Network Security

Discover Network Security News

Spring cleaning tips for managers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If your agency deals in classified or sensitive information, you probably wage an ongoing war against Internet hackers. The danger isn’t so much from hackers’ creativity as much as it’s due to managers’ failures to seal security holes, establish policies . . .

Can IPv6 replace SSL?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Reto Haeni has written this paper that gives a brief overview of the features of IPv6 and discuss its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available . . .

Secure Web-2-WAP File Transfers now Possible

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Accessing the Web using WAP (Wireless Application Protocol)-enabled mobile phones may be all the rage, but what about the security issues? While it is possible to encrypt selected sections of the Web using a desktop PC with conventional browser and . . .

Warning: Wireless Traffic Jams Loom

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The spectrum used by the LANs' signals is expected to become crowded so quickly that companies could find themselves replacing all of their wireless equipment in just two to three years, as wireless technology is forced to move to less . . .

Always-on Internet Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The two best things about those fast Internet connections you get from cable, DSL, and ISDN are that you don't have to dial a number to connect to the Internet, and they are also easy to share over a network. . . .

Intrusion Detection on Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article focuses on several host-based intrusion detection systems that are available on Linux. In particular, I will cover some of the basics of installing setting up these packages, how they are useful, and in what circumstances they can be . . .

Slashdot struck by denial-of-service attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Slashdot.org, the "news for nerds" Web site popular among Linux fans, fell victim to a series of hacker attacks for three days last week. The site was taken down intermittently by a series of distributed denial-of-service (DDoS) attacks Thursday, . . .

Kerberos Loophole May Close Around Microsoft's Neck

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The implications of Microsoft's propreitary "extensions" to Kerberos could be pretty far-reaching. "As a legal wrangle develops over whether the Linux/open-source news Web site Slashdot.org can post messages containing what Microsoft calls a "trade secret," key members of the . . .

Updated CERT Advisory on Kerberos Vulnerabilities

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Computer Emergency Response Team has updated their advisory on the recent Kerberos buffer overflow vulnerabilities. Most vendors have updated their packages already to fix this vulnerability. "The most severe vulnerability allows remote intruders to gain root privileges . . .

Kerberos In The Legal Limelight

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article discusses the recent turmoil over the Slashdot postings regarding Kerberos, and the modifications that Microsoft has made to the Kerberos security protocol. "On Thursday, lawyers for Andover.Net, the parent company of the Linux enthusiast site Slashdot, posted . . .

Ex-CIA Chief: Beware Spy-Viruses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Former CIA director R. James Woolsey, speaking on a panel here Wednesday, warned that international spies and terrorists would soon wield a more purposeful and dangerous breed of computer virus than ever seen before. Unlike Melissa, CIH or the recent . . .

Information on Slashdot DDoS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

During Thursday and Saturday of last week, the slashdot.org site experienced a Distributed Denial of Service attack. The follow article recounts what happened. "What follows is more-or-less Pat "BSD-Pat" Lynch's account of the DDoS... Pat is our super 31337 . . .

Security Scanners for Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This paper discusses the differnt types of security scanners available for Linux. "A scanner is a program that automatically detects security weaknesses in a remote or localhost.". Scanners are important to Internet security because they reveal weaknesses in the . . .

New DDoS tools developed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

More information on the "mstream" DDoS attack tool. "A new distributed denial-of-service (DDoS) tool found recently in computers at several universities may be able to avoid defenses put up by Web sites after a rash of DDoS attacks in February . . .

Slashdot gets trashed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although some readers credited the shutdown to an ironic reverse "slashdot effect" caused by the crush of a linking news article, Wired News reporter Declan McCullagh quoted sources at the website blaming a distributed denial of service attack for the . . .

Call it Slash-and-Burn.org

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Slashdot has fallen victim of a distributed denial of service attack. "Thursday just wasn't a good day for geek-culture destination Slashdot. First came the news that Microsoft ordered Slashdot to delete discussions of one of the company's security products. . . .

Mazu Networks Aims To Stop Hackers’ Net Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mazu Networks, a start-up that was a runner-up in the prestigious Massachusetts Institute of Technology entrepreneurship competition, aims to put an end to the hacker attacks that resulted in highly publicized outages earlier this year for Internet high-flyers Yahoo Inc. . . .