Linux Network Security - Page 39

Discover Network Security News

Oracle moves to quarterly patch cycle

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Oracle yesterday announced plans to adopt a quarterly security patch cycle. The enterprise software giant says that adopting a fixed delivery schedule will make it easier for customers to plan updates and thereby help them reduce costs. . . .

How To Steal Wi-Fi

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When I moved into a new neighborhood last week, I expected the usual hassles. Then I found out I'd have to wait more than a month for a DSL line. I started convulsing. If I don't have Net access for even one day, I can't do my job. So, what was I supposed to do? There's an Internet café on the next block, but they close early. I had no choice--it was time to start sneaking on to my neighbors' home networks. . . .

Network vulnerability assessment management

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A vulnerability rated as a low risk this morning could turn into your worst nightmare tonight. To meet the ever-increasing speed with which exploits are written and propagated, traditional network-based vulnerability scanners have morphed into more full-scale vulnerability management products. . . .

Wireless LANs Gain Popularity Despite Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Corporations often need more wide area network (WAN) bandwidth but are deterred by its high cost and slow speed. Pricing for these lines runs from hundreds to thousands of dollars per month, and typically the links deliver 1.5 mbps (megabits per second) of throughput. . . .

Cisco fixes 'decoy attack' in security software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco has discovered a security flaw in its Cisco Security Agent software (CSA. This could be exploited by attackers to circumvent the security provided by the host-based intrusion prevention product. The network giant has issued a patch to fix the vulnerability. . . .

Single Sign-On Moves Forward

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Authentication developers are preparing new systems that offer enhanced data security but reduce the burden strict access controls traditionally place on users. . . .

Competitors Join Forces to Improve Web Application Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Four rivals in the application security market joined forces to help define more consistent and reliable best practices for Web application security. The partnership, announced Monday at the Computer Security Institute's 31st annual security conference and exhibition in Washington, includes F5 Networks, Imperva, NetContinuum and Teros. . . .

Prevention Methods Shore Up Wireless LAN Defenses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security developers took more than a decade to move from intrusion detection to intrusion prevention in the world of wired networking. But in the fast-paced wireless space, vendors are already jumping on prevention as the first step in security. . . .

Wireless Eyes Watching Airport Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With fears of terrorism still in the air, vendors at this week's International Security Conference touted new surveillance technologies being used in transportation and logistics to pinpoint suspicious packages, peer inside transport vehicles and positively identify people even through darkness and fog. . . .

Ex-Student Indicted on Hacking Charges

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal grand jury has indicted a former University of Texas student on charges he hacked into the university system and stole Social Security numbers and other personal information from more than 37,000 students, faculty and staff. . . .

Security Software Not Enough, Spending on Support to Rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IDC's projections of the rise in spending on security services reflect the growing need that businesses have to forge relationships with security professionals. "At the mid-market level, a lot of companies don't have a dedicated person handling security," says IDC analyst Christine Tenneson. . . .

Network-Based Security Grows

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As enterprises scramble for security specialists to help lock down their networks, managed security services providers are developing increasingly sophisticated tools that take the burden off IT staffs entirely. . . .