Linux Network Security - Page 72

Discover Network Security News

Wireless Networks: Open Doors for Bad Guys

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Trouble is, with the rise of WLANs has come a whole new breed of security threats. A key research paper released on July 25 by cryptographers Scott Fluhrer of Cisco Systems and Itsik Mantin and Adi Shamir of Israel's Weizmann Institute . . .

Prioritizing patches: A precipitous pandemonium

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Is the patching of mission critical systems and related software a priority for your business? May I suggest that patching such software become an imperative task incorporated into an IT position ASAP. Recent virus outbreaks and increases in overall attacks have . . .

The First Step of Exploring a System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first step to exploring a system is not just another point and click. It is the part that suprisingly, no one really talks about; gathering information on the subject. In order to successfully get in a system, one must know . . .

NASA uses OpenBSD; overcomes 802.11b security flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The network security group in the NASA Advanced Supercomputing (NAS) Division at Ames Research Center, in California's Silicon Valley uses OpenBSD and other open source software for its wireless firewall gateway implementation. They successfully installed a secure interoperable wireless network addressing . . .

AirSnort: Wireless Networks Beware!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Laptop users, beware: a new program allowing hackers to grab data transmitted through the air could compromise most wireless Internet networks used in airports, hotels, hospitals and colleges. AirSnort, which was released on the Internet last week, exploits flaws in . . .

CERT® Summary CS-2001-03

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Since the last regularly scheduled CERT summary, issued in May 2001 (CS-2001-02), we have seen several self-propagating worms, as well as active exploitation of vulnerabilities in Solaris in.lpd, BSD telnet daemon and Microsoft IIS by intruders. In addition, we have seen . . .

Your data, my friend, are blowing in the wind

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Airports, schools and hotels might want to look closer at the wireless Internet networks they have been installing as a convenience for the must-stay-connected crowd. A new program called AirSnort, released on the Internet this week, lets enterprising hackers easily grab . . .

Wireless LANs face hacking threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IT managers and security experts have expressed alarm at a new hacking tool for accessing supposedly secure wireless local area networks (WLANs), which is freely available on the Internet. The tool, called AirSnort, can recover encryption keys used to protect data . . .

Future IP Security, part I

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anton Chuvakin writes "This article outlines the future of IP addressing (IPv6) and focuses on the security components of next generation IP services (IPsec). We list major components of IPsec and describe their functionality in terms of the security services they . . .

DDoS effort ill-placed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's no secret that the Distributed Denial of Service (DDoS) attack is the biggest security threat to commercial networks since the advent of the virus. In fact, hackers are now using viruses as the data delivered by zombies, further complicating DDoS attacks.. . .

Technology Briefing: Network Management Services

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

These rules, known as policies, sound simple. In practice, they are difficult to define and enforce. Any attempt to establish policies means that some users will disagree, which introduces politics to the equation. Enforcement, especially at the workstation level, is difficult and time consuming, and each policy change requires a reconfiguration of each network device, an expensive process.. . .

Every job requires commitment to network security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It is not enough to realize how many attacks occur, or the types of attacks that are happening. We must develop a defensive mindset that will create an on-going sense of urgency about protecting data and systems. We all have responsibility for information security, regardless of whether we work in information technology.. . .

Wireless LAN vulnerability exposed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A second group of experts has discovered potentially dangerous flaws in the encryption algorithm designed to protect wireless LANs. The announcement, which comes seven months after researchers at the University of California discovered similar weaknesses, warns of a new and more . . .

Your Network's Secret Life, Part 5

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Other than my little excursion into xinetd, I've used this series to show you ways in which you can make some sense of the packets flying around your network, and the tools that can help you do that. I started this article by giving you the dictionary definition for "ethereal". Ethereal also happens to be the name of an excellent network protocol analyzer, a powerful tool that lets you see what is happening on your network right now.. . .

WLANs Cause Widespread Security Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

By the end of 2002, 30 percent of all enterprises will risk security breaches because they've deployed 802.11b wireless local area networks (WLANs) without proper security, research and advisory firm Gartner, Inc. said Thursday. About 50 percent of all enterprises plan . . .

Top 10 Places Your Email Can Be Intercepted

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet has radically changed the way we communicate with each other. Email is obviously an extremely valuable and ubiquitous form of communication, but with this technology comes certain pitfalls that should be understood. The path that an email message takes . . .

Cipher attack delivers heavy blow to WLAN security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report dashes any remaining illusions that 802.11-based (Wi-Fi) wireless local-area networks are in any way secure. The paper, written by three of the world's foremost cryptographers, describes a devastating attack on the RC4 cipher, on which the WLAN wired-equivalent privacy (WEP) encryption scheme is based.. . .

Network Security Policy: Best Practices White Paper

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Without a security policy, the availability of your network can be compromised. The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring . . .