Off the Wire

Off The Wire Archive

News items for September 2003

Compliance demands drive security spending
Companies are investing in IT security to satisfy legal requirements, rather than to counter potential threats, according to a new study. [more]
Tuesday, 30 September 2003, 3:52 PM CET


Biometrics may be too pricey, complex for data center
Gaining access to data centers in the not-too-distant future may be as easy as slipping your hand into a fingerprint reader or palm reader, or flashing your eye in a retina scanner. [more]
Tuesday, 30 September 2003, 3:51 PM CET


Spying e-card conceals Trojan
Those with a jealous temperament are being targeted by a company selling spyware installed via seemingly innocuous e-cards, though experts are questioning legality of the service. [more]
Tuesday, 30 September 2003, 3:47 PM CET


The subpoenas are coming!
Citing a provision of the Patriot Act, the FBI is sending letters to journalists telling them to secretly prepare to turn over their notes, e-mails and sources to the bureau. Should we throw out the First Amendment to nail a hacker? [more]
Tuesday, 30 September 2003, 3:31 PM CET


Blind SQL injection: are you vulnerable?
SQL Injection can deliver total control of your server to an attacker giving them the ability to read, write and manipulate all data stored in your backend systems. [more]
Tuesday, 30 September 2003, 3:28 PM CET


VeriSign's redirect page leaking data
VeriSign's sitefinder service, the page on its website to which all mistyped .com and .net queries are now routed by the registrar, is leaking information to marketing analysis firm Omniture, according to Richard M. Smith, an independent security researcher. [more]
Tuesday, 30 September 2003, 3:21 PM CET


Linux fights off worms
Red Hat's Linux modified to cut scope for worm atttacks. [more]
Tuesday, 30 September 2003, 3:19 PM CET


RFID ripples through software industry
Big name vendors including Sun, SAP, Oracle, and IBM have caught the RFID (Radio Frequency Identification) buzz. [more]
Tuesday, 30 September 2003, 3:15 PM CET


Exploiting Cisco routers (part one)
This is the first of a three-part series that will focus on identifying and then exploiting vulnerabilities and poor configurations in Cisco routers. [more]
Tuesday, 30 September 2003, 3:13 PM CET


Spam: this time it's personal
Spam ruined his domain, bringing on a hail of bounced e-mail and nasty messages. Dissatisfied with his ISP's response, Andy Markley launched his own investigation and bagged a spammer. [more]
Tuesday, 30 September 2003, 3:12 PM CET


Governments must take a share of security burden
The IT industry cannot guarantee internet security. Market forces are not enough to safeguard the global communications infrastructure, according to Scott Charney, chief security strategist at Microsoft and head of its Trustworthy Computing initiative. [more]
Tuesday, 30 September 2003, 3:07 PM CET


Review - Linux Security Cookbook
If you work with Linux you certainly know of many resources where you can get your questions answered when running into a problem. When it comes to securing your Linux box, there's a myriad of things you have to think about and this is where this cookbook comes into the picture. The authors aim to provide you with quick recipes for various issues. Read on to find out if this beats searching for information in the usual places. [more]
Monday, 29 September 2003, 1:25 PM CET


HNS Newsletter issue 181 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 29 September 2003, 9:39 AM CET


Feds nab second suspect in worm attacks
The U.S. Department of Justice announced on Friday that a juvenile had been arrested in connection with the release of a computer worm that spread in the same way as the MSBlast worm. [more]
Monday, 29 September 2003, 9:38 AM CET


Firewall may be excessive protection for dial-up users
We have a dial-up Internet connection and wanted to set up the firewall in Windows XP. Do we need a firewall if we only con nect with the Internet by dial-up? [more]
Monday, 29 September 2003, 9:37 AM CET


China sets up Windows-checking lab
The lab to study the Microsoft Windows operating system source code was set up last week in Beijing, China. [more]
Monday, 29 September 2003, 9:35 AM CET


Personal wireless security device, GPS and iMode
TRAXER, a pocket size device for personal security based on Fastrax GPS technology combined with a dual-band GSM/GPRS modem. [more]
Monday, 29 September 2003, 9:34 AM CET


LPI certification 102 (release 2) exam prep, part 3: networking
In this tutorial, we'll introduce you to TCP/IP and Ethernet Linux networking fundamentals, share important tips for securing your Linux systems, and more. [more]
Monday, 29 September 2003, 9:21 AM CET


Fighting spam with Qmail
In this article the author explains how you can fight spam by making your qmail server filter your messages through spamassassin. [more]
Monday, 29 September 2003, 9:17 AM CET


To fix software flaws, Microsoft invites attack
Microsoft's Security Response Center is the computing equivalent of a hospital emergency ward. [more]
Monday, 29 September 2003, 9:13 AM CET


Share the love, not the viruses
Secure your broadband internet connection, or your machine could have consequences on other internet users, warns Simon Moores. [more]
Monday, 29 September 2003, 9:10 AM CET


Sobig linked to DDoS attacks on anti-spam sites
A senior anti-spam activist is calling on law enforcement authorities to track down the perpetrators behind a widespread and sustained attack on anti-spam sites. [more]
Monday, 29 September 2003, 9:08 AM CET


Browser holes lead to AIM, dial-up attacks
Security holes in Microsoft's Internet Explorer browser have been exploited by hackers to hijack AOL instant messaging accounts and force unsuspecting Web surfers to run up massive phone bills, computer experts have cautioned. [more]
Monday, 29 September 2003, 9:05 AM CET


Intrusion prevention and detection
Organizations know they must protect themselves from the mysterious enemy that is a ‘hacker’ and viruses such as LoveLetter, but often there is a misguided belief that these external threats are the main risks to businesses. [more]
Friday, 26 September 2003, 11:17 AM CET


Exploiting the MSRPC Heap Overflow – Part I
This little documentary chronicles the last moments of another beautiful moth, stuck somewhere between the two live electrical cords of security and freedom. In particular, this is my look at how to exploit the latest Microsoft RPCSS bug. [more]
Friday, 26 September 2003, 8:58 AM CET


