Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
Over the last few years "hacker" tools have become much more widespread and available to malicious attackers. Combine this with the ease of getting operating systems - almost anything a corporation has short of a mainframe OS you can download . . .
Judy Estrin thinks it would be easier to battle chonic Internet problems like traffic congestion and virus attacks if the companies working to solve them were free of such pressing concerns as quarterly profits or initial stock offerings. Issues such . . .
When it comes to security in the Internet age, the picture is not too pretty. That was the message Bruce Schneier, founder and chief technology officer of Counterpane Internet Security Inc., gave during a session Monday at NetSec2000 conference, held . . .
To understand the spoofing process, I will begin by explaining the TCP and IP authentication process. Then I will discuss how an attacker can spoof your network.
Here is a nice little that can help you get started in security. "Linux security can be as simple or as advanced as you want. A Linux system can be locked down (relatively speaking) with a simple one-two punch of . . .
Last weekend, a thief armed with nothing more than a fax machine and a piece of paper made off with the whole enterprise. "It appears some forged documents were sent via fax to Network Solutions indicating that the domains should be transferred to someone in Canada," Meckler said.
A SANS Institute of America report has named Linux and Unix operated sites as more vulnerable to internet attacks than Windows and Mac powered sites. Compiled by US industry, government, and academics, the June 1 paper, titled How to Eliminate the Ten Most Critical Internet Security Threats: The Experts' Consensus, names versions of Unix and Linux systems in nine out of a "top ten" list of security vulnerabilities for operating systems that engineers "need to eliminate". Dean Stockwell, director of sales and support, Network Associates Asia-Pacific, dismissed SANS's report as "skewed".
The threats listed in the document are just the "tip on the iceberg," Nowland said, warning network administrators not to feel safe simply because they address the 10 concerns outlined by SANS. NETSEC intends next week to release its . . .
"... With a bit of ingenuity, anyone can skirt basic password authentication and go straight to the goodies on those sites where administrators are foolish enough to post them. If the desired information is contained in a Web page, anyone . . .
"In the race to get online, network security has been something of an afterthought. But even the most obscure agency can be a target for Internet intruders. .. According to records on Web site defacements kept by attrition.org, a hacking . . .
The SANS threat list has become the focus this week. "The majority of successful attacks on computer systems via the Internet can be traced to exploitation of one of a small number of security flaws, SANS said. Most . . .
More on the recent SANS report. ""Many of the vulnerabilities on that list are well-known vulnerabilities that everyone knows about," said Sean Hernan, team leader for vulnerability handling at the Computer Emergency Response Team (CERT) Coordination Center at Carnegie . . .
Here is a pretty serious DoS advisory released on Bugtraq. I am not aware of any fixes, yet. We'll keep you posted! "Allegro-Software-RomPager is an http server which is used in network hardware like switches to provide a . . .
TACACS+ is a protocol used to provide access control for routers and network devices created by Cisco. Solar found a buffer overflow and reported it and supplied a patch in the report below. Cisco later responded to . . .
The latest version of nmap, a utility for port scanning networks, has been released. This tool should be in everyone's security arsenal. "The main addition is IP Protocol scan mode (-sO) which tells you what protocols the host . . .
This article explains the need and rationale for Secure SHell, an encrypted communications channel which functions as a telnet replacement, and also guides you through the process of installing and using SSH on your own system. . . .
When it emerged less than a decade ago, the World Wide Web was quickly embraced as a bright new medium that could help reinvent government and revitalize democracy. But gradually government policy-makers have also seen that the Web has a . . .
If your agency deals in classified or sensitive information, you probably wage an ongoing war against Internet hackers. The danger isn’t so much from hackers’ creativity as much as it’s due to managers’ failures to seal security holes, establish policies . . .
Dug Song has contributed Kerberos v4 (KPOP) and APOP authentication patches for popa3d v0.4. I've mirrored them into popa3d/contrib on the FTP and added links to the popa3d page at the usual location: . . .
"... The proposal, which paves the way to make IPv6 the standard protocol in third-generation mobile multimedia networks, was accepted this week in a plenary session of the system architecture group of the 3GPP (Third-Generation Partnership Project), Nokia said in . . .