Linux Network Security - Page 43

Discover Network Security News

Wi-Fi hacking, a primer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wi-Foo: The Secrets of Wireless Hacking is a new technical tome about the security (and insecurity) if 802.11 standards. Written by three security consultants with a history roaming the occult worlds of encyrption and hackery, the book is not for dabblers or those who blush at the site of a UNIX prompt. It's literally a step-by-step guide to penetrating wireless networks, from assembling a war-driving apparatus to targeting VPNs. . . .

VPNs – Blessing Or Curse?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

VPNs have recently moved on to become second generation technology. From having one or two VPNs, companies are now looking to install large numbers. These numbers are likely to grow steadily and in a few years' time, organisations may potentially have thousands of VPNs. This proliferation brings undoubted benefits, but also some very major challenges for IT department. . . .

OpenVPN 101: introduction to OpenVPN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document will introduce OpenVPN as a free, secure and easy to use and configure SSLbased VPN solution. The document will present some simple (and verified) scenario's that might be useful for preparing security/networking labs with students, for creating a remote access solution or as a new project for the interested home user. . . .

Security's disorderly mess

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

About five years ago, you couldn't pick up a trade magazine or speak to an IT professional without tripping across the subject of consolidation. Whether you were talking server, storage or data center--or any other realm of IT, for that matter--it seemed as if consolidation was on everyone's lips. And why not? All of these functional technology categories had morphed into distributed operational nightmares. Before long, there was an urgent need to clean up the mess. . . .

Automated Penetration Testing - False Sense of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The security industry has matured quickly over the past few years with penetration testing becoming one of the norms for organisations adopting best-practice processes. Loosely defined as the process of actively assessing an organisations security measures and completely reliant on consultancy services, security manufacturers have been eager to bridge the gap between product and service and more importantly to reap the benefits of additional profits. Not surprisingly, we have seen the emergence of the automated penetration test with a number of providers springing up to fill the sector. . . .

Security Cavities Ail Bluetooth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Serious flaws discovered in Bluetooth technology used in mobile phones can let an attacker remotely download contact information from victims' address books, read their calendar appointments or peruse text messages on their phones to conduct corporate espionage. . . .

Security expert Q&A: The virus writers are winning

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mikko Hypponen has made a name for himself as a computer security expert in directing anti-virus research at Finland's F-Secure, a $45 million company that regularly issues alerts warning of network threats. He spoke recently with Network World News Editor Bob Brown and Features Editor Neal Weinberg about the latest viruses and what enterprise network executives are up against. . . .

VPNs (Virtual Private Nightmares)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a question: What's the number 1 vector for security outbreaks today? Given the title of the article we hope you answered Virtual Private Networks (VPNs). Today's convenient world of mobile access to critical applications and information has come with a hefty burden for the world's already overburdened security teams. . . .

Authentication and Authorization for Webapps

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is something that no application can afford to ignore, and it is a particularly large challenge for web applications. A web application deployed on the Internet is subject to potential attack from anywhere, whereas an application contained on an internal intranet has at least fewer locations from which it is vulnerable to attack (usually). The HTTP protocol, which most web applications rely on, was not intended as a secure or session-oriented protocol at all. . . .

Wireless access security scheme gets tryout

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Paul Wouter of Xelerence Corp. of Canada, is a fan of IPsec. The company maintains and develops Opswan, the Linux IPsec implementation, and he thinks IPsec should be the default tool for wireless connections. Wouter used the Black Hat Briefings this week to test a prototype IPsec wireless authentication scheme called WaveSEC for Windows clients. . . .

SSH Clients for Pocket PC

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless-enabled devices, the latest electronic marvels, are steadily becoming integral part of enterprise infrastructure due the tremendous benefits and advantages they bring. Compact, with fast Internet connection they provide a vast range of services but unfortunately there is a cost - generally speaking, wireless-enabled devices are far less secure than their wired counterparts . . .

An eye opener on open source Internet security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Secrets project looked at the open source toolkit for implementing the Secure Sockets Layer (SSL) provided by OpenSSL, and at the Free Secure Wide Area Network (FreeS/WAN) provided by IPSec over the Linux operating system. The results of both evaluations were mixed, highlighting the complications facing businesses and governments as they seek more cost-effective and efficient ways to ensure Internet security by turning to open source software instead of commercial systems. . . .

Internet Extortion Ring Smashed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An extortion and money-laundering ring targeting UK sports-betting Web sites has been smashed by UK and Russian law enforcement agencies, assisted by government agencies and businesses from the U.S., Canada, Australia and Estonia. Three men were arrested in Russia on July 20th, accused of running a global protection racket and extracting hundreds of thousands of dollars from online sports-betting sites. . . .

Best Practices For Securing Your WLAN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The steady growth of Wi-Fi in the enterprise demands that corporate IT teams learn and adopt new security methodologies tailored to the unique requirements and weaknesses of wireless networks. In this paper, we will address each of these areas in detail and identify the real-world best practices needed to deploy and maintain a secure wireless network. . . .

The Changing Threat Landscape

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The period of time between the announcement of a vulnerability and the release of an associated exploit continues to shrink, making it increasingly likely that we will see a so-called "zero-day" threat. A zero-day blended threat (i.e., one that uses multiple methods and techniques to spread) could target a vulnerability before that vulnerability is announced and a patch made available. . . .

A faster, stronger, redundant Olympic network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Atos is using VLANs both to simplify troubleshooting and to limit damage if anyone manages to break into the network. There are separate VLANs for the commentator information system, information diffusion applications, and the game management system. Technical services, directories, management and monitoring, and the on-venue results system each have their own VLANs too, sometimes several per venue for the same function. . . .

SSH2, Part 1: Securing Your Telnet Session

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most of the utilities we use to log into servers these days like Telnet, FTP, and Email, send the login and password text unencrypted. Anyone who can intercept your network traffic will learn your logins. And if you login as root, your system will be owned. Its bad enough if youre on a wired network, as anyone who has worked next to Kevin Rose will attest, but the risk is multiplied 1000 fold on a wireless network. And idiot can capture Wi-Fi traffic, even if WEP encryption is turned on. The only truly secure way to use Wi-Fi is to encrypt the traffic end to end using a good scheme like VPN or SSH! . . .

Online Crime, Compliance Issues, Worker Mobility, SOA, and Open Source Are Mega-Trends for IT Securi

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Burton Group forecasts the most influential IT enterprise security trends in a recently published report: "VantagePoint 2004-2005 Information Security and Identity Management Trends." In the report, senior vice president and research director, Dan Blum reviews a number of mega-trends -- including an increase in online crime, compliance issues, worker mobility, service-oriented architecture (SOA) and open source technologies. . . .

Securing the Mobile Real-Time Enterprise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mobile technologies have ushered in sweeping productivity gains at enterprises across the globe. In many cases, they have been central to the creation of the so-called "real-time enterprise." These same technologies, however, have also increased enterprises' exposure to security risks that are frequently underestimated or misunderstood. How significant is the problem? According to the U.S. Census Bureau, within three years, 40 per cent of all workers will perform a significant part of their job outside of the office. . . .