Simplify for security
It's been a bad month. We've learned of critical loopholes in recent versions of Windows and in even more versions of Microsoft Word. [more]
Friday, 26 September 2003, 8:46 AM CET


Car shoppers' credit details exposed in bulk
At least 1,000 automobile shoppers who submitted online credit applications to any of 150 different automotive dealerships around the U.S. had their personal and financial details exposed on a publicly-accessible website. [more]
Friday, 26 September 2003, 8:37 AM CET


AtStake fires executive over Microsoft criticism
The chief technology officer for a technology firm that works closely with Microsoft Corp. lost his job after he helped write a study critical of the insecurity of Microsoft software. [more]
Friday, 26 September 2003, 8:33 AM CET


Who writes viruses?
This year's deluge of worms may be the prelude to something more sinister. [more]
Friday, 26 September 2003, 8:32 AM CET


Bugtraq admin says submissions not being delayed
Fears that postings to the Bugtraq security mailing list, which is owned by Symantec, are being deliberately delayed, have been dismissed by the list administrator, Dave Mirza Ahmad. [more]
Friday, 26 September 2003, 8:31 AM CET


Smart cards track commuters
Civil rights campaigners have expressed concerns about the new smart travelcards introduced for London commuters. [more]
Friday, 26 September 2003, 8:29 AM CET


Woman sentenced for internet bank theft
It used to be that bosses had to worry about who had the combination to the office safe. Now, it's who has the password to the internet banking account - as businessman John Bruderlin found after thousands of dollars disappeared. [more]
Friday, 26 September 2003, 8:28 AM CET


Exploring RSA encryption in OpenSSL
Using OpenSSL to explore some of the details of how RSA encryption works. [more]
Friday, 26 September 2003, 8:23 AM CET


War drive of Atlanta, Chicago and San Francisco
More than half of all access points still do not encrypt their traffic and 9 percent of all access points were determined to be unauthorized "rogues," according to a recent study of wireless LANs in the business districts of these cities.
[more]
Friday, 26 September 2003, 12:51 AM CET


Freeing the shackles with secure remote working
Calum Macleod, European Director of Netilla Networks, highlights how the organisations are changing the way they work with secure remote access. [more]
Thursday, 25 September 2003, 5:54 PM CET


Incessant hacking exposed
Unprotected websites are attacked an average of 2,000 times a week, a new study has revealed. [more]
Thursday, 25 September 2003, 10:56 AM CET


Putting a stop to database piracy
The latest battle in the war against database piracy took place on Capitol Hill on Tuesday, as the Coalition Against Database Piracy testified before a joint House Judiciary and Energy and Commerce Subcommittee hearing on draft legislation to protect against database thievery. [more]
Thursday, 25 September 2003, 10:55 AM CET


AMD-hosted WLAN used to infect security hack's PC
AMD would like you to know that its mobile Athlon 64 goes very nicely with 802.11 wireless networking. [more]
Thursday, 25 September 2003, 10:46 AM CET


EBay thief reveals tricks of the trade
‘Kenneth’ and friends claim $2 million stolen from Net users. [more]
Thursday, 25 September 2003, 10:43 AM CET


Uecomm's AU network hit by attackers
Australian customers of broadband data services provider Uecomm were frustrated by two hours of intermittent service today, as malicious hackers flooded the network with spurious traffic. [more]
Thursday, 25 September 2003, 10:24 AM CET


Virus hits Federal Visa-checking system
A computer virus disrupted systems at the State Department for checking every visa applicant for terrorist or criminal history, leaving the U.S. government unable to issue visas for roughly nine hours. [more]
Thursday, 25 September 2003, 10:17 AM CET


Intrusion detection terminology (part two)
This terminology article starts with an explanation of the many different types of IDSs that exist today. [more]
Thursday, 25 September 2003, 10:16 AM CET


Security problems could destroy Microsoft
Mitch Wagner shares his thoughts on security problems that keep affecting Windows. [more]
Thursday, 25 September 2003, 10:14 AM CET


RIAA goes after the wrong gal
The music biz withdraws a lawsuit against a 66-year-old sculptor who claims never to have even downloaded file-trading software. Some say similar cases may emerge, given the difficulties of tying IP addresses to particular individuals. [more]
Thursday, 25 September 2003, 10:13 AM CET


Police hunt down owner of fake banking Web site
Police said Thursday that they were trying to track down the owner of an allegedly fraudulent Web site offering offshore banking services and using a name similar to a Hong Kong bank's former subsidiary. [more]
Thursday, 25 September 2003, 10:09 AM CET


Know Your Enemy: Sebek2 - A kernel based data capture tool
Sebek is a piece of code the lives entirely in kernel space and records either some or all data accessed by users on the system. This paper is a detailed discussion of Sebek, how it works and its value. [more]
Wednesday, 24 September 2003, 3:38 PM CET


Spam slayer: spotting the good guys
Spam filters are getting smarter and more thorough, but work remains. [more]
Wednesday, 24 September 2003, 9:46 AM CET


Test your data recovery plan
Too many companies think they have disaster recovery measures in place, when in reality no one really knows whether they will work or how to implement them. [more]
Wednesday, 24 September 2003, 9:43 AM CET


Want to sue over buggy code?
Forget it. Microsoft and other software makers shield themselves with the "End User Agreement." What if no one agreed? [more]
Wednesday, 24 September 2003, 9:43 AM CET


Fit best practice with your security software
Companies are increasingly considering their security as world events cast doubt on their ability to deal with natural disaster, human error or malicious attack. [more]
Wednesday, 24 September 2003, 9:42 AM CET


Oracle, U.S. Energy Dept boost software security
The U.S. Department of Energy said that Oracle Corp. will provide its database software with preconfigured secure settings, a move that could greatly decrease the agency's vulnerability to Internet-based attacks. [more]
Wednesday, 24 September 2003, 9:38 AM CET


