Linux Network Security - Page 82

Discover Network Security News

Industry retaliates against DoS attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last night, top computer security executives discussed the latest requirements and technologies to provide early warnings of, mitigate the impact of, reduce production outages and system breakdowns from, and promote industry-wide communications regarding Denial of Service attacks through the Internet. The . . .

Mitnick Talks Corporate Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Even though you've bought the best security products, some people will break through," he said, dressed in a dark suit, white shirt and tie. "There's no sure-fire way to protect yourself. You have to manage the risk. There's no way you can eliminate it." . . .

Web sites unite to fight denial-of-service war

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With February's massive distributed denial-of-service attacks still fresh in their minds, a group of companies operating some of the best-known Web sites on the planet will call on ISPs, Web hosters and each other to join forces to prevent future attacks.. . .

Devastating DDoS Attacks Loom

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer security experts are taking a bite out of distributed denial of service (DDoS) attacks, but more devastating attacks are on the horizon. That was the message from a consortium of computer security executives who met during NetWorld+Interop Atlanta 2000. In . . .

Internet giants confer on denial-of-service attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A coalition of Internet companies formed in the wake of February's devastating denial-of-service attacks will offer a glimpse today of the work they've done to stop a repeat of the assault that brought down key sites across the Web, including those run by giants Amazon.com and Yahoo.. . .

New software 'shreds' e-mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Law-enforcement authorities are troubled by a new kind of software being released Wednesday that sounds like something out of Mission: Impossible. It can make e-mail messages self-destruct in 10 seconds.. . .

Network ICE Intros Open Source Carnivore Alternative

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network ICE has released the source code to Altivore, its new e-mail sniffing program. Greg Gilliom, the firm's CEO, told Newsbytes that the software is a potential alternative for Internet service providers (ISPs) which do not want to install Carnivore, the . . .

Why E-Security Is Hard to Tame

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The computer security industry, governments, patent and regulatory bodies, and consumers have moral and social obligations to work together to tackle the issues that are preventing a streamlined environment for electronic commerce. That's the opinion Fran Rooney, chief executive of Irish . . .

Virtual Private Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a general introduction to VPNs, including information on why they're used, architecture decisions, and more. A Virtual Private Network is a secured network connection between an individual and a private network (client-to-server) or a remote LAN and a private . . .

Reflections on the Future of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Every season yields a bumper crop of computer security stories: break-ins, new vulnerabilities, new products. But this season has also given us a crop of stories about computer security philosophy. There has been a resurgence in opposition to the full disclosure . . .

When security fails: Forensics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've got a sound security setup, with firewalls, intrusion detection, authentication and authorization -- the gamut. Still, one day you find that valuable data is missing from a corporate server. You have no idea whether it's in the hands of an external hacker or a malicious insider. Now what do you do? . . .

Fed Execs Rank Top Security Computer Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The SANS Institute revealed Tuesday that the top computer security concerns of 56 federal executives and administrators are: systems being used to attack other agencies' systems; computers being taken off-line for weeks because of hacker-caused corruption; and hackers changing data on . . .

Network ICE Releases Open-source Carnivore

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network ICE is disclosing the source code to a new e-mail sniffing program called "Altivore." This software provides a potential alternative to ISPs who do not want to install the FBI's secretive black-box known as "Carnivore." Altivore will allow ISPs to respond to court ordered e-mail surveillance without FBI help, thus allowing them to be self-regulated instead of government regulated.. . .

Authentication: Patterns of Trust

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are plenty of options for user authentication, but none is a "one-size-fits-all" solution. With so many available technologies, how do you select the right one for your organization's needs? "Systems architects sometimes get stuck on security planning, because it's hard . . .

Inexpensive measures to solve security problems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer security is difficult to achieve. It requires constant vigilance, and it involves inconvenience. Sometimes, expensive products are offered that are claimed to solve your security problems with no problems, and they do not deliver. However, there are a number of . . .

Investors call for action to curb hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It could almost be a film script. The Federal Bureau of Investigation (FBI) is attacked by hackers who wreck havoc by flooding its website with false requests and bring it to a standstill. Yet this is what happened earlier this year. . . .

The Making of E-Commerce: 10 Key Moments, Part II

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is part two that discusses many of the most significant events in e-commerce history. Read Part One first. "From the first electronic business transactions to heartstopping e-tail sales figures, e-commerce burst onto the scene in dramatic . . .