Linux Network Security - Page 41

Discover Network Security News

IP Telephony Changes Security Equation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SEPTEMBER 27, 2004 (COMPUTERWORLD) - In an effort to cut costs, my company has decided to migrate from private branch exchanges to IP telephony. By routing calls over our existing IP network and using voice-over-IP links, we can significantly cut our telecommunications costs, especially since we have significant telephone traffic between our U.S. offices and places like Europe and India, as well as other parts of Asia. . . .

WLAN Security Still A Stumbling Block

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Employees are increasingly demanding that enterprises deploy wireless LANs (WLAN). While many companies are acceding to their demands, security issues are the main factor inhibiting even faster uptake of the technology. . . .

'Net Attacks Down, Bot Networks Up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The average daily volume of Internet attacks declined in the last six months, according to Symantec Corp.'s Internet Security Threat Report. Released last week, the report is a snapshot of security events derived from monitoring 20,000 security devices. . . .

When Bot Nets Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to a semi-annual report released by Symantec this week, these bot nets, are growing at an incredible rate. Last year, Symantec saw about 2,000 machines per day recruited into these bot armies. In its new report, that figure had grown to 30,000 per day. An unprotected machine will typically be attacked within 20 minutes of being put on the Internet, according to Weafer. "The fastest we've seen was a machine taken over six seconds after it was connected to the Web," he says. . . .

Insiders Weigh Law Banning Wireless Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In less than a month, it will be illegal to send commercial messages to any Internet domain associated with wireless messaging subscription services.The ban is the result of rules adopted by the Federal . . .

Bot networks on the rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks of computers that are exploited by spammers and hackers to forward junk e-mail and viruses without the knowledge of the PC user, known as bot networks, are on the increase, according to anti-virus firm Symantec. . . .

Hot Spot Problem Gets Hotter ...

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SEPTEMBER 20, 2004 (COMPUTERWORLD) - ... with a compact, 6 oz. 802.11b Wi-Fi device that can turn a simple dial-up line into an online access point for an 11Mbit/sec. Ethernet wireless network. The WiFlyer from Houston-based start-up Always On Wireless Inc. will up the ante in ease of Internet access when it ships in mid-October. The $149 device creates an instant wireless LAN that connects up to 14 PC or Macintosh users. . . .

Bugwatch: Managing network security risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Each week vnunet.com asks a different expert to give their views on recent security issues, with advice, warnings and information on the latest threats.This week Jukka Sieppi, director of product management . . .

Quantum leap in encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's a hacker's nightmare but a dream for bankers and spies: A computer network so secure that even the simplest attempts to eavesdrop will interrupt the flow of data and alert administrators to the snooping . . .

Extreme Wi-Fi

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Take that wireless hot spot in the local java joint, jack it up on steroids and use it to connect an entire city full of computers. That, in short, is WiMax, a cutting-edge wireless technology that's starting to prove its worth as a fast, cheap and easy networking option for businesses. . . .

German hacker finds open Wi-Fi networks in Manila

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

DRIVING through the central business district of Makati all the way to Malate in Manila, a German whitehat hacker discovered that only 15 of the 66 wireless access points or wireless local area networks located in these two areas were "encrypted." . . .

VoIP spam--it's coming

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

COMMENTARY--Voice over Internet Protocol (VoIP) looks to be the next big deal, a business disrupter that could change everything in the telecoms world. The first service offerings have been launched and customer . . .

The Cisco kid defends the network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The two predominant themes in the responses I received on my Blended Threat column two weeks back were rage and resolve.Many of you were tired of dealing with spam, viruses, malware, and even legitimate but persistent and annoying advertisements. . . .