Cyber threat
Some fear computer attacks could cause or intensify physical terror. [more]
Wednesday, 24 September 2003, 9:37 AM CET


Federal agencies tackle software security
Five federal agencies, led by the U.S. Department of Energy, plan to discuss a new set of government contracting practices that hold software makers accountable for making their products more resistant to viruses and hackers. [more]
Wednesday, 24 September 2003, 9:35 AM CET


'Relentless' pace of hack attacks
The huge number of day-to-day attacks that websites suffer has been revealed with the aid of two fake banking sites. [more]
Wednesday, 24 September 2003, 9:35 AM CET


US Jury convicts man in DMCA case
A federal jury has convicted a Florida man of violating the Digital Millennium Copyright Act, in the first jury-trial conviction under the controversial law, according to a U.S. attorney's office. [more]
Wednesday, 24 September 2003, 9:34 AM CET


Kanguru jumps in with security device
A new USB-based product called the Kanguru Wizard promises to perform magic when it comes to data security. [more]
Wednesday, 24 September 2003, 9:32 AM CET


Creating Trustworthy Archives
The efficient and secure storage of business records is fundamental to the insurance industry. Since its conception, insurance services have needed to retain critical records to ensure the successful operation of their business. [more]
Tuesday, 23 September 2003, 8:53 PM CET


A newbie's guide to setting up PF on OpenBSD 3.x
Since PF replaced IPF on OpenBSD starting with OpenBSD 3.0, it has become a world-class firewalling solution. [more]
Tuesday, 23 September 2003, 8:42 AM CET


Linux security: good enough
It's really simple. Linux has OK security , Windows doesn't. "Any questions?" asks Linux Center Editor Steven J. Vaughan-Nichols. [more]
Tuesday, 23 September 2003, 8:40 AM CET


Paranoia protection
The only secure computer, so the saying goes, is one that is not connected to anything -- including the power. It is an adage that, while not very helpful, does cast some light -- or should that be shadow -- on the perils of connecting a personal computer to the net. [more]
Tuesday, 23 September 2003, 8:39 AM CET


Authenticating Linux users with IBM Directory Server
This article describes how to use the IBM Directory Server to authenticate Linux users. The author explains step-by-step how to configure Directory Server, and Linux, to build a basic configuration to use Directory Server to authenticate Linux users. [more]
Tuesday, 23 September 2003, 8:36 AM CET


Lost in translation
We spend money, increase administration, and take away functionality. Is it any wonder that security people are so misunderstood? [more]
Tuesday, 23 September 2003, 8:29 AM CET


Baltimore sells 'crown jewels'
Security company Baltimore Technologies today announced a "conditional agreement" to sell its core public key infrastructure (PKI) business to US firm beTRUSTed for $5 million in cash. [more]
Monday, 22 September 2003, 5:27 PM CET


Inside Prelude, an open source IDS
Prelude is a very promising and featureful IDS. It differs from other IDSes, being a hybrid system. Prelude operates both as a host and network IDS. [more]
Monday, 22 September 2003, 5:25 PM CET


Defeating the stack based buffer overflow prevention mechanism of Microsoft Windows 2003 Server
This paper presents several methods of bypassing the protection mechanism built into Microsoft’s Windows 2003 Server that attempts to prevent the exploitation of stack based buffer overflows. [more]
Monday, 22 September 2003, 5:21 PM CET


Web site hackerproofing 101
Many organizations put static information on their Web sites, leaving them vulnerable to attack. However, by simply and inexpensively moving this data to a CD-ROM or DVD, they can greatly reduce their vulnerability. [more]
Monday, 22 September 2003, 5:04 PM CET


Interview with Dan Verton
Dan Verton is the the author of "The Hacker Diaries: Confessions of Teenage Hackers" is a former intelligence officer in the U.S. Marine Corps. [more]
Monday, 22 September 2003, 5:03 PM CET


Intrusion detection team denies Trojan claim
The Snort intrusion detection system does not have a back door for intruders, says the program's author. [more]
Monday, 22 September 2003, 4:55 PM CET


Analysis of Symantec's stance on censorship
According to a report in the Sydney Morning Herald, Chief Operating Officer of Symantec, John Schwarz, was quoted as "calling for laws to make it a criminal offense to share information and tools online which could be used by malicious hackers and virus writers". [more]
Monday, 22 September 2003, 4:52 PM CET


In worm war, feds fight the clock
Worms are appearing more frequently than ever, but patches are not keeping pace, federal officials warned. [more]
Monday, 22 September 2003, 4:51 PM CET


Accused AOL phisher spammed the FBI
Fraudulent e-mail asked an FBI computer crime agent for his credit card number. Charges have been filed. [more]
Monday, 22 September 2003, 4:51 PM CET


Appliances consolidate security
New products from Symantec include intrusion detection and virtual private network appliances. [more]
Monday, 22 September 2003, 4:47 PM CET


HNS Newsletter issue 180 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 22 September 2003, 4:46 PM CET


Spam prevention tips for small businesses
Excedent Technologies published recommended tips for small businesses and business owners on how to prevent spam from reaching employee inboxes. [more]
Sunday, 21 September 2003, 9:35 PM CET


Review - Managing Linux Systems with Webmin
What to expect from a Webmin system administration book that's written by the same guy that developed Webmin? Cameron combined all the knowledge and experience on the subject and transformed it into this complete Webmin companion guide. [more]
Friday, 19 September 2003, 5:50 PM CET


Interior admits security flaws in trust systems
Interior secretary Gale Norton told the Office of Management and Budget recently that the department’s financial systems are riddled with security weaknesses, even after she had told the U.S. District Court for the District of Columbia last month that they were secure. [more]
Friday, 19 September 2003, 4:21 PM CET


Sun boosts support for RFID
Another major enterprise IT vendor has further embraced the move toward using radio frequency identification (RFID) tags in manufacturing and retailing. [more]
Friday, 19 September 2003, 4:01 PM CET


Wireless policy development (part one)
This is the first of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development. [more]
Friday, 19 September 2003, 3:33 PM CET


