The recent release of I2P 2.5.0, an anonymous P2P network that protects against online censorship, surveillance, and monitoring, has brought a slew of improvements and new features that will certainly intrigue security practitioners. This release aim...
Last month's DoS attacks are a distant memory to the average Web user, but not to the Internet security community. The denial-of-service attacks exposed the vulnerabilities of both open- and closed-source security software, and now experts are debating the merits . . .
"The idea that privacy and security might be symptoms and not the problem emerged from a recent Webmaster focus group discussion with the Office of Personnel Management on defining Webmaster classifications. We worked through the usual issues of . . .
Army officials are worried that sophisticated hackers and other cybercriminals, including military adversaries, may soon have the ability to hack their way into and take control of major military weapon systems such as tanks and ships. Speaking this month at . . .
"The dominion frequently influenced by hackers and their unsavory, computer counterparts is the Internet. With all its related internal and external company networks, email systems, web sites and other online businesses, thieves and vandals have a cornucopia of interesting targets . . .
Media reports said that a Brazilian government Web site was brought down on Mar. 15 by unknown hackers. The hackers are said to have used denial-of-service techniques to effectively shut down the Web site of the Brazilian telecommunications regulatory agency. . . .
The latest version of SAINT has been released. "SAINT is the Security Administrator's Integrated Network Tool. In its simplest mode, it gathers as much information about remote hosts and networks as possible by examining such network services as finger, . . .
"What should a small business do to protect itself against Internet sabotage and possible hacker attacks on its computers? A: The California Society of Certified Public Accountants suggests several ways to protect against e-terrorism, random hackers and computer viruses. . . .
A consortium of key Internet businesses has formed an industry task force aimed at spreading the gospel of e-business security -- particularly to medium-sized, Web-based companies -- in the wake of the recent denial of service attacks. . . .
In a ruling on Tuesday, a county Superior Court judge dealt a blow to Washington State consumers, as well as to the state's tough anti-spamming law, when he ruled that regulation of e-mail by the state was unconstitutional. . . .
Terry Dawson, co-author of the Linux Network Administrator's Guide, takes a "Linux-focused look at denial of service attacks and what we can do as responsible Internet citizens to assist in preventing them." [Found on LinuxToday] . . .
Anne Chen of ZDNet writes..."In any given James Bond movie, 007 will be subject to an iris scan, a hand print scan or voice analysis by technology that secures and verifies his identity. All the cool gadgets, fictional or not,make . . .
"... MSNBC has learned that several of Coolio’s associates are cooperating with federal authorities and have named the teen-ager as the culprit in the original attacks. MSNBC has also learned that the FBI executed a search warrant at Coolio’s New . . .
Gene Kim talks about the recent DDoS attacks, some insight as to what the next attack is likely to be like, and what needs to be done to prevent it from occuring. . . .
"In a move that company detractors said is another sign of its infamous 'Embrace, Extend, Extinguish' strategy, Microsoft has used an open Internet security standard in its Windows 2000 operating system and made modifications without openly documenting its changes." . . .
"We want to assure you that the NSA's activities are conducted in accordance with the highest constitutional, legal and ethical standards, and in compliance with statutes and regulations designed to protect the privacy rights of U.S. persons". . . .
"The FBI acknowledged today that electronic vandals shut down its own Internet site for hours last week in the same type of attack that disrupted some of the Web's major commercial sites. The bureau's Web site, www.fbi.gov, remained inaccessible for . . .
Efforts continued this week to help universities shore up security with stronger password protection and secure communications. Four vendors, led by the SANS Institute, a think tank that specializes in security, next week will announce they are teaming up to . . .
Upside Today writes, "You can almost hear the parchment easing out of the laser printers at Yahoo:Wanted:Dead or AliveMixter, Coolio, Mafiaboyor anyone responsible for the 2/8/00 crippling of the Yahoo network . . .
Robert Lemos writes..."Security experts and Internet users are becoming increasingly vocal about their concerns that high-speed Internet providers are not doing enough to ensure the data security of home users." ...but, someday we will realize that security is everyones . . .