Linux Network Security - Page 75

Discover Network Security News

Analysis of lpdw0rm Affecting Red Hat 7 Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There is a new worm in the wild that affects unpatched Red Hat 7.0 servers running the lprng printing service. This is one of the vulnerabilities that several previous worms have taken advantage of. The fix is to apply the patch from Red Hat. Part of the threat has already been removed, as the website that the worm downloads itself from has had the worm files removed. . . .

Companies hit by hackers fight back

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies are taking the law into their own hands to beat hackers who cost them millions of pounds each year. They are going on the offensive and adopting hacking tools and techniques themselves, according to a former director of information warfare . . .

Warning Issued Against Fast-Spreading Hacking Worm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Warning Issued Against Fast-Spreading Hacking Worm An information security institute reported a new hacking tool that is spreading quickly between companies and personal computers in Korea. The Korea Information Security Agency (KISA) said yesterday the worm, known as Carko, is similar . . .

"Carko" Distributed Denial-of-Service Tool

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CERT/CC has received reports that a distributed denial-of-service (DDoS) tool named Carko is being installed on compromised hosts. Based on our analysis, Carko is a minor variant of stacheldraht, a widely used DDoS tool. The source code for Carko is . . .

Passive Analysis of SSH Traffic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's widely known that applications like telnet, rsh, and rlogin are vulnerable to attacks that can monitor or "sniff" network traffic and obtain login passwords or other data sent over unencrypted connections. Protocols like SSH have been assumed to be safe . . .

IP Insecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Stolen credit card numbers, hacked federal computer systems and other high-profile online assaults have put many users on their guards and focused the attention of security managers on high-level intrusion-detection systems, chains of firewalls and other high-level defenses. But many forget . . .

802.11 and swiss cheese

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The problem is that, unlike a piece of cable that you have to get physical access to in order to connect, it's comparatively easy to get near enough to a wireless access point to get good signal strength. Say, in a . . .

War driving by the Bay

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After fifteen minutes, Shipley's black Saturn has crawled through twelve blocks of rush hour traffic, and his jerry-rigged wireless hacking setup has discovered seventeen networks beaconing their location to the world. After an hour, the number is close to eighty. "These companies probably spend thousands of dollars on firewalls," says Shipley. "And they're wide open." . . .

Security cracks require pre-emptive spackling

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When it comes to hardening your network against hackers, the best defense is to keep abreast of developing threats and apply patches with due diligence IT SEEMS YOU can't open a newspaper or listen to the news these days without learning . . .

Security flaw found in Alcatel DSL modems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer industry security experts believe they have discovered a vulnerability in certain high-speed modems manufactured by Alcatel, the French communications equipment giant. Though only theoretical so far, the problem makes the devices potentially vulnerable to malicious hacker attacks.

Lion Internet Worm Analysis

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This paper provides an introduction to the Lion (1i0n) Worm author and a technical analysis of the Lion Internet Worm. Three unique variations of the Lion Worm have been released on the Internet over the past month. All three versions of . . .

The Spam-Haters Club

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ORBS and MAPS brand spammers with a scarlet S so that networkers know who to ostracize from their mail servers. But is it the best way to stop junk e-mail? This article will look at the spam phenomenon, describe how MAPS and ORBS wage their campaigns against spam, examine their conflicts, and discuss whether their anti-spam tools have a place in the enterprise.. . .

"Adore" worm squirms in Linux systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The third Linux worm in less than three months hit the Internet this week. Known as the Adore worm, the program is designed to create so-called back doors in the security of Linux systems and send information identifying the compromised systems . . .

Mobile security flaw delivers yet another blow to IPv6

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Backers of IPv6 -- a long-anticipated upgrade to the Internet's main communications protocol -- have suffered another setback, as security experts punched holes in their planned strategy for supporting mobile communications. The discovery of security flaws in the proposed Mobile IPv6 . . .

Cloaked code sneaks by corporate security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new technique for disguising programs aimed at cracking corporate networks could raise the stakes in the heated battle between hackers and security experts. During a seminar last week at the CanSecWest conference in Vancouver, British Columbia, a hacker named "K2" . . .

Internet users to be hit by massive attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet users around the globe are likely to fall victim to a massive cybercriminal attack that will take place by the end of next year, according to a report by Gartner. But the individuals responsible for this worldwide online theft will . . .

Virus Infects Both Windows, Linux Systems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anti-virus software and computer security company Central Command said today that is has identified a virus, known as W32.Winux, that infects both Windows and Linux operating systems. Steven Sundermeier, the company's product manager, said, "...this new proof of concept virus represents . . .