Security appliances benefit from scares
Security-server sales were up by 10 per cent in the second quarter, with a spate of viruses forcing firms to become more security conscious. [more]
Friday, 19 September 2003, 3:27 PM CET


Waiting for a digital Sept. 11
After a rash of security flaws had wreaked havoc upon millions of users of Microsoft's operating systems, Steve Ballmer blew into Silicon Valley to make a public mea culpa in front of a roomful of industry executives. [more]
Friday, 19 September 2003, 3:26 PM CET


IBM, GE lock up security partnership
IBM and GE's Interlogix business unit announced a joint agreement to provide integrated computer and physical security systems to large customers. [more]
Friday, 19 September 2003, 2:23 PM CET


Beware the fake security patch
A new Internet worm masquerading as a security patch sent by Microsoft is spreading fast around the world. [more]
Friday, 19 September 2003, 2:22 PM CET


In Britain, spammers will pay
Instead of the latest U.S. tactic in the spam war - paying spammers not to spam - Britain looks at the flip side the coin. A new law makes spamming a criminal act worthy of jury trials and the potential for unlimited fines. [more]
Friday, 19 September 2003, 2:12 PM CET


Verisign's 'SiteFinder' finds privacy hullabaloo
Already reviled by network operators, Verisign's ambitious typosquatting project is raising hackles with privacy advocates too. [more]
Friday, 19 September 2003, 2:07 PM CET


Blaster trial set for November 17
The Minnesota teenager accused of unleashing a variant of the Blaster worm pleaded not guilty yesterday to a federal charge that carries a maximum sentence of 10 years imprisonment. [more]
Friday, 19 September 2003, 1:55 PM CET


Exposing your life - the top facts on PDA usage
One in three PDA users keep their PDA's unprotected by not bothering with passwords which could end with the same dire consequences as keeping their doors open at night. [more]
Friday, 19 September 2003, 12:00 AM CET


Distributors of DVD-copy software sued
Hollywood studios Paramount Pictures and 20th Century Fox sued a handful of small software companies Wednesday, alleging that their distribution of DVD-copying software violates copyright law. [more]
Thursday, 18 September 2003, 4:19 PM CET


New automated 802.11 wireless security software
A limited free download of the AirBlock 802.11 Wireless Security Software for residential and small business networks has been made available by Code Red Systems, a provider of wireless security solutions. [more]
Thursday, 18 September 2003, 4:06 PM CET


Virus sender agreed to work with FBI
Federal prosecutors credited the man responsible for transmitting the Melissa virus with helping the FBI bring down several major international hackers. [more]
Thursday, 18 September 2003, 3:50 PM CET


Solaris to enlist military security
The next release of Sun's operating system will add security features from Trusted Solaris, which was developed in partnership with the US government and military. [more]
Thursday, 18 September 2003, 3:49 PM CET


America fails on information security
We've all seen the mass disruption caused by the recent Sobig, Nachi and MSBlast worms--costing American companies $3.5 billion in August alone. Where's the outrage? Where's the action? [more]
Thursday, 18 September 2003, 3:48 PM CET


Viruses a blessing in disguise, says Open University
The SoBig and Blaster viruses could be a "blessing in disguise" as they can help IT departments apply a security policy to home users, according to the software manager at the Open University (OU). [more]
Thursday, 18 September 2003, 3:47 PM CET


Cracker put details on web in spite
A 14-year-old hacker put 895 customer records of Hamilton internet provider Net4U on the web in an act of spite. [more]
Thursday, 18 September 2003, 3:46 PM CET


Review - Red Hat Linux Administration: A Beginner's Guide
There are many books dedicated to Linux system administration. The one I'm taking a look at today is written specifically for Red Hat Linux although much of the material can be applied to other Linux distributions. Is it worth reading? Go on and find out. [more]
Wednesday, 17 September 2003, 4:24 PM CET


Interview with the author of the "Red Hat Linux Survival Guide"
Mohammed J. Kabir discusses various Linux and security issues, his books and the future of Linux as he sees it. [more]
Wednesday, 17 September 2003, 1:10 PM CET


Experts plot tactics to beat web crime
The UK government's first e-crime conference in London talked tough on computer crime. [more]
Wednesday, 17 September 2003, 12:58 PM CET


Adrian Lamo speaks out
The past two years have been a wild ride for Adrian Lamo: The 22-year-old has publicly taken credit for tunneling into networks belonging to Yahoo, Microsoft, Excite@Home and WorldCom. [more]
Wednesday, 17 September 2003, 12:58 PM CET


Former anti-spy chief says gadgetry failing
Despite the introduction of ever-improving surveillance technologies and snooping gadgets, today's spies were failing to gain the upper hand in "the war on terrorism," the former head of Britain's national security agency, MI5, said on Monday. [more]
Wednesday, 17 September 2003, 12:55 PM CET


Cron tutorial
What is cron? It is the scheduling daemon of the Linux operating system. Learn how to use it. [more]
Wednesday, 17 September 2003, 12:53 PM CET


Intel backs off security plan
LaGrande architecture will appear in only some chips, and can be disabled. [more]
Wednesday, 17 September 2003, 12:51 PM CET


If these networks get hacked, beware
America's critical transportation, power, and communications systems remain quite vulnerable and lack funds to remedy that. [more]
Wednesday, 17 September 2003, 12:48 PM CET


Banks in U.K, Canada hit with e-mail scam
British officials and the Royal Canadian Mounted Police are investigating. [more]
Wednesday, 17 September 2003, 12:44 PM CET


Accelerating security certification
Can information security professionals really get certified in half the ordinary time? [more]
Wednesday, 17 September 2003, 12:43 PM CET


Don't rely on Microsoft AV, warns analyst
Gartner advises companies not to bank on future Windows OS for virus protection. [more]
Wednesday, 17 September 2003, 12:35 PM CET


