Linux Network Security

Discover Network Security News

The fight for data integrity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer data errors come in all shapes and sizes. One causes a minor mishap, like a 1-cent difference in the price of a gallon of milk because a scanner misread the bar code. Another triggers an error avalanche, like the glitch . . .

SME's not outsourcing are prone to information security breaches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Small and medium-sized enterprises (SMEs) doing business on the Internet and via e-mail open themselves to breaches of their network security. A recent report by the Gartner Group states that by 2003, 50 percent of SMEs who manage their network security themselves and use the Internet will experience Internet attacks.. . .

Net laws 'still allow snooping'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Changes to the UK Government's "snooping" bill have done little to limit the power it gives police to spy on citizens, say civil liberty campaigners. Last week the Government announced changes to the Regulation of Investigatory Powers bill which it says . . .

NIST moves to implement e-signature technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Institute of Standards and Technology has begun a multi-year effort to move its paper-based practices online and enable the agency to use electronic signatures. Because these processes require employee and administrative signatures, NIST will create a public key . . .

Comment: Securing Web connections

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SSH is an encrypted connection to a remote host running an SSH server. It gives you the ability to log on to a system with an encrypted session so that everything -- your name and password as well as your keystrokes . . .

Why do vendors ship us junk they wouldn’t use?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Why do vendors ship software that they themselves won't use? Most Linux vendors ship the same general packages - Sendmail for SMTP mail services, WuFTPD for FTP, Telnet for remote access and so on. The kicker, though, is that most of . . .

Security Threats from the Gadgets

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Personal Digital Assistants, such as PalmPilots and Pocket PCs, pose a security threat for a number of reasons: they are relatively new; their small size and low cost make them easy to obtain and difficult to control; they have tremendous connectivity . . .

Nanoteq's 10 tips to protect business data

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In South Africa executives are becoming aware of the security issues affecting their company's technology infrastructures. But because security is essentially intangible, many feel they are either over or under protected. The key to well-implemented security is to make sure that it is effective and that it does the job it needs to do. Analysis, not fear, should be what drives decisions.. . .

Understanding a Blackhat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wired News reporter Chris Oakes has interviewed some scientists who observed all kinds of hackers in their natural habitats, and he has a few thoughts about all this cracker/hacker, spy vs. spy business. . . .

The Omega files

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How a Secret Service agent, a data recovery expert and a federal prosecutor team to secure the first ever conviction on federal computer sabotage charges. "Lloyd, a former network administrator at Omega Engineering Corp., thought he had not only destroyed his former employer's manufacturing capabilities, but also had destroyed the evidence that would link him to the crime as well.. . .

How to Protect Your Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ParaProtect, a network security portal in Alexandria, Va., reports that 90% of the security breaches its technicians work on are based on attacks from within. Even more shocking is that upwards of 50% are caused by the company 's own network . . .

Securing dot-com

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article includes information from the recent SANS report, discussion of what can be done about this problems, and more. "Security problems are growing more numerous as knowledge and the number of Internet-connected systems grow. The number of reported security . . .

Net enables global crime sprees

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Criminals have always been ahead when it comes adopting new technologies, but never before has there been anything like the Internet, which means that a few malicious keystrokes in one part of the world can cause huge problems for a corporation . . .

Official wu-ftpd patch for security vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The WU-FTPD Development Group at www.wu-ftpd.org have released the first "official" bugfix patch to fix the lreply bug in wu-ftpd. This patch is for the source code. The patch is relevant to all platforms: Linux, Solaris, SCO, BSD, etc. . . .

Intel admits wireless security concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intel chief exec admits that the future of wireless and mobile technology is overshadowed by security complications. Speaking at Intel's Wireless Competency Centre in Stockholm this week managing director Leif Persson acknowledged hugely complicated wireless environments are causing them . . .

White House admits Net privacy snafu

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The White House on Wednesday endorsed an Internet industry initiative aimed at boosting online privacy just hours before acknowledging that one of its own Web sites may have violated federal privacy policy.. . .

Network security threats growing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks face three vulnerabilities: physical security problems, logical security problems such as computers within a network, and security problems involving people -- all of which should be equally important to businesses, according to a British Telecommunications executive speaking here at InfowarCon Thursday.. . .

Special Report: Privacy on the Internet

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

My favorite trade mag has a new look. Here's a good (albeit, short) article on network security and privacy. "The Internet is a powerful tool that promises its users many exciting possibilities, including unprecedented access to a vast expanse . . .

False sense of cybersecurity a costly problem for U.S.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The absence of a catastrophic cyberattack against the United States has created a false sense of cybersecurity and has allowed costly Cold War-era Pentagon programs to siphon money from critically needed information technology and security programs, a panel of experts warned last week.. . .