Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
One trick favored by hunters since prehistoric times still proves useful in the world of digital networks: bait. Security specialists often construct systems that appear vulnerable to attack, but actually offer no access to valuable data, administrative controls, or other computers. . . .
Attempting to distance itself from a spam controversy, PSINet cut off service to an admitted sender of unsolicited commercial email and pledged to amend its spam policy and educate its sales force. PSINet came under fire from anti-spam organizations after CNET . . .
The only sure way to lock down a PC is to disconnect it from any network and never load a program or a document file that supports macros. That is rather impractical especially when our goal is to . . .
When someone with half a clue decides to attack your system, he or she will first try to identify the operating system. Not every attack proceeds this way: Script kiddies probe huge address spaces looking for any system with a particular port open, which indicates that just maybe that system will be vulnerable. But for the professional penetration tester or hacker, identifying the operating system is an essential step in probing. . . .
Two out of every three websites are open to cyber attacks, said US researcher Gartner. John Pescatore, senior security analyst at Gartner, said website intruders could at the very least change the content and in some cases access information such as customers' credit card details.. . .
What is the feasibility of running national federal elections over the Internet? SunWorld guest writer Avi Rubin focuses on the limitations of the currently deployed infrastructure, with an emphasis on concerns over the security of voting hosts and . . .
The Security Administrator's Integrated Network Tool (SAINT), an updated and enhanced version of SATAN, is designed to assess the security of computer networks. More information about SAINT can be found in the on-line documentation. This version features a new custom scan . . .
The growing electronic war between Israeli and pro-Palestinian hackers threatens to shut down large portions of the Internet, government and industry, experts warned last night. The FBI's National Infrastructure Protection Center, the agency that combats cybercrimes, recently sent out an advisory . . .
A mishap that compromised the integrity of two security keys used by Sun Microsystems is fueling criticism of current methods for scrambling sensitive data and verifying identities on the Web. Sun last week issued a warning that two of its applications' . . .
Bug Watch: Each week vnunet.com asks a different expert from the IT security world to give their views on recent virus and security issues, with advice, warnings and information on the latest threats. This week Jack Clark, European antivirus product manager . . .
Intel's dinky little eMail Station, part of the InBusiness range it inherited from Dayna, turns out to be susceptible to simple denial of service attacks, but the chip behemoth doesn't seem to care a Hell of a lot. The eMail Station . . .
Is security through obscurity ever a useful way to protect your network, or does it just make things easier for corporate spies and hackers? This week in Unix Security, Carole Fennelly investigates who's benefiting from this security tactic. . . .
Gloomy security forecasts, rampant macro viruses, and stagnating denial-of- service attacks haven't stopped E-commerce sites from deploying more services on the Internet. Likewise, there's no sign that these events are stopping wireless developers from deploying all sorts of Web sites and . . .
Consumers with high-speed connections to the Internet, like those provided by DSL and cable modems, are surfing at their own risk unless they take pains to protect their computers, said Frank Prince, an analyst at Forrester Research. Prince said that because . . .
The types of massive distributed denial-of-service (DDOS) attacks that knocked several big e-commerce Web sites out of action earlier this year remain a viable threat that could grow even more sophisticated, according to experts at this week's government-sponsored National Information Systems . . .
Wireless devices are flooding the airwaves with millions of bits of information. Securing those transmissions is the next challenge facing e-commerce. In the not-too-distant future, you won't think twice about using your cell phone or PDA to access Amazon.com, Chase . . .
... PKI isn't a drop-in proposition. Someone's got to design an infrastructure for it, based on both the requirements of the technology and the structure of the organization's existing security systems. Key pairs and digital certificates must be generated, distributed, and . . .
Last week several vulnerabilities with OpenBSD were announced on the full disclosure list Bugtraq. That a hole was found and exploited is not an amazing thing. The amazing and impressive thing is how long OpenBSD had gone without a local root . . .
Fairfax County this week became the nerve center for the federal government's war on Internet crimes that cross international borders, with the opening of the U.S. Customs CyberSmuggling Center. . . .
European experts today welcomed news that US authorities have finally standardised an encryption algorithm, saying that it will help close a security hole in WAP gateways. According to cryptography experts, current encryption techniques leave wireless transactions open to fraud, but the . . .