Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
An OpenSSH-based Secure Shell is now available in the main NetBSD sources. And it will be pulled into the netbsd-1-5 branch, so it will be available in NetBSD 1.5. (ssh-1.2.27 and OpenSSH were already available in the NetBSD packages collection.). . .
First, the proxy server acts as an intermediary, helping users on a private network get information from the Internet when they need it, while ensuring that network security is maintained. Second, a proxy server may store frequently requested information in a . . .
The Internet Control Message Protocol (ICMP) is simple, as Internet protocols go. Originally described in RFC 792 by Jon Postel, ICMP provides a way for IP stacks to send simple messages containing information or errors. ICMP is important for the Internet . . .
Last night, top computer security executives discussed the latest requirements and technologies to provide early warnings of, mitigate the impact of, reduce production outages and system breakdowns from, and promote industry-wide communications regarding Denial of Service attacks through the Internet. The . . .
"Even though you've bought the best security products, some people will break through," he said, dressed in a dark suit, white shirt and tie. "There's no sure-fire way to protect yourself. You have to manage the risk. There's no way you can eliminate it." . . .
With February's massive distributed denial-of-service attacks still fresh in their minds, a group of companies operating some of the best-known Web sites on the planet will call on ISPs, Web hosters and each other to join forces to prevent future attacks.. . .
Computer security experts are taking a bite out of distributed denial of service (DDoS) attacks, but more devastating attacks are on the horizon. That was the message from a consortium of computer security executives who met during NetWorld+Interop Atlanta 2000. In . . .
A coalition of Internet companies formed in the wake of February's devastating denial-of-service attacks will offer a glimpse today of the work they've done to stop a repeat of the assault that brought down key sites across the Web, including those run by giants Amazon.com and Yahoo.. . .
Law-enforcement authorities are troubled by a new kind of software being released Wednesday that sounds like something out of Mission: Impossible. It can make e-mail messages self-destruct in 10 seconds.. . .
Network ICE has released the source code to Altivore, its new e-mail sniffing program. Greg Gilliom, the firm's CEO, told Newsbytes that the software is a potential alternative for Internet service providers (ISPs) which do not want to install Carnivore, the . . .
The computer security industry, governments, patent and regulatory bodies, and consumers have moral and social obligations to work together to tackle the issues that are preventing a streamlined environment for electronic commerce. That's the opinion Fran Rooney, chief executive of Irish . . .
This is a general introduction to VPNs, including information on why they're used, architecture decisions, and more. A Virtual Private Network is a secured network connection between an individual and a private network (client-to-server) or a remote LAN and a private . . .
Every season yields a bumper crop of computer security stories: break-ins, new vulnerabilities, new products. But this season has also given us a crop of stories about computer security philosophy. There has been a resurgence in opposition to the full disclosure . . .
You've got a sound security setup, with firewalls, intrusion detection, authentication and authorization -- the gamut. Still, one day you find that valuable data is missing from a corporate server. You have no idea whether it's in the hands of an external hacker or a malicious insider. Now what do you do? . . .
The SANS Institute revealed Tuesday that the top computer security concerns of 56 federal executives and administrators are: systems being used to attack other agencies' systems; computers being taken off-line for weeks because of hacker-caused corruption; and hackers changing data on . . .
Network ICE is disclosing the source code to a new e-mail sniffing program called "Altivore." This software provides a potential alternative to ISPs who do not want to install the FBI's secretive black-box known as "Carnivore." Altivore will allow ISPs to respond to court ordered e-mail surveillance without FBI help, thus allowing them to be self-regulated instead of government regulated.. . .
There are plenty of options for user authentication, but none is a "one-size-fits-all" solution. With so many available technologies, how do you select the right one for your organization's needs? "Systems architects sometimes get stuck on security planning, because it's hard . . .
Security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers take full control of computers. These "format string" vulnerabilities started surfacing about two months ago, said Elias Levy, a moderator of the Bugtraq . . .
Computer security is difficult to achieve. It requires constant vigilance, and it involves inconvenience. Sometimes, expensive products are offered that are claimed to solve your security problems with no problems, and they do not deliver. However, there are a number of . . .
It could almost be a film script. The Federal Bureau of Investigation (FBI) is attacked by hackers who wreck havoc by flooding its website with false requests and bring it to a standstill. Yet this is what happened earlier this year. . . .