Linux Network Security - Page 63

Discover Network Security News

Wi-Fi "wartrappers" nab drive-by hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A "honeypot" trap consisting of a Wi-Fi-equipped laptop is the latest weapon against drive-by hackers. Set up at the London headquarters of consultants KPMG, the laptop looks to the outside world like a simple wireless access point, but contains monitoring software . . .

Wireless Security & Hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Few words on Wireless network topology. Each Wireless network has two major components, either stations (STA) or access points (AP). Wireless network operates in one of two modes: ad-hoc (peer-to-peer) or infrastructure mode. In the ad-hoc mode each client (STA) communicates . . .

Virus Writers Get Slapper Happy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The newest variant, dubbed "Mighty," exploits the same Linux Web server flaw that other versions of the Slapper worm have used to slice through the security on vulnerable servers. Russian antivirus company Kaspersky Labs said in a release Friday that more . . .

Wireless Security: Not An Oxymoron

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Following the theft of its key customer contact lists, NCTPTI Inc. (Name Changed To Protect The Innocent) hired my company to perform a security assessment. We found the client's wireless local area network (WLAN) unsecured and accessible from any area within . . .

Training Security Foot Soldiers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security managers worth their salt are arming their companies with arsenals of technology such as firewalls and encryption. But it's the wise ones like Matthew Speare who know that it also takes well-trained foot soldiers to fight the constant information security . . .

Third Slapper Worm Hits The Street

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Barely 24 hours after the Slapper B worm started to show up on antivirus monitoring stations, a new variant has cropped up. According to security specialist ISS, Slapper C has infected 1,500 servers already and is spreading, although a source . . .

Security Scanning 101

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network and system security scanning is the most practical way to find out what the vulnerabilities and threats are on and for your systems and networks. All reputable providers of this service and associated products offer a comprehensive report that describes . . .

Home LANs risk accidental hacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Someone, somewhere close by, is hacking into your wireless LAN, but it might not be malicious. In fact, the perpetrator may be totally unaware he or she has invaded your system. In fact a series of system defaults which encourage . . .

User Access Chaos Needs Life Cycle

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security management will evolve into three functional areas: user, event, and configuration management. User management aggregation (identity management and provisioning) will mature rapidly (2004). Security event management consoles (collecting intrusion detection system, firewall, and host events) will remain out of the . . .

Kerberos: The watchdog of the Ether

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first computer networks were used to send e-mails and share files and printers between researchers and corporate employees. In such a scenario security was not given much thought. Now the computer networks (especially the Internet) are used by millions for banking, shopping and filing their tax returns, and network security has become a major problem. Network security can be divided into four areas.. . .

Insecure wireless networks exposed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A local consulting firm launched a controversial Web site yesterday that shows gaping security holes in hundreds of wireless networks throughout the downtown core, including many in the financial district and some government and university areas. . . .

Control the Keys to the Kingdom

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We've said it before and we'll say it again: You will never have a totally secure network. The best you can hope for is that your security strategies will minimize exposure to attack, and if you are hit, the damage can . . .

Are Hackers Accessing Your Company Via Your PBX?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although most companies today have improved security on their data networks, thus cutting down on white-collar crime and hack attacks, too few have paid enough attention to their PBX system. The PBX remains a potentially huge back door problem for data . . .

Heard of Drive-by Hacking? Meet Drive-by Spamming

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

'Warspammers' are taking advantage of unprotected wireless LANs to send out millions of junk emails. The proliferation of insecure corporate wireless networks is fuelling the growth of drive-by spamming, a security expert warned on Thursday. . .

Real Products for Real WLAN Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In At last, real wireless LAN security, we [ZDNet] discussed the new 802.1x/EAP combination that allows you to manage and distribute encryption keys on a user- and session-level basis. Now we'll describe what it takes to actually . . .

Airwave camouflage to stop drive-by hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Software that generates a blizzard of bogus wireless network access points could bamboozle hackers trying to access corporate and home computer networks. This would stop them stealing wireless surfing time and exploring corporate wireless networks, say the two US computer programmers . . .

At last, real wireless LAN security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you're running a wireless LAN on the 802.11 standards, you may think your organization is secure. Think again. Joe User can drive to the local computer store, buy a wireless access point for less than $100, and be free from . . .