Bush and GOP Sites Outage, DDOS Attack Suspected
Web sites for President Bush's campaign and the Republican National Committee suffered outages for several hours on Wednesday. . . .
Web sites for President Bush's campaign and the Republican National Committee suffered outages for several hours on Wednesday. . . .
California state officials revealed Tuesday that in August a hacker broke into a University of California, Berkeley, computer containing a database with the names and Social Security numbers of some 1.4 million Californians. . . .
The goal is a "single, coordinated solution" that enables network administrators to control both Windows installations and Cisco network architecture, the two tech giants said. The companies will also strive to draft and have implemented industry standards for network admissions and access control. . . .
I recently installed a remote home camera security system using wireless Internet cameras and a fine free software application for Linux called ZoneMinder. The cameras are installed at a friend's house, and the application runs at mine. ZoneMinder is powerful, feature-rich, and sophisticated. . . .
"We've had a focus on education because we felt if we could demonstrate to the marketplace that we could sit in the wildest of environments, it would demonstrate true security functionality," said DeepNines President Dan Jackson. . . .
IBM and Cisco Systems have expanded a partnership to provide businesses with automated identity and access security to networks. . . .
Network architect Todd Sanders uses well-known open source tools, like Snort and Nessus, to build secure networks. But Sanders, who works for Centrepetal Solution Strategies LLP, a systems integration and systems security firm in Bowie, Md., is willing to take roads less traveled. . . .
CYBER attackers are launching more sophisticated attacks for financial gain with exploits that are being created easier and faster than ever before, and their single biggest target is e-commerce. . . .
There's no way that Todd Sanders would ever think of building network security and monitoring applications for businesses without using open source tools. Besides being free or inexpensive, open source tools such as Snort, Nessus and F-protect have worked better than proprietary alternatives. . . .
Three years ago, the lead network technician on my campus network spent 95% of his time installing, configuring and tweaking network-attached devices. Today, he spends 95% of his time securing them. . . .
The specter of drive-by computer hackers cruising upscale Scottsdale neighborhoods to cherry-pick wireless Web systems has residents worried about a new method of privacy intrusion and identity theft. Residents of Scottsdale's Stonegate neighborhood filed a police report after their home computers were accessed by so-called "wardrivers," computer hackers who detect unprotected wireless Internet connections. . . .
A pair of vulnerability-assessment and remediation tool vendors are separately upgrading their products so that customers more easily can prioritize which networked systems need to be fixed. . . .
Businesses and government agencies must re-examine the growing threat of cyberterrorism to automated computer systems running power grids, dams and other industrial facilities, security experts said Tuesday. . . .
The Unix operating system has so many descendants and variations that organizations navigating the maze of choices can quickly become disoriented. Many of these projects were launched to offer operating systems unencumbered by the commercial and proprietary licenses tied to the original AT&T UNIX. . . .
Network Physics has introduced NetSensory Enterprise Architecture, a distributed intelligence tool that promises to provide global applications infrastructure visibility, troubleshooting and reporting. . . .
Corey Mandell knew things weren't good when he got the ransom letter. Mandell had experienced such things before, and he knew that Authorize.Net, a Bellevue, Wash., credit card processing company, would be in for a tough time. What he didn't realize until later is that it would be much worse than he had anticipated. . . .
Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. While driving into the office, half-listening to the radio news, you hear your bank's name being announced, immediately followed by the words "hacker", "massive system failure" and "identity theft". . . .
SEPTEMBER 27, 2004 (COMPUTERWORLD) - In an effort to cut costs, my company has decided to migrate from private branch exchanges to IP telephony. By routing calls over our existing IP network and using voice-over-IP links, we can significantly cut our telecommunications costs, especially since we have significant telephone traffic between our U.S. offices and places like Europe and India, as well as other parts of Asia. . . .
Employees are increasingly demanding that enterprises deploy wireless LANs (WLAN). While many companies are acceding to their demands, security issues are the main factor inhibiting even faster uptake of the technology. . . .
The average daily volume of Internet attacks declined in the last six months, according to Symantec Corp.'s Internet Security Threat Report. Released last week, the report is a snapshot of security events derived from monitoring 20,000 security devices. . . .