Linux Network Security - Page 69

Discover Network Security News

Experts: Worms will breed in PHP hole

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With a survey estimating that a million Web sites are vulnerable to a set of newly discovered scripting flaws, security experts are predicting that a worm that uses the software bugs to spread could be on the way. As previously reported by CNET News.com, the flaws occur in Web server modules using the Personal Homepage scripting language, more commonly known as PHP.. . .

Network Security with /proc/sys/net/ipv4

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This email address is being protected from spambots. You need JavaScript enabled to view it. submitted a paper he wrote on how to use /proc to tune network security settings. "In additional to firewall rulesets, the /proc filesystem offers some significant enhancements to your network security settings. Unfortunately, most of us are unaware of anything beyond the vague rumors and advice we've heard about this beast. In this article, we'll review some of the basic essentials of the /proc/sys/net/ipv4 filesystem necessary to add to the overall network security of your Linux server. ". . .

'Distributed' Web Projects Raise Security Issues

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The projects' creators describe them as akin to digital ant colonies. They are networks composed of millions of computers working together across the Internet to solve some of the world's most intractable problems: analyzing possible cures for cancer or AIDS, scouting . . .

FBI Says It's Monitoring Web Vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The FBI is monitoring "potential vulnerabilities" in computer networks that could leave portions of the Internet open to disruption by hackers, the agency said on Tuesday. "We're aware of potential vulnerabilities... and to date there have been no confirmed exploitations of . . .

Most SNMP vulns quietly lurking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's been over a week since CERT released a seemingly endless list of devices and software products containing SNMP vulnerabilities discovered by Finnish University of Oulu researchers, and to date very little bad has happened, no doubt to the disappointment of . . .

A walk on the wireless side

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Joe Barr sent in a note about wireless security and things you should know before implementing a network. "The 802.11 wireless standard allows computers near each other to communicate using high bandwidth at an attractive price. Products based on the standard are very popular. Unfortunately, the networks these devices create are not secure. Ride along with our wardriving columnist. ". . .

Researchers Claim to Crack Wi-Fi Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Proponents deny wireless networking spec is vulnerable to hijack, authentication attacks. But, A University of Maryland professor and his graduate student have apparently uncovered serious weaknesses in the next-generation Wireless Fidelity security protocol known as 802.1x. In a paper, "An Initial . . .

The SNMP fiasco: steps you need to take

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Obviously, your quickest and surest fix is going to be disabling SNMP if you don't have to run it. Indeed, disabling unnecessary network services is a normal part of system hygeine, so this is a good opportunity to take the time . . .

Preliminary SNMP Data

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At this point, we do not see a significant increase in SNMP scanning traffic. None of the SNMP sources reported lately scanned more than one target, which usually indicates either a mistake (someone entered the wrong IP into their network admin . . .

CERT: Multiple SNMP Vulnerabilities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Numerous vulnerabilities have been reported in multiple vendors' SNMP implementations. These vulnerabilities may allow unauthorized privileged access, denial-of-service attacks, or cause unstable behavior. If your site uses SNMP in any capacity, the CERT/CC encourages you to read this advisory and follow the advice provided in the Solution section below. . . .

Basic network flaw threatens Net's users

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Software bugs in a fundamental language of the Internet could leave routers, switches and even PCs open to attack, an Internet security watchdog said Tuesday. The problems affect the Simple Network Management Protocol, or SNMP, a basic language used to talk to routers, switches, printers and other managed network devices to allow network engineers to glean status and performance information.. . .

Employee Data Exposed on Web

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A disgruntled former IT employee at telecommunications firm Global Crossing Holdings Ltd. has been posting the names, Social Security numbers and birth dates of company employees on his Web site. The postings have appeared periodically over the past five months. . . .

Beefing Up 802.11b Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A fix for security flaws in the 802.11a and 802.11b wireless networking standards has moved closer to reality with the release of a draft for a specification that addresses the problem. A draft of IEEE's 802.11i spec to beef up . . .

Securing WLANs and LANs End-to-End

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The unprecedented openness of internal systems and networks is one of todays greatest security challenges. Illena Armstrong reviews the complex issues of telecommuting, especially in view of the huge growth in wireless technologies.. . .

Simmering Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We all know that security is inversely proportional to convenience. And, we know from experience that security is secondary to users' ability to get to the information and services they need. Users' apathy and ignorance is the reason why we spend . . .

A Denial-of-Service Tale of Woe

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... it's that darn hacker. He's gotten through my Linux firewall and is going for root on our departmental server. If that system gets hacked, my butt is in a sling. That's where our chairman keeps his research results." The two admins looked at each other. They both knew there was only one thing to do: pull the plug.. . .

Net users warned to beware sites with scripting holes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The failure of major Web sites to fix an old but serious security flaw has prompted the Computer Emergency Response Team to issue a new warning to Internet users: Self-defense may be your only protection against privacy- and security-stealing cross-site script . . .

Hacked ISP shuts down

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Update: Somehow we missed the registration required at silicon.com. TheReg has a better story. Basingstoke-based ISP Cloud Nine has closed its operation this morning after being hit by a crippling security attack. The denial of service attack was so bad the ISP says it will have to rebuild its network.. . .

Tools take on new Linux Trojan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Utilities for detecting and removing a new Trojan horse that targets Linux systems have been posted on the Internet for free download. The tools, created by managed security provider Qualys, battle a new variant of the Remote Shell Trojan, dubbed "RST.b," . . .