Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
Trouble is, with the rise of WLANs has come a whole new breed of security threats. A key research paper released on July 25 by cryptographers Scott Fluhrer of Cisco Systems and Itsik Mantin and Adi Shamir of Israel's Weizmann Institute . . .
Is the patching of mission critical systems and related software a priority for your business? May I suggest that patching such software become an imperative task incorporated into an IT position ASAP. Recent virus outbreaks and increases in overall attacks have . . .
The first step to exploring a system is not just another point and click. It is the part that suprisingly, no one really talks about; gathering information on the subject. In order to successfully get in a system, one must know . . .
The network security group in the NASA Advanced Supercomputing (NAS) Division at Ames Research Center, in California's Silicon Valley uses OpenBSD and other open source software for its wireless firewall gateway implementation. They successfully installed a secure interoperable wireless network addressing . . .
Laptop users, beware: a new program allowing hackers to grab data transmitted through the air could compromise most wireless Internet networks used in airports, hotels, hospitals and colleges. AirSnort, which was released on the Internet last week, exploits flaws in . . .
Since the last regularly scheduled CERT summary, issued in May 2001 (CS-2001-02), we have seen several self-propagating worms, as well as active exploitation of vulnerabilities in Solaris in.lpd, BSD telnet daemon and Microsoft IIS by intruders. In addition, we have seen . . .
Airports, schools and hotels might want to look closer at the wireless Internet networks they have been installing as a convenience for the must-stay-connected crowd. A new program called AirSnort, released on the Internet this week, lets enterprising hackers easily grab . . .
IT managers and security experts have expressed alarm at a new hacking tool for accessing supposedly secure wireless local area networks (WLANs), which is freely available on the Internet. The tool, called AirSnort, can recover encryption keys used to protect data . . .
Anton Chuvakin writes "This article outlines the future of IP addressing (IPv6) and focuses on the security components of next generation IP services (IPsec). We list major components of IPsec and describe their functionality in terms of the security services they . . .
It's no secret that the Distributed Denial of Service (DDoS) attack is the biggest security threat to commercial networks since the advent of the virus. In fact, hackers are now using viruses as the data delivered by zombies, further complicating DDoS attacks.. . .
These rules, known as policies, sound simple. In practice, they are difficult to define and enforce. Any attempt to establish policies means that some users will disagree, which introduces politics to the equation. Enforcement, especially at the workstation level, is difficult and time consuming, and each policy change requires a reconfiguration of each network device, an expensive process.. . .
It is not enough to realize how many attacks occur, or the types of attacks that are happening. We must develop a defensive mindset that will create an on-going sense of urgency about protecting data and systems. We all have responsibility for information security, regardless of whether we work in information technology.. . .
A second group of experts has discovered potentially dangerous flaws in the encryption algorithm designed to protect wireless LANs. The announcement, which comes seven months after researchers at the University of California discovered similar weaknesses, warns of a new and more . . .
Other than my little excursion into xinetd, I've used this series to show you ways in which you can make some sense of the packets flying around your network, and the tools that can help you do that. I started this article by giving you the dictionary definition for "ethereal". Ethereal also happens to be the name of an excellent network protocol analyzer, a powerful tool that lets you see what is happening on your network right now.. . .
By the end of 2002, 30 percent of all enterprises will risk security breaches because they've deployed 802.11b wireless local area networks (WLANs) without proper security, research and advisory firm Gartner, Inc. said Thursday. About 50 percent of all enterprises plan . . .
We all know that two-thirds of corporate hacks come from inside the firewall, making internal security as important as external. But what about your remote offices and SOHO workers? Are they as vulnerable to attacks as your corporate workers?. . .
The Internet has radically changed the way we communicate with each other. Email is obviously an extremely valuable and ubiquitous form of communication, but with this technology comes certain pitfalls that should be understood. The path that an email message takes . . .
A new report dashes any remaining illusions that 802.11-based (Wi-Fi) wireless local-area networks are in any way secure. The paper, written by three of the world's foremost cryptographers, describes a devastating attack on the RC4 cipher, on which the WLAN wired-equivalent privacy (WEP) encryption scheme is based.. . .
Without a security policy, the availability of your network can be compromised. The policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring . . .
While the initial version of the worm did little more harm to compromised servers than deface their Web sites, Maiffret said he's among those who fear the impact of an renewed outbreak on Internet traffic could be greater the second time . . .