Linux Network Security - Page 49

Discover Network Security News

Cable modem hackers conquer the co-ax

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A small and diverse band of hobbyists steeped in the obscure languages of embedded systems has released its own custom firmware for a popular brand of cable modem, along with a technique for loading it -- a development that's already made life easier for uncappers and service squatters, and threatens to topple long-held assumptions about the privacy of cable modem communications. The program, called Sigma, was released in its final version last month, and has reportedly been downloaded 350 to 400 times a day ever since. It's designed to be flashed into the non-volatile memory of certain models of Motorola's Surfboard line, where it runs in parallel with the device's normal functionality. It gives users almost complete control of their cable modem -- a privilege previously reserved for the service provider. . . .

.zip files putting the zap on antivirus products

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

E-mail users who were slow to update their antivirus software last week may have been surprised to receive a flood of e-mail messages containing .zip files from long-lost acquaintances, business partners and complete strangers. The e-mail was sent by the recent Mydoom e-mail worm. The zipped attachments were evidence of what antivirus experts say is a new trend in virus-writing circles: using compressed files to hide viruses and elude detection by antivirus engines. . . .

Best Practices for Wireless Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless technology is dramatically changing the world of computing, creating new business opportunities but also increasing security risks. Wireless LANs, which use radio frequencies to broadcast in the unlicensed 2.4GHz frequency band . . .

Mydoom.A: Timeline of an Epidemic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mydoom.A is the fastest spreading malicious code in history, causing the greatest epidemic ever seen. It is now estimated that over half a million computers around the world have been infected, including many thousands of businesses. In fact, 1 in 4 e-mails in circulation -a total of more than 8 million- have been infected by this worm. To help users better understand the situation, Panda Software has published a timeline of the Mydoom.A epidemic since it first appeared. . . .

MyDoom sparks talks of security's future

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The virus, which has combined many old attack techniques into a successful package, was hardly blunted by antivirus programs during the first few hours of its exponential spread. That's a problem, said Shlomo Touboul, CEO of security software maker Finjan Software. "The MyDoom attack should never have propagated so far into the Internet," he said. "It is obvious that we need another layer (of software) to protect during the first hours of attack." . . .

IT Losing Ground in Virus Battle

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After years of success deploying more effective and smarter defenses, anti-virus researchers contacted last week in the wake of the MyDoom outbreak acknowledged for one of the first times that the battle may be getting away from them. The MyDoom virus, which hit Jan. 26 and infected several-hundred-thousand machines, is the fastest-spreading virus in the history of the Internet, experts said. At its peak late last week, MyDoom had infected one in every 12 pieces of e-mail, according to MessageLabs Inc., a New York-based e-mail security company. MyDoom also is the latest in a line of recent viruses that, while not particularly innovative, have been maddeningly effective. . . .

Spam Travels Into Gray Area

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Susan Getgood, SurfControl's vice president of marketing, said the total volume of spam the company is tracking has not changed since the beginning of January. Francois Lavaste, vice president of marketing at e-mail-filtering company Brightmail, said his company's statistics showed similar results and, if anything, a slight increase in spam volume since the beginning of the year. . . .

New worm avoids feds for now

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A likely target appears to be The SCO Group, a provider of Unix software based in Lindon, Utah. SCO has stirred emotions in the Linux community by claiming that important pieces of the open-source operating system are covered by SCO's Unix copyright. The worm is programmed to instruct infected PCs to send a flood of bogus traffic, or a denial-of-service attack, to SCO's Web server Feb. 1 through Feb. 12. The worm can also drop a backdoor program onto a PC, allowing an intruder to take control of the machine, Huger said. . . .

The Soft Underbelly: Attacking the Client

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The deployment and maintenance of these technologies does take time and in some cases specialized knowledge, resulting in higher costs. Whether or not this price is worth paying depends on one factor: how much damage would a serious intrusion into the internal network cost your organization? . . .

SSL to be one of 2004’s Bright Spots

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Adoption of virtual private networks (VPNs) based on the browser-based SSL technology is shaping up to be one of the key trends of 2004, especially as enterprises mobilize their workforces. SSL allows for secure access to corporate networks from virtually any browser and so provides flexibility for roaming workers with laptops or smartphones, as well as simple mechanisms that reduce support costs. . . .

Introduction to OpenVPN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For many systems administrators, choosing and managing a VPN system is often quite a headache. Inflexible clients, servers, and protocols often prevent VPN's from being smoothly integrated into an already functioning network. The fact that many VPN clients are installed on users' home computers, well out of the reach of the systems administration team, often means that troubleshooting and upgrading VPN systems is time consuming and a struggle for both admins and users. . . .

Book Review: Designing Network Security - 2nd Edition

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a very good book. It provides a good foundation of basic universal security practice and then goes into detail on how to implement network security using Cisco hardware and software. No single aspect is covered in exceptional depth- the book is meant to give a little information on the whole range of security rather than mastering any one area of network security. . . .

An IT Manager’s Insight into Mobile Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nothing can be guaranteed, but by following these rules, you can show that you have taken adequate steps to protect your organisations information and hopefully rest at night, safe in the knowledge that when thousands of mobile devices get lost or stolen this year, yours won't be the one hitting the papers with embarrassing and expensive consequences. . . .

Wireless Security Basics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've just bought a wireless router so you can use your laptop all over the house. You get it all setup and surprise, surprise it works. Now that should be the end of it right? Wrong. The default setup for wireless networks is setup to get the network up and running but does nothing to protect your network. . . .

Gartner Forecasts Greater Potential For Cyberattacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Dependence on the Internet for voice communications and data distribution will increase the likelihood of cyberwarfare, a high-tech research firm said Thursday. Much like the nuclear threat during the Cold War in the last century, cyberwarfare is a potential catastrophe that the U.S. and other nations must be prepared to combat, Gartner Inc. said. Given the rate of adoption of Internet-based technology, nations will have the ability to conduct cyberwarfare by 2005. . . .

Open Up a Can of Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal law intended to curb the scourge of junk e-mail appears to have had little effect so far in discouraging spammers from deluging inboxes. In the two weeks since the Can-Spam Act, a U.S. law barring unscrupulous bulk e-mailing practices, took effect this year, providers of spam-filtering software say they're blocking more messages than ever. Spammers, they say, are either ignoring the law or pretending to comply with guidelines for legitimate e-mail marketing. . . .

The Biometrics Myth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article proposes a viable alternative to biometrics for those who need very strong authentication. At the same time, it points to certain very important security gotchas in the biometrics model, if used alone. However, other than price, it is not clear how the alternative is much better when used alone. Is the author intentionally confusing first sign-in authentication with token/ticket authentication, even though the two are complementary and usually used in tandem? You decide! . . .