of a critical vulnerability in the widely used Concurrent Versions System (CVS) software that could enable an unauthenticated remote attacker with read-only access to execute arbitrary code, alter program operation, read sensitive information, or cause a denial of service to servers. . . .

Secure your WLAN: Authenticate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Inherently flawed security protocols and a strong grassroots push to adopt wireless local-area networks (LANs) are creating substantial security risks for enterprises. The first priority should be to establish a comprehensive policy to address wireless deployments, with user authentication as a . . .

Avoid Wireless LAN Security Pitfalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless Local Area Networks (WLANs) are taking off. Enterprises are turning to WLANs in droves because they offer mobility and huge cost advantages. In fact, studies show that wireless workers are more productive, less pressured and save businesses money. Gartner, Inc., . . .

Help Net Security: Interview with Joshua Wright

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Joshua Wright is a Network Engineer for Johnson & Wales University. He's been investigating wireless security and one of the results of his research has been the whitepaper "Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection". The paper reviews . . .

Closing the Floodgates: DDoS Mitigation Techniques

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To be on the receiving end of a distributed denial of service (DDoS) attack is a nightmare scenario for any network administrator, security specialist or access provider. It begins instantly, without warning, and continues relentlessly: machines down, jammed bandwidth, overloaded routers. . . .

Top 6 Wireless Networking Tips

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The purpose of properly securing a wireless access point is to close off the network from outsiders who do not have authorization to use your services. This is often easier said than done. A wireless network is more difficult to . . .

Un-Wired

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Without an abundance of expensive equipment or an Internet Service Provider, Croshere and Popkoff surf the Web all over the Palo Alto area, often by simply driving around and letting their iBooks -- which come with a built-in antenna and optional wireless Internet card -- track wireless connections at homes and businesses.. . .

The Future of Viruses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In 2002, users and companies got a respite from the disruptive viruses of 2001. But a more sophisticated generation of worms is on the way. The year 2002 may have been a relatively quiet for virus attacks, but security experts . . .

Cryptosystems: Configuring IPSec

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the next two articles, I'll demonstrate how to configure and troubleshoot an IPSec VPN on a FreeBSD system. When I first started configuring VPNs, I quickly discovered two things. First, there is more than one way to configure a VPN . . .

Government Agencies Plug Leaks In Wireless Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Since anyone with the software could pry, cable is back in style. The Meteorological Agency and the Tokyo metropolitan government stopped using wireless local area networks (LAN) last week after learning data was wide open to anyone with the will . . .

Buried By The Authentication Avalanche

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With identity theft on the rampage, network managers are being hit by an increasing barrage of software, hardware and services for user authentication. Organizations are implementing technologies ranging from traditional passwords/PINs to PKI and SSL certificates, tokens, fingerprint readers, and even . . .

IT users in password hell

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Heavy users of technology now employ nearly two dozen passwords to gain access to various IT systems and Web sites--but are compromising security by writing them down. The 2002 NTA Monitor Password Survey found that the typical intensive IT user now has 21 passwords, and has two strategies to cope, neither of which is advisable from a security standpoint: they either use common words as passwords or keep written records of them. The survey found that some of these heavy users maintain up to 70 passwords. Forty-nine percent write their passwords down, or store them in a file on their PC. . . .

Complex Networks Too Easy to Hack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet and telecommunications experts, here on Friday to discuss homeland security, said increasingly complex software operating systems and networks have made it easier than ever to disrupt U.S. communications systems. At the same time, hackers don't need to be highly . . .

Feds Label Wi-Fi a Terrorist Tool

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Attention, Wi-Fi users: The Department of Homeland Security sees wireless networking technology as a terrorist threat. That was the message from experts who participated in working groups under federal cybersecurity czar Richard Clarke and shared what they learned. . .

Making Wireless LAN Security Air Tight

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Losing sleep lately? With rogue wireless LAN access points popping up every time you turn around it's easy to understand why. Securing the ether is becoming job No. 1. One approach that's gaining favor is to use security gateways to . . .

Downloadable Exploits Accelerate Security Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For hackers or 'script kiddies' to attack and severely damage a Web site or corporate server it's almost a point-and-click exercise using widely available 'downloadable exploits'. According to local security industry experts, most Australian organisations are more vulnerable than ever and are struggling with the know-how to deal with security issues. . .

WLAN Security is still Work in Progress

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IT managers are cautiously optimistic that wireless networks will - over time - become as secure as today's local area networks, but security concerns are still holding back deployment of the technology. Those are the main findings of a limited (but still informative) survey of IT security manager attitudes on the deployment of 802.11b (wireless) networks by security consultancy Defcom released this week. . .

Suppliers to add security features to wireless comm chips

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Infineon Technologies AG has made a strategic decision to put security features into its wireless-modem chips, a move that points up concerns across the industry about the safety of mobile networks. Infineon and a handful of other chip vendors are gambling on the assumption that system OEMs will soon be clamoring for wireless solutions able to handle strong encryption--well beyond what's now specified in wireless communication standards. . .