The recent release of I2P 2.5.0, an anonymous P2P network that protects against online censorship, surveillance, and monitoring, has brought a slew of improvements and new features that will certainly intrigue security practitioners. This release aim...
Hacker News Network writes, "About a year ago two gentlemen in New Zealand were evaluating Netbus Pro for tech support use, and because of this they were fired by their employer. The employee's own words can be read as well.. . .
America Online Inc. was still investigating an attack by vandals who fooled several company employees to gain access to an undisclosed number of member accounts. So far, however, no clues -- or at least none that the company is ready . . .
Register.com, the second-largest domain name registrar, has acknowledged a security problem that could have allowed people to hijack others' Web sites. The problem allowed unauthorized access to the security software Register.com and its business partners use to manage Internet site information, . . .
America Online confirmed Friday that some of their employee accounts have been compromised by hackers, and that the accounts were used to gain access to and view details of some personal user accounts. A spokesman for AOL, the largest Internet service . . .
Noel writes about some things that a System Administrator should consider about trust when configuring or maintaining a system. "One of the first things many of us think about is the trust we give to the users of our systems. . . .
Some Internet advertising companies are watching every click and drag that computer users make at home or in the office, and the Senate is considering doing something to stop it. Jodie Bernstein, director of the Bureau of Consumer Protection at the . . .
As it turns out, the most recent build of Sub7 contains an undocumented feature which can indeed be used to ping the living hell out of Web servers, from numerous infected clients simultaneously, according to research just completed by security outfit . . .
America Online has confirmed that hackers have illegally compromised an undisclosed number its member accounts by targeting key company employees with an email virus. AOL spokesman Rich D'Amato declined to comment on how many . . .
IT decision makers have come under fire for failing to invest in adequate network security as more companies adopt ecommerce strategies. According to a report by research house Ovum, organisations are increasingly relying on an out-dated approach to security. A . . .
This article discusses the recent NetSec 2000 conference, and provides suggestions as to how the risks from DDoS attacks can be mitigated. "When the attacker decided it was over, it was over," said Alex Wellen, a producer at . . .
In its report E-Business Security: New Directions and Successful Strategies, Ovum argues that the traditional hierarchy of trust adopted by organisations does not fit the ebusiness model, meaning that access channels, such as mobile devices, could pose a major security threat. . . .
This article explains how to secure a Linux gateway. If you do not have a gateway already setup, it suggest that you read this article. The author assumes that you are already familiar with Linux and currently . . .
HACKERS 2000, a seminar organised by the Trade Fair and Conferences International drew a diverse crowd, from college freshers who boasted about their hacking abilities to old software hands and the presentations were equally diverse. If, Bipin Amin, technology consultant, . . .
Over the last few years "hacker" tools have become much more widespread and available to malicious attackers. Combine this with the ease of getting operating systems - almost anything a corporation has short of a mainframe OS you can download . . .
Judy Estrin thinks it would be easier to battle chonic Internet problems like traffic congestion and virus attacks if the companies working to solve them were free of such pressing concerns as quarterly profits or initial stock offerings. Issues such . . .
When it comes to security in the Internet age, the picture is not too pretty. That was the message Bruce Schneier, founder and chief technology officer of Counterpane Internet Security Inc., gave during a session Monday at NetSec2000 conference, held . . .
To understand the spoofing process, I will begin by explaining the TCP and IP authentication process. Then I will discuss how an attacker can spoof your network.
Here is a nice little that can help you get started in security. "Linux security can be as simple or as advanced as you want. A Linux system can be locked down (relatively speaking) with a simple one-two punch of . . .
Last weekend, a thief armed with nothing more than a fax machine and a piece of paper made off with the whole enterprise. "It appears some forged documents were sent via fax to Network Solutions indicating that the domains should be transferred to someone in Canada," Meckler said.
A SANS Institute of America report has named Linux and Unix operated sites as more vulnerable to internet attacks than Windows and Mac powered sites. Compiled by US industry, government, and academics, the June 1 paper, titled How to Eliminate the Ten Most Critical Internet Security Threats: The Experts' Consensus, names versions of Unix and Linux systems in nine out of a "top ten" list of security vulnerabilities for operating systems that engineers "need to eliminate". Dean Stockwell, director of sales and support, Network Associates Asia-Pacific, dismissed SANS's report as "skewed".