Linux Network Security - Page 49

Discover Network Security News

Free-For-All Access To Wireless LANs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The convenience of wireless access typically comes with a high price tag. But that's changing. Some airports and hotels have begun installing 802.11 Wi-Fi networks and letting travelers use them for free. Pittsburgh International Airport, which recently completed deployment of a free wireless LAN in its food court, is expanding it to all gates. "We are the only airport in the country, and one of two in the world, to offer this as a free service to the traveling public," says Tony Gialloreto, the airport's IT manager. "It's a real asset." . . .

Network security specialists seek seamless defense

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Day and night, the war of attrition rages in the beleaguered world of network security. Defenders throw up firewalls, download patches, and scramble to fend off the hundreds of thousands of attempted intrusions into worldwide enterprise data. . . .

Wi-Fi Alliance Announces a List of WPA Certified Products

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Wi-Fi Alliance announced that over 175 wireless products from more than 40 leading manufacturers received the long awaited Wi-Fi Protected Access (WPA) security certification. The infamous Wired Equivalent Privacy (WEP) was proved to be fundamentally insecure and this finding caused a really negative "marketing" campaign for WLAN adoption. WPA comes to the rescue as a security replacement for WEP. It is recommended that WPA be enabled in wireless LAN applications where data security is a concern, as it has been proven to be a very secure and easily implemented security solution. . . .

Cable modem hackers conquer the co-ax

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A small and diverse band of hobbyists steeped in the obscure languages of embedded systems has released its own custom firmware for a popular brand of cable modem, along with a technique for loading it -- a development that's already made life easier for uncappers and service squatters, and threatens to topple long-held assumptions about the privacy of cable modem communications. The program, called Sigma, was released in its final version last month, and has reportedly been downloaded 350 to 400 times a day ever since. It's designed to be flashed into the non-volatile memory of certain models of Motorola's Surfboard line, where it runs in parallel with the device's normal functionality. It gives users almost complete control of their cable modem -- a privilege previously reserved for the service provider. . . .

.zip files putting the zap on antivirus products

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

E-mail users who were slow to update their antivirus software last week may have been surprised to receive a flood of e-mail messages containing .zip files from long-lost acquaintances, business partners and complete strangers. The e-mail was sent by the recent Mydoom e-mail worm. The zipped attachments were evidence of what antivirus experts say is a new trend in virus-writing circles: using compressed files to hide viruses and elude detection by antivirus engines. . . .

Best Practices for Wireless Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless technology is dramatically changing the world of computing, creating new business opportunities but also increasing security risks. Wireless LANs, which use radio frequencies to broadcast in the unlicensed 2.4GHz frequency band . . .

Mydoom.A: Timeline of an Epidemic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mydoom.A is the fastest spreading malicious code in history, causing the greatest epidemic ever seen. It is now estimated that over half a million computers around the world have been infected, including many thousands of businesses. In fact, 1 in 4 e-mails in circulation -a total of more than 8 million- have been infected by this worm. To help users better understand the situation, Panda Software has published a timeline of the Mydoom.A epidemic since it first appeared. . . .

MyDoom sparks talks of security's future

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The virus, which has combined many old attack techniques into a successful package, was hardly blunted by antivirus programs during the first few hours of its exponential spread. That's a problem, said Shlomo Touboul, CEO of security software maker Finjan Software. "The MyDoom attack should never have propagated so far into the Internet," he said. "It is obvious that we need another layer (of software) to protect during the first hours of attack." . . .

IT Losing Ground in Virus Battle

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After years of success deploying more effective and smarter defenses, anti-virus researchers contacted last week in the wake of the MyDoom outbreak acknowledged for one of the first times that the battle may be getting away from them. The MyDoom virus, which hit Jan. 26 and infected several-hundred-thousand machines, is the fastest-spreading virus in the history of the Internet, experts said. At its peak late last week, MyDoom had infected one in every 12 pieces of e-mail, according to MessageLabs Inc., a New York-based e-mail security company. MyDoom also is the latest in a line of recent viruses that, while not particularly innovative, have been maddeningly effective. . . .

Spam Travels Into Gray Area

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Susan Getgood, SurfControl's vice president of marketing, said the total volume of spam the company is tracking has not changed since the beginning of January. Francois Lavaste, vice president of marketing at e-mail-filtering company Brightmail, said his company's statistics showed similar results and, if anything, a slight increase in spam volume since the beginning of the year. . . .

New worm avoids feds for now

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A likely target appears to be The SCO Group, a provider of Unix software based in Lindon, Utah. SCO has stirred emotions in the Linux community by claiming that important pieces of the open-source operating system are covered by SCO's Unix copyright. The worm is programmed to instruct infected PCs to send a flood of bogus traffic, or a denial-of-service attack, to SCO's Web server Feb. 1 through Feb. 12. The worm can also drop a backdoor program onto a PC, allowing an intruder to take control of the machine, Huger said. . . .

The Soft Underbelly: Attacking the Client

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The deployment and maintenance of these technologies does take time and in some cases specialized knowledge, resulting in higher costs. Whether or not this price is worth paying depends on one factor: how much damage would a serious intrusion into the internal network cost your organization? . . .

SSL to be one of 2004’s Bright Spots

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Adoption of virtual private networks (VPNs) based on the browser-based SSL technology is shaping up to be one of the key trends of 2004, especially as enterprises mobilize their workforces. SSL allows for secure access to corporate networks from virtually any browser and so provides flexibility for roaming workers with laptops or smartphones, as well as simple mechanisms that reduce support costs. . . .

Introduction to OpenVPN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For many systems administrators, choosing and managing a VPN system is often quite a headache. Inflexible clients, servers, and protocols often prevent VPN's from being smoothly integrated into an already functioning network. The fact that many VPN clients are installed on users' home computers, well out of the reach of the systems administration team, often means that troubleshooting and upgrading VPN systems is time consuming and a struggle for both admins and users. . . .

Book Review: Designing Network Security - 2nd Edition

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a very good book. It provides a good foundation of basic universal security practice and then goes into detail on how to implement network security using Cisco hardware and software. No single aspect is covered in exceptional depth- the book is meant to give a little information on the whole range of security rather than mastering any one area of network security. . . .

An IT Manager’s Insight into Mobile Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nothing can be guaranteed, but by following these rules, you can show that you have taken adequate steps to protect your organisations information and hopefully rest at night, safe in the knowledge that when thousands of mobile devices get lost or stolen this year, yours won't be the one hitting the papers with embarrassing and expensive consequences. . . .

Wireless Security Basics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've just bought a wireless router so you can use your laptop all over the house. You get it all setup and surprise, surprise it works. Now that should be the end of it right? Wrong. The default setup for wireless networks is setup to get the network up and running but does nothing to protect your network. . . .