Network Security - Page 80.5

Discover Network Security News

Experts debate merits of open source for Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last month's DoS attacks are a distant memory to the average Web user, but not to the Internet security community. The denial-of-service attacks exposed the vulnerabilities of both open- and closed-source security software, and now experts are debating the merits . . .

Privacy, Security, required Knowhow.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The idea that privacy and security might be symptoms and not the problem emerged from a recent Webmaster focus group discussion with the Office of Personnel Management on defining Webmaster classifications. We worked through the usual issues of . . .

Hacker-controlled tanks, planes and warships?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Army officials are worried that sophisticated hackers and other cybercriminals, including military adversaries, may soon have the ability to hack their way into and take control of major military weapon systems such as tanks and ships. Speaking this month at . . .

Physical Security - Locking doors won't cut it.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The dominion frequently influenced by hackers and their unsavory, computer counterparts is the Internet. With all its related internal and external company networks, email systems, web sites and other online businesses, thieves and vandals have a cornucopia of interesting targets . . .

DoS Attack Shuts Down Brazilian Government Site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Media reports said that a Brazilian government Web site was brought down on Mar. 15 by unknown hackers. The hackers are said to have used denial-of-service techniques to effectively shut down the Web site of the Brazilian telecommunications regulatory agency. . . .

SAINT 2.0 released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest version of SAINT has been released. "SAINT is the Security Administrator's Integrated Network Tool. In its simplest mode, it gathers as much information about remote hosts and networks as possible by examining such network services as finger, . . .

10 Steps to Prevent Internet Sabotage

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"What should a small business do to protect itself against Internet sabotage and possible hacker attacks on its computers? A: The California Society of Certified Public Accountants suggests several ways to protect against e-terrorism, random hackers and computer viruses. . . .

Biometrics -- the end of online fraud?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anne Chen of ZDNet writes..."In any given James Bond movie, 007 will be subject to an iris scan, a hand print scan or voice analysis by technology that secures and verifies his identity. All the cool gadgets, fictional or not,make . . .

Hacker plan: take down the Net

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"... MSNBC has learned that several of Coolio’s associates are cooperating with federal authorities and have named the teen-ager as the culprit in the original attacks. MSNBC has also learned that the FBI executed a search warrant at Coolio’s New . . .

Kerberos Made To Heel To Windows 2000

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"In a move that company detractors said is another sign of its infamous 'Embrace, Extend, Extinguish' strategy, Microsoft has used an open Internet security standard in its Windows 2000 operating system and made modifications without openly documenting its changes." . . .

NSA Defends Eavesdropping Policy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"We want to assure you that the NSA's activities are conducted in accordance with the highest constitutional, legal and ethical standards, and in compliance with statutes and regulations designed to protect the privacy rights of U.S. persons". . . .

FBI Admits Hackers Crippled Its WebSite

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The FBI acknowledged today that electronic vandals shut down its own Internet site for hours last week in the same type of attack that disrupted some of the Web's major commercial sites. The bureau's Web site, www.fbi.gov, remained inaccessible for . . .

Security Experts, Universities Will Fight DoS Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Efforts continued this week to help universities shore up security with stronger password protection and secure communications. Four vendors, led by the SANS Institute, a think tank that specializes in security, next week will announce they are teaming up to . . .

DoS a Crime of the Information Age

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Upside Today writes, "You can almost hear the parchment easing out of the laser printers at Yahoo:Wanted:Dead or AliveMixter, Coolio, Mafiaboyor anyone responsible for the 2/8/00 crippling of the Yahoo network . . .

Web attacks: Are ISPs doing enough?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Robert Lemos writes..."Security experts and Internet users are becoming increasingly vocal about their concerns that high-speed Internet providers are not doing enough to ensure the data security of home users." ...but, someday we will realize that security is everyones . . .