Hackers distributing new Windows exploit
Security researchers on Tuesday detected hackers distributing software to break into computers using flaws announced last week in some versions of Microsoft Corp.'s Windows operating system. [more]
Wednesday, 17 September 2003, 12:33 PM CET


OpenSSH Buffer Management Vulnerability
The official web site says that a new version of OpenSSH was released and the following security advisory was published. [more]
Tuesday, 16 September 2003, 7:41 PM CET


Wireless security: preventing your data from vanishing into thin air
To maximize the huge benefits of wireless technology without putting the enterprise at serious and unnecessary risk, the following safeguards are recommended. [more]
Tuesday, 16 September 2003, 2:23 PM CET


Does Microsoft give a damn?
The software-maker's dismal security record seems to have left it immune to criticism and shame. [more]
Tuesday, 16 September 2003, 2:10 PM CET


PGP makes email encryption easier
PGP Corporation today introduced simpler email encryption in which the burden of securing email messages is shifted from the client to the network. [more]
Tuesday, 16 September 2003, 2:02 PM CET


Fears of new Windows exploit grow
Fears are growing that vulnerabilities detailed by Microsoft on September 4 may be exploited soon, after a research company published a paper providing guidance on how these could be exploited. [more]
Tuesday, 16 September 2003, 1:44 PM CET


New cybersecurity chief picked
The Bush administration on Monday selected Amit Yoran, a respected software executive from Symantec Corp., as the nation's new cybersecurity chief inside the Department of Homeland Security. [more]
Tuesday, 16 September 2003, 1:36 PM CET


Security woes threaten industry says Ballmer
Is the increase in security threats good or bad for the computer industry? Apparently it’s both. [more]
Tuesday, 16 September 2003, 1:33 PM CET


Encrypted email cookbook
Using a cookbook approach, the author demonstrates how to set up various email clients to use authentication and encryption. [more]
Tuesday, 16 September 2003, 1:32 PM CET


Dynamic honeypots
Instead of discussing what honeypots can do and how they work, we will take a look into the crystal ball and see what honeypots should do, how they could work. [more]
Tuesday, 16 September 2003, 1:30 PM CET


UK security group grows fivefold
Since its launch at the Infosecurity exhibition and conference in April, the UK branch of the US-based Information Systems Security Association (ISSA) has boosted membership fivefold, from about 20 founder members to more than 120 organisations and individuals. [more]
Tuesday, 16 September 2003, 1:27 PM CET


Quantum cryptography finally commercialized?
Start-up MagiQ Technologies, from Somerville, Massachusetts, has released the first commercial implementation of quantum cryptography, the much-heralded solution to the perfect encryption cipher. [more]
Tuesday, 16 September 2003, 1:23 PM CET


Virus attacks: who is to blame?
August was possibly the busiest month in the history of computer viruses: 800 new viruses were detected. [more]
Tuesday, 16 September 2003, 1:21 PM CET


Review - Windows XP Secrets
This is a book that will help you learn a lot of features and possibilities, aimed to investigate a background of many operations. Its mission is to make you understand your operating system and get the best of it. [more]
Monday, 15 September 2003, 2:31 PM CET


HNS Newsletter issue 179 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 15 September 2003, 2:30 PM CET


Total security?
Think your PC is protected by those passwords you key in every time you start up or log on to your e-mail client or Web applications? Think again. [more]
Monday, 15 September 2003, 12:57 PM CET


Wi-Fi whistle blower faces criminal charges
A North Carolina man faces criminal charges after his attempt to expose the insecurity of his local medical facility's wireless network landed him in hot water with the authorities. [more]
Monday, 15 September 2003, 12:55 PM CET


Paying spammers not to spam
Based on the idea that junk e-mailers will do anything for money, a new company is offering spammers cash for each name they add to a do-not-spam list. [more]
Monday, 15 September 2003, 12:38 PM CET


Secure transactions with no strings attached
Security vendors pitch PKI alternatives that cut costs and management headaches. [more]
Monday, 15 September 2003, 12:34 PM CET


Why you must install a firewall NOW
If you haven't already installed a personal firewall on your Windows computer, consider this your last warning. [more]
Monday, 15 September 2003, 7:22 AM CET


Security rollup planned for Windows XP
Microsoft is hurrying to produce a post Service Pack 1 security rollup package for Windows XP, reversing its August decision to rely solely on Windows Update to deliver individual patches. [more]
Monday, 15 September 2003, 7:21 AM CET


Review - Windows Server 2003 Security Bible
This book is a perfect choice for all you administering Windows Server 2003 machines as it deals exclusively with security. Read the review and get a sample chapter. [more]
Friday, 12 September 2003, 5:54 PM CET


Computer-heavy electrical grid is vulnerable to attack
Replacing the aging monitoring systems on the Northeast's power grid with digital switches and other high-tech gear has made the electricity supply vulnerable to a new kind of peril. [more]
Friday, 12 September 2003, 11:44 AM CET


Rumblings on IT security jobs moving overseas
When can you expect your IT Security job to disappear and move overseas? [more]
Friday, 12 September 2003, 11:40 AM CET


Escape the spyware nightmare
Spyware and adware are the newest threats to connected PCs. Here's how to get them off your machine--and keep them off. [more]
Friday, 12 September 2003, 11:36 AM CET


The perils of online data entry
Fraser Thomas, chief executive at Swivel Technologies, advises on how to minimise the risks posed by criminals looking to obtain other people's authentication details. [more]
Friday, 12 September 2003, 11:33 AM CET


Does the killer worm really exist?
Technology is not holding hackers back from creating uber worms, Chris Wysopal, director of R&D at @stake, told the E-Commerce Times. Rather, the limiting factor is the psychology of the majority of people -- generally young males -- who write malware. [more]
Friday, 12 September 2003, 11:31 AM CET


Beyond biometrics: new strategies for security
Biometrics technology, despite its sluggish acceptance, might be on the edge of newfound popularity. [more]
Friday, 12 September 2003, 11:29 AM CET


