Network Security - Page 90

Discover Network Security News

Germany Takes Aim at Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

German government is coordinating a task force to try to deal with Internet security threats. "German Interior Secretary Otto Schily is setting up a Task Force to deal with the hacker threat following a spate of recent attacks on . . .

Who's Going to Train the Cyber Security Pros?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nicole St. Pierre writes "Recent breaches of Web-site security are raising concern that the American workforce may not have enough troops to battle cyber snoops. Only about a half-dozen academic institutions in the U.S. have graduate programs that address computer . . .

Denial of Service (DoS) FAQ

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This FAQ covers denial of service attacks (DoS) in great depth, and has links to software that can be used to execute DoS attacks. Reviewing the DoS attack code can be helpful in assisting you in finding evidence of compromised . . .

Clinton: Net attacks no 'Pearl Harbor'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

President Clinton, meeting with computer executives at the White House, said Tuesday that last week's costly Web-site hack attacks raised the alarm for tighter Internet security but were not a "Pearl Harbor." . . .

Hacking comes from the inside, computer expert warns.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As written in IT Fairfax ... "Most computer hacking is carried out from within, the head of the national information security testing body said today. And Australian Information Security Evaluation Program (AISEP) manager Anne Robins said that with increasing computer . . .

New DDOS Attack Tools?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This News.com article points to a paper on PacketStorm written by Mixter, the purported author of the TFN and TFN2K distributed denial of service attack tools. "Three new versions, called Fapi, Shaft and Trank, are disclosed in a paper . . .

CNet Interview with Mixter

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's an interview from News.com with Mixter, author of Tribe Flood Network and TFN2K, programs which may have been used in the recent denial of service attacks on many web sites recently. . . .

Redesigning the Internet: Can it be less vulnerable?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Who's responsibility should security be? Who should make changes? David Hamilton writes ..."This week’s rash of mysterious attacks against Web sites such as Yahoo! Inc. and E*Trade Group Inc. has hammered home one message: The Internet’s architecture needs . . .

Special Report: Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network Magazine is running a few great articles on network security this month. It discusses means to recognize the signs of a serious threat, how to determine whether you should outsource your security needs, and what threat viruses may cause . . .