Linux Network Security - Page 41

Discover Network Security News

When Bot Nets Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to a semi-annual report released by Symantec this week, these bot nets, are growing at an incredible rate. Last year, Symantec saw about 2,000 machines per day recruited into these bot armies. In its new report, that figure had grown to 30,000 per day. An unprotected machine will typically be attacked within 20 minutes of being put on the Internet, according to Weafer. "The fastest we've seen was a machine taken over six seconds after it was connected to the Web," he says. . . .

Insiders Weigh Law Banning Wireless Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In less than a month, it will be illegal to send commercial messages to any Internet domain associated with wireless messaging subscription services.The ban is the result of rules adopted by the Federal . . .

Bot networks on the rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks of computers that are exploited by spammers and hackers to forward junk e-mail and viruses without the knowledge of the PC user, known as bot networks, are on the increase, according to anti-virus firm Symantec. . . .

Hot Spot Problem Gets Hotter ...

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SEPTEMBER 20, 2004 (COMPUTERWORLD) - ... with a compact, 6 oz. 802.11b Wi-Fi device that can turn a simple dial-up line into an online access point for an 11Mbit/sec. Ethernet wireless network. The WiFlyer from Houston-based start-up Always On Wireless Inc. will up the ante in ease of Internet access when it ships in mid-October. The $149 device creates an instant wireless LAN that connects up to 14 PC or Macintosh users. . . .

Bugwatch: Managing network security risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Each week vnunet.com asks a different expert to give their views on recent security issues, with advice, warnings and information on the latest threats.This week Jukka Sieppi, director of product management . . .

Quantum leap in encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's a hacker's nightmare but a dream for bankers and spies: A computer network so secure that even the simplest attempts to eavesdrop will interrupt the flow of data and alert administrators to the snooping . . .

Extreme Wi-Fi

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Take that wireless hot spot in the local java joint, jack it up on steroids and use it to connect an entire city full of computers. That, in short, is WiMax, a cutting-edge wireless technology that's starting to prove its worth as a fast, cheap and easy networking option for businesses. . . .

German hacker finds open Wi-Fi networks in Manila

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

DRIVING through the central business district of Makati all the way to Malate in Manila, a German whitehat hacker discovered that only 15 of the 66 wireless access points or wireless local area networks located in these two areas were "encrypted." . . .

VoIP spam--it's coming

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

COMMENTARY--Voice over Internet Protocol (VoIP) looks to be the next big deal, a business disrupter that could change everything in the telecoms world. The first service offerings have been launched and customer . . .

The Cisco kid defends the network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The two predominant themes in the responses I received on my Blended Threat column two weeks back were rage and resolve.Many of you were tired of dealing with spam, viruses, malware, and even legitimate but persistent and annoying advertisements. . . .

Perimeter security is changing fast

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep "bad" things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user. . . .

Boingo Bolsters Hotspot Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Boingo Wireless said Wednesday that it has added 802.1x and WPA security support to its network of hotspots.Specifically, the hotspot vendor said it has released new end user client software that incorporates support for 802.1x and WPA security measures. . . .