Steve Wozniak speaks on Mac passions and Mac viruses
Among other reasons Macintosh has a loyal following: the absence of viruses -- such as SoBig -- that have plagued the PC world. [more]
Friday, 12 September 2003, 11:27 AM CET


It's time to tackle threats to the Net
Individuals and businesses that depend on the Internet won't tolerate nuisances such as spam and viruses. [more]
Friday, 12 September 2003, 11:23 AM CET


Microsoft's wormy problem
Investors should not dismiss concerns of more security flaws when looking at Microsoft's stock. [more]
Friday, 12 September 2003, 11:21 AM CET


Hacker's pranks started out small
Investigators say his career as a computer hacker began more than a year ago when he saw a roommate typing her password and copied it. [more]
Friday, 12 September 2003, 11:18 AM CET


Hardening the TCP/IP stack to SYN attacks
This article discusses methods of hardening the TCP/IP stack of various operating systems to make servers more resistant to SYN flooding and SYN spoofing Denial of Service (DOS) attacks. [more]
Thursday, 11 September 2003, 4:59 PM CET


An integrated approach to threat management
Effective Threat Management embodies the actions organizations must take to defend themselves against today's ever-present cyber-threats. At a high-level, these actions form an intrusion prevention and protection lifecycle where each stage provides critical information to the next. [more]
Thursday, 11 September 2003, 4:55 PM CET


Hackers hit Richmond
International hackers have crashed the computer system of a Richmond real estate agent, costing it thousands of dollars. [more]
Thursday, 11 September 2003, 4:23 PM CET


Murky laws make piracy suits less likely in Canada than U.S.
When the U.S. record industry spread fear and loathing south of the border on Monday by filing lawsuits against music "pirates," Canadian file sharers were left looking over their shoulders wondering if the same thing could happen to them. [more]
Thursday, 11 September 2003, 4:16 PM CET


Microsoft warns on three critical bugs
Buffer overflow and denial of service vulnerabilities affect Windows RPC service. [more]
Thursday, 11 September 2003, 4:02 PM CET


Just say no to viruses and worms
Members of the computing industry and law enforcement testified before the technology subcommittee of the House Committee on Government Reform Wednesday about how to protect the nation's computing systems from viruses and worms. [more]
Thursday, 11 September 2003, 4:00 PM CET


Review - Linux Server Hacks
This 200+ pages long book doesn't bother to cover all Linux server administration topics, but provides a collection of 100, sharp to the point, server administration situations, written by a well known figure in the administration world. [more]
Wednesday, 10 September 2003, 6:54 PM CET


Preventing the next worm
Information security is a reactive world. The next intrusion, vulnerability or worm is always right around the corner. [more]
Wednesday, 10 September 2003, 4:54 PM CET


RIAA settles with 12-year-old girl
Barely 24 hours after suing alleged file swappers around the United States, the recording industry has settled its first, agreeing to drop its case against a 12-year-old New York girl in exchange for $2,000. [more]
Wednesday, 10 September 2003, 4:53 PM CET


Two Brits charged with releasing TK worm
Two British men were charged on Monday with conspiring to take over computers using malicious code. [more]
Wednesday, 10 September 2003, 4:51 PM CET


A walk through "Sombria": a network surveillance system
Sombria ("shadowy" in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production purposes. This paper provides some statistics and an overview of the most prominent attacks from May through July 2003. [more]
Wednesday, 10 September 2003, 1:49 PM CET


Money for jam: a new kind of scam
In what appears to be a scam of a different kind, an email is doing the rounds offering people 10 percent of the money deposited in their bank accounts by outsiders. [more]
Wednesday, 10 September 2003, 1:19 PM CET


Best practices: handheld security
Handheld security expert suggests best practices for organizations that support the devices. [more]
Wednesday, 10 September 2003, 1:12 PM CET


Adrian Lamo turns himself in
Adrian Lamo, aka the helpful hacker, responds to an arrest warrant by surrending to federal marshalls. Lamo has admitted involvement in some of the most-publicized computer break-ins in recent years. [more]
Wednesday, 10 September 2003, 1:11 PM CET


The virus of youthful irresponsibility
College kids just don't pay enough attention to computer security. Thank goodness adults on campus are prepared to force the issue. [more]
Wednesday, 10 September 2003, 1:09 PM CET


China moves to block spam servers
In its latest battle against junk e-mail, China has blocked 127 mail servers it identified as responsible for spam, the official Xinhua News Agency said Tuesday. [more]
Wednesday, 10 September 2003, 1:09 PM CET


Laptop stolen in further security breach
Highly sensitive government security information has been stolen in a second major intelligence breach. [more]
Wednesday, 10 September 2003, 1:07 PM CET


Top security pros to talk worm defense
A group of high-powered security experts and industry executives will be in Washington, testifying before a Congressional committee looking into ways to bolster the nation's defenses against threats such as worms and viruses. [more]
Wednesday, 10 September 2003, 1:01 PM CET


Interview with John Vacca
The information technology consultant and internationally known author of many books and articles discusses identity theft issues as well as his latest book "Identity Theft". [more]
Tuesday, 9 September 2003, 5:16 PM CET


Crime stats Web site a hit
A Web site launched a week ago to monitor South African crime has had an overwhelming response from members of the public, receiving 24 000 hits since its launch, says site owner Spero Patricious. [more]
Tuesday, 9 September 2003, 4:12 PM CET


Antispam companies raking it in
Not everyone is unhappy about the scourge of spam. Antispam software companies are seeing rising revenues and growing lines of investors. [more]
Tuesday, 9 September 2003, 3:59 PM CET


SCO demands name of website attacker
The SCO Group has asked Open Source Initiative president Eric Raymond to disclose the name of the person who carried out a distributed denial of service attack on the company's website last month, "so that justice can be done." [more]
Tuesday, 9 September 2003, 3:42 PM CET


Security forces - act before you must react
Information security is a reactive world. The next intrusion, vulnerability or worm is always right around the corner. [more]
Tuesday, 9 September 2003, 3:36 PM CET


