Maintaining robust network defenses requires a proactive approach to keep pace with today's rapidly evolving network security threats. One crucial element of an effective network security strategy is penetration testing, or staged attacks in network ...
There is a new worm in the wild that affects unpatched Red Hat 7.0 servers running the lprng printing service. This is one of the vulnerabilities that several previous worms have taken advantage of. The fix is to apply the patch from Red Hat. Part of the threat has already been removed, as the website that the worm downloads itself from has had the worm files removed. . . .
Companies are taking the law into their own hands to beat hackers who cost them millions of pounds each year. They are going on the offensive and adopting hacking tools and techniques themselves, according to a former director of information warfare . . .
Warning Issued Against Fast-Spreading Hacking Worm An information security institute reported a new hacking tool that is spreading quickly between companies and personal computers in Korea. The Korea Information Security Agency (KISA) said yesterday the worm, known as Carko, is similar . . .
The CERT/CC has received reports that a distributed denial-of-service (DDoS) tool named Carko is being installed on compromised hosts. Based on our analysis, Carko is a minor variant of stacheldraht, a widely used DDoS tool. The source code for Carko is . . .
It's widely known that applications like telnet, rsh, and rlogin are vulnerable to attacks that can monitor or "sniff" network traffic and obtain login passwords or other data sent over unencrypted connections. Protocols like SSH have been assumed to be safe . . .
Stolen credit card numbers, hacked federal computer systems and other high-profile online assaults have put many users on their guards and focused the attention of security managers on high-level intrusion-detection systems, chains of firewalls and other high-level defenses. But many forget . . .
The problem is that, unlike a piece of cable that you have to get physical access to in order to connect, it's comparatively easy to get near enough to a wireless access point to get good signal strength. Say, in a . . .
After fifteen minutes, Shipley's black Saturn has crawled through twelve blocks of rush hour traffic, and his jerry-rigged wireless hacking setup has discovered seventeen networks beaconing their location to the world. After an hour, the number is close to eighty. "These companies probably spend thousands of dollars on firewalls," says Shipley. "And they're wide open." . . .
The fundamental problem with security is that it's everyone's problem, which means that no one is actually responsible. When people talk about security today, they tend to focus on the edge of the network, where they deploy firewalls and VPN software . . .
When it comes to hardening your network against hackers, the best defense is to keep abreast of developing threats and apply patches with due diligence IT SEEMS YOU can't open a newspaper or listen to the news these days without learning . . .
Computer industry security experts believe they have discovered a vulnerability in certain high-speed modems manufactured by Alcatel, the French communications equipment giant. Though only theoretical so far, the problem makes the devices potentially vulnerable to malicious hacker attacks.
My graduate professor at Johns Hopkins once told me that software engineering - when compared with civil engineering as a discipline- had progressed no further than the discovery of the right angle. He explained further that there is no silver bullet . . .
This paper provides an introduction to the Lion (1i0n) Worm author and a technical analysis of the Lion Internet Worm. Three unique variations of the Lion Worm have been released on the Internet over the past month. All three versions of . . .
ORBS and MAPS brand spammers with a scarlet S so that networkers know who to ostracize from their mail servers. But is it the best way to stop junk e-mail? This article will look at the spam phenomenon, describe how MAPS and ORBS wage their campaigns against spam, examine their conflicts, and discuss whether their anti-spam tools have a place in the enterprise.. . .
The third Linux worm in less than three months hit the Internet this week. Known as the Adore worm, the program is designed to create so-called back doors in the security of Linux systems and send information identifying the compromised systems . . .
Backers of IPv6 -- a long-anticipated upgrade to the Internet's main communications protocol -- have suffered another setback, as security experts punched holes in their planned strategy for supporting mobile communications. The discovery of security flaws in the proposed Mobile IPv6 . . .
A new technique for disguising programs aimed at cracking corporate networks could raise the stakes in the heated battle between hackers and security experts. During a seminar last week at the CanSecWest conference in Vancouver, British Columbia, a hacker named "K2" . . .
Internet users around the globe are likely to fall victim to a massive cybercriminal attack that will take place by the end of next year, according to a report by Gartner. But the individuals responsible for this worldwide online theft will . . .
Anti-virus software and computer security company Central Command said today that is has identified a virus, known as W32.Winux, that infects both Windows and Linux operating systems. Steven Sundermeier, the company's product manager, said, "...this new proof of concept virus represents . . .
In order to surf the World Wide Web, you need some open TCP/UDP ports on your PC. HTTP Web pages use port 80, SMTP e-mail passes through port 25, and various other assigned TCP/UDP ports exist within a range from 0 . . .