Linux Network Security - Page 89

Discover Network Security News

Government Response to Cyberattacks Slowed by Spoofing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The government's ability to differentiate between cyberattacks waged by hostile foreign nations and those perpetrated by teenage hackers has been severely restricted by the emergence of identity-concealing technologies and a raft of legal and constitutional issues, the director of the . . .

Intel Open Sources Security Architecture

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intel said it plans to announce Tuesday at the RSA Conference in Europe that it is open sourcing its Common Data Security Architecture (CDSA) reference software. Intel Architecture Labs developed CDSA, which provides an open, cross-platform, interoperable software framework . . .

Network access made simple, secure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As part of its multifaceted network security strategy, the Army is studying the ethical and legal implications of replacing personal passwords with devices that can read fingerprints, recognize voices and faces, and capture a host of other personal biometric information. . . .

K-014: HP-UX Aserver Vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This isn't a Linux advisory, but it may be useful for many administrators. " A vulnerability has been identified in Aserver. HP9000 Series 7/800 running HP-UX releases 10.X and 11.X. An exploit to gain Root access has been . . .

Experts debate merits of open source for Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last month's DoS attacks are a distant memory to the average Web user, but not to the Internet security community. The denial-of-service attacks exposed the vulnerabilities of both open- and closed-source security software, and now experts are debating the merits . . .

Privacy, Security, required Knowhow.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The idea that privacy and security might be symptoms and not the problem emerged from a recent Webmaster focus group discussion with the Office of Personnel Management on defining Webmaster classifications. We worked through the usual issues of . . .

Hacker-controlled tanks, planes and warships?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Army officials are worried that sophisticated hackers and other cybercriminals, including military adversaries, may soon have the ability to hack their way into and take control of major military weapon systems such as tanks and ships. Speaking this month at . . .

Physical Security - Locking doors won't cut it.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The dominion frequently influenced by hackers and their unsavory, computer counterparts is the Internet. With all its related internal and external company networks, email systems, web sites and other online businesses, thieves and vandals have a cornucopia of interesting targets . . .

DoS Attack Shuts Down Brazilian Government Site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Media reports said that a Brazilian government Web site was brought down on Mar. 15 by unknown hackers. The hackers are said to have used denial-of-service techniques to effectively shut down the Web site of the Brazilian telecommunications regulatory agency. . . .

SAINT 2.0 released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest version of SAINT has been released. "SAINT is the Security Administrator's Integrated Network Tool. In its simplest mode, it gathers as much information about remote hosts and networks as possible by examining such network services as finger, . . .

10 Steps to Prevent Internet Sabotage

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"What should a small business do to protect itself against Internet sabotage and possible hacker attacks on its computers? A: The California Society of Certified Public Accountants suggests several ways to protect against e-terrorism, random hackers and computer viruses. . . .

Biometrics -- the end of online fraud?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anne Chen of ZDNet writes..."In any given James Bond movie, 007 will be subject to an iris scan, a hand print scan or voice analysis by technology that secures and verifies his identity. All the cool gadgets, fictional or not,make . . .

Hacker plan: take down the Net

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"... MSNBC has learned that several of Coolio’s associates are cooperating with federal authorities and have named the teen-ager as the culprit in the original attacks. MSNBC has also learned that the FBI executed a search warrant at Coolio’s New . . .

Kerberos Made To Heel To Windows 2000

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"In a move that company detractors said is another sign of its infamous 'Embrace, Extend, Extinguish' strategy, Microsoft has used an open Internet security standard in its Windows 2000 operating system and made modifications without openly documenting its changes." . . .

NSA Defends Eavesdropping Policy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"We want to assure you that the NSA's activities are conducted in accordance with the highest constitutional, legal and ethical standards, and in compliance with statutes and regulations designed to protect the privacy rights of U.S. persons". . . .