Microsoft stands by IE security patch
Microsoft has responded to claims that a recent patch for Internet Explorer fails to fix the security vulnerability. [more]
Tuesday, 9 September 2003, 3:34 PM CET


Forgive me my trespasses
How a recent federal appeals court decision makes virtually everyone a computer criminal. [more]
Tuesday, 9 September 2003, 3:10 PM CET


Don't turn that cheek to hackers--be unchic
So what do we do with Jeffrey Parson, the 18-year-old whose Blaster variant attacked 7,000 computers last month? [more]
Tuesday, 9 September 2003, 2:56 PM CET


Lamo set to surrender today
An agreement with prosecutors has the New York Times hacker walking into custody Tuesday morning, and likely being released on bail later the same day. [more]
Tuesday, 9 September 2003, 2:51 PM CET


Manual software configuration leaves systems open to attack
Enterprise software manufacturers should ship products with the maximum security set as default, according to Mary Ann Davidson, chief security officer at Oracle. [more]
Tuesday, 9 September 2003, 2:48 PM CET


Quantum cryptography gets nanotube boost
The U.S. Department of Defense is very interested in developing quantum cryptography, a theoretically unbreakable method of coding information, which necessitates a reliable way to deliver single photons on demand. [more]
Tuesday, 9 September 2003, 2:41 PM CET


Information security checklist
To help you determine how your security program stacks up, infosecurity expert Ken Cutler has developed this security checklist. [more]
Monday, 8 September 2003, 6:29 PM CET


Linux for Windows administrators with Delixus 8.0
Delixus 8.0 makes administering a Linux server almost seamless to the Windows environment most people are used to. [more]
Monday, 8 September 2003, 2:17 PM CET


Encryption? Give it a rest
Any hacker can tell you that data 'at rest' is much easier to access, but security efforts are being targeted in the wrong place, using complex, costly encryption schemes for data in motion. [more]
Monday, 8 September 2003, 2:09 PM CET


Cyber guerilla networking
Cyber guerillas are hunting your wireless signals and gathering your private information. Find out how to combat them. [more]
Monday, 8 September 2003, 2:08 PM CET


Raising the standard for information security
Key business functions are increasingly reliant on efficient IT infrastructures, but security breaches and their impact on the business are becoming greater. [more]
Monday, 8 September 2003, 2:07 PM CET


ID theft hits 10m Americans a year
A staggering 27.3 million Americans have been victims of identity theft in the last five years, according to Federal Trade Commission survey out this week. [more]
Monday, 8 September 2003, 1:48 PM CET


Protecting databases
In this paper, the authors will cover various ways databases are attacked, and how to prevent them from being "hacked". [more]
Monday, 8 September 2003, 1:47 PM CET


HNS Newsletter issue 178 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 8 September 2003, 1:45 PM CET


Internet service providers: the little man's firewall?
The fast spread of network worms and other malware has forced ISPs into implementing packet filtering. In some cases, this is the only way to keep the network operating, but it has become common to block certain ports permanently even after the threat diminishes. We argue in favor of limited, long term port blocking. [more]
Monday, 8 September 2003, 1:43 PM CET


Security holes vex web host firm
More than a thousand websites hosted by Interland, a leading Web-hosting company, appear to have been hacked in the last week, according to a security expert. But Interland denies there's a problem. [more]
Monday, 8 September 2003, 3:36 AM CET


Privacy's new image
America's new rules of privacy are coming from the Old Country. Here's how Europe is getting America to rethink privacy. [more]
Monday, 8 September 2003, 3:34 AM CET


Adrian Lamo speaks with leo before arrest
The gray-hat hacker talked with 'The Screen Savers' as he waited to hear charges before turning himself in. [more]
Monday, 8 September 2003, 3:32 AM CET


Passwords multiply as users' rage rises
As logins get more complex, people may be the ones in need of a memory upgrade. [more]
Monday, 8 September 2003, 3:29 AM CET


Review - Installing, Troubleshooting, and Repairing Wireless Networks
When dealing with computer networks, we can expect a number of possible problems, so troubleshooting and repairing tips and tricks can come really handy in the moment of crisis. The book basically provides a detailed overview of general wireless network installations, with a scope on helping future wireless deployers to get the best out of their wireless networks. [more]
Friday, 5 September 2003, 5:03 PM CET


Teach worms a lesson from Waterloo
A world weary of computer viruses needs to take a tip from Nathan Rothschild. [more]
Friday, 5 September 2003, 4:20 PM CET


Lawmakers may seek full disclosure
Spammers, scammers and child pornographers can hide easily on the Internet because regulators allow them to register under false names with stolen credit cards, lawmakers and technology experts said Thursday. [more]
Friday, 5 September 2003, 4:18 PM CET


Australia's anti-terror fighters suffer security breach
On the night of August 27, two men dressed as computer technicians entered the cargo processing and intelligence centre at Sydney International Airport. They managed to disconnecting two mainfreme computers, which they wheeled out the building. [more]
Friday, 5 September 2003, 10:57 AM CET


Can open-source software prevent the next big blackout?
North America's power grid, creaking under loads it was never designed to handle, may be facing an even grimmer future thanks to security flaws in aging control systems that are increasingly interconnected with Microsoft-based enterprise systems. [more]
Friday, 5 September 2003, 10:55 AM CET


Are we outsmarting spam?
The increasing glut of unsolicted, unwanted e-mail is a frustrating fact of life for businesses. Fighting it is a very real, everyday job for IT personnel. [more]
Friday, 5 September 2003, 10:53 AM CET


FBI reportedly hunting Adrian Lamo
FBI agents armed with a federal arrest warrant out of New York were searching for Adrian Lamo Thursday, according to the hacker and his mother. [more]
Friday, 5 September 2003, 10:47 AM CET


Colleges move to thwart internet viruses
Still recovering from a summer of Internet infections, colleges are taking unusually aggressive steps to protect campus computer networks from virus outbreaks. [more]
Friday, 5 September 2003, 10:43 AM CET


