Network Security - Page 85

Discover Network Security News

Employees Sue Employer For Firing Over NetBus

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hacker News Network writes, "About a year ago two gentlemen in New Zealand were evaluating Netbus Pro for tech support use, and because of this they were fired by their employer. The employee's own words can be read as well.. . .

AOL: No clues on security breach

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

America Online Inc. was still investigating an attack by vandals who fooled several company employees to gain access to an undisclosed number of member accounts. So far, however, no clues -- or at least none that the company is ready . . .

Register.com scrambles to close security hole

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Register.com, the second-largest domain name registrar, has acknowledged a security problem that could have allowed people to hijack others' Web sites. The problem allowed unauthorized access to the security software Register.com and its business partners use to manage Internet site information, . . .

AOL Customer Accounts Hacked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

America Online confirmed Friday that some of their employee accounts have been compromised by hackers, and that the accounts were used to gain access to and view details of some personal user accounts. A spokesman for AOL, the largest Internet service . . .

Trust and the System Administrator

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Noel writes about some things that a System Administrator should consider about trust when configuring or maintaining a system. "One of the first things many of us think about is the trust we give to the users of our systems. . . .

Privacy — Making it Click

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Some Internet advertising companies are watching every click and drag that computer users make at home or in the office, and the Senate is considering doing something to stop it. Jodie Bernstein, director of the Bureau of Consumer Protection at the . . .

Sub7 vid Trojan can launch distributed attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As it turns out, the most recent build of Sub7 contains an undocumented feature which can indeed be used to ping the living hell out of Web servers, from numerous infected clients simultaneously, according to research just completed by security outfit . . .

AOL security breach exposes personal info

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

America Online has confirmed that hackers have illegally compromised an undisclosed number its member accounts by targeting key company employees with an email virus. AOL spokesman Rich D'Amato declined to comment on how many . . .

IT Directors Under Fire for Poor Security Policies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IT decision makers have come under fire for failing to invest in adequate network security as more companies adopt ecommerce strategies. According to a report by research house Ovum, organisations are increasingly relying on an out-dated approach to security. A . . .

Old security models inadequate for ebusiness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In its report E-Business Security: New Directions and Successful Strategies, Ovum argues that the traditional hierarchy of trust adopted by organisations does not fit the ebusiness model, meaning that access channels, such as mobile devices, could pose a major security threat. . . .

Building a Secure Gateway System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article explains how to secure a Linux gateway. If you do not have a gateway already setup, it suggest that you read this article. The author assumes that you are already familiar with Linux and currently . . .

Hackers 2000 calls for Net security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

HACKERS 2000, a seminar organised by the Trade Fair and Conferences International drew a diverse crowd, from college freshers who boasted about their hacking abilities to old software hands and the presentations were equally diverse. If, Bipin Amin, technology consultant, . . .

The Death of Unencrypted Connections?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Over the last few years "hacker" tools have become much more widespread and available to malicious attackers. Combine this with the ease of getting operating systems - almost anything a corporation has short of a mainframe OS you can download . . .

Estrin Startup to Address Infrastructure Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Judy Estrin thinks it would be easier to battle chonic Internet problems like traffic congestion and virus attacks if the companies working to solve them were free of such pressing concerns as quarterly profits or initial stock offerings. Issues such . . .

Bleak Picture For Internet Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When it comes to security in the Internet age, the picture is not too pretty. That was the message Bruce Schneier, founder and chief technology officer of Counterpane Internet Security Inc., gave during a session Monday at NetSec2000 conference, held . . .

Linux 101: Basic network security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is a nice little that can help you get started in security. "Linux security can be as simple or as advanced as you want. A Linux system can be locked down (relatively speaking) with a simple one-two punch of . . .

NSI's Webjacking Epidemic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last weekend, a thief armed with nothing more than a fax machine and a piece of paper made off with the whole enterprise. "It appears some forged documents were sent via fax to Network Solutions indicating that the domains should be transferred to someone in Canada," Meckler said.

Is Linux a net security risk?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A SANS Institute of America report has named Linux and Unix operated sites as more vulnerable to internet attacks than Windows and Mac powered sites. Compiled by US industry, government, and academics, the June 1 paper, titled How to Eliminate the Ten Most Critical Internet Security Threats: The Experts' Consensus, names versions of Unix and Linux systems in nine out of a "top ten" list of security vulnerabilities for operating systems that engineers "need to eliminate". Dean Stockwell, director of sales and support, Network Associates Asia-Pacific, dismissed SANS's report as "skewed".