Prison for computer crime
The Justice Ministers of the 15 Member States of the European Union have decided to modify their country laws, to include prison sentences for the authors of computer crime. This decision may have more implications than it may seem: there are many different types of computer crimes, and all of them can be seen from different perspectives. [more]
Thursday, 4 September 2003, 7:57 PM CET


Identity thieves cheat 27 million in United States
FTC survey cites crime spike, though not all in cyberspace. [more]
Thursday, 4 September 2003, 7:48 PM CET


Intrusion detection terminology (part one)
This is the first of a two-part series that discusses IDS terminology, including terms where there may be disagreement from within the security community. [more]
Thursday, 4 September 2003, 5:54 PM CET


Viruses, worms - what's in a name?
Researchers who first discover viruses or worms get the honor of naming them. Sometimes, the names are easy to pick. But as more viruses are created, researchers are having a harder time coming up with catchy monikers. [more]
Thursday, 4 September 2003, 5:43 PM CET


Interview with Bruce Schneier
Author Bruce Schneier discusses why the Patriot Act and other anti-terror measures mean "giving up a lot -- and not getting very much". [more]
Thursday, 4 September 2003, 5:41 PM CET


Second suspect arrested for internet virus
Police in Romania on Wednesday arrested a 24-year-old former student in connection with a computer-crippling Internet worm, according to a computer security company that aided police. [more]
Thursday, 4 September 2003, 1:19 AM CET


Review - Linux+ Certification Bible
The aim of this book is to provide you with all the information you need to pass the CompTIA Linux+ Certification exam. The Bible series of books is very popular and always a synonym of quality so I approached this title with great expectations. [more]
Wednesday, 3 September 2003, 3:08 PM CET


Israeli scientists crack GSM mobile call security
An Israeli scientist said his team had found a way to break into mobile phone calls made on the popular GSM network, allowing eavesdroppers to listen in on calls and even take on a caller's identity. [more]
Wednesday, 3 September 2003, 1:47 PM CET


Sophos tech chief blasts ever-so-big virus claims
Recent computer viruses, such as MSBlaster, SoBig-F and Nachi-A cause much alarm, "but some of us today tend to be a little cynical about the figures quoted on the financial damage created", says Paul Ducklin, head of technology in Australia for a major anti-virus company. [more]
Wednesday, 3 September 2003, 1:45 PM CET


How some spammers get your e-mail
While not as efficient as "spiders" which automatically crawl the Web in search of addresses, computer experts warn that some spammers are using chain letters to collect e-mail usernames. [more]
Wednesday, 3 September 2003, 1:41 PM CET


Pocket-sized wireless detection
This article provides a comparison of two tiny 802.11 detectors and discusses how they would fit into your overall WiFi security framework. [more]
Wednesday, 3 September 2003, 1:39 PM CET


Exploring RHCT certification
In this article, Emmett explores what the RHCT certification is, how it fits into the acronym stream, and some things you should know when preparing for it. [more]
Wednesday, 3 September 2003, 1:33 PM CET


Security fears over hospital data
A data protection expert has exposed a lack of security at one of Switzerland’s leading hospitals by hacking into confidential patient files in a matter of minutes. [more]
Wednesday, 3 September 2003, 1:32 PM CET


Security expert turns political
Wired News talks with Richard Forno about his latest book, a departure from his usual computer security work. In it, he warns that "the real danger facing America is what we're allowing ourselves to become." [more]
Wednesday, 3 September 2003, 1:30 PM CET


Is your network safe? Try these tools and find out
You patch your web server and are mindful of your firewall configuration, but is your site really secure? How do you check it? [more]
Wednesday, 3 September 2003, 1:29 PM CET


Teen charged in worm attack says case is inflated
A high school senior charged with modifying a version of the Internet worm that crippled computer networks worldwide said the government has exaggerated its case against him. [more]
Wednesday, 3 September 2003, 1:28 PM CET


Online retailers, security companies join to fight Web ID theft
The ITAA will help run the coalition, but it's not part of the technology trade group. [more]
Wednesday, 3 September 2003, 12:57 PM CET


DefCon - all in good fun
There are no rules at DefCon, the world's largest computer hacker convention. [more]
Tuesday, 2 September 2003, 1:23 PM CET


Be aware and thwart theft
While banks and the state's attorney general are taking steps to thwart identity theft, they say their safeguards can quickly be offset by carelessness by consumers. [more]
Tuesday, 2 September 2003, 1:22 PM CET


Use DSPAM to reduce spam from a Linux mail server
DSPAM acts as the local delivery agent for the server and learns to recognize spam to ease the administrative burden of constantly keeping up with blacklists. [more]
Tuesday, 2 September 2003, 1:17 PM CET


Computer virus creators rarely face jail
Although nearly 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, criminal prosecutions have been few, penalties light and just a handful of people have gone to prison for spreading the destructive bugs. [more]
Tuesday, 2 September 2003, 1:11 PM CET


Inside NIP hype
Though we think NIP systems can enhance an existing security infrastructure, we don't consider integrating intrusion prevention and firewalls into a single unit a desirable goal. [more]
Tuesday, 2 September 2003, 1:08 PM CET


A support group for spammers
Spammers congregate online at the Bulk Club, a site where they trade tips and support. But a glitch reveals the club's roster, potentially exposing members to more backlash from those opposed to spam. [more]
Tuesday, 2 September 2003, 1:07 PM CET


How many security vulnerabilities a month are acceptable?
Are twenty security vulnerabilities in one month an acceptable number for Sun customers? It seems to me rather a lot? But then, I know about them. The question is, do Sun customers? [more]
Tuesday, 2 September 2003, 12:59 PM CET


Blindfolded SQL injection
This whitepaper shows that supressing error messages does not provide real protection. The research reveales a set of techniques that attackers can use to bypass this obstacle, making it clear that more substantial measures must be taken against SQL injection attacks. [more]
Tuesday, 2 September 2003, 4:50 AM CET


Business calls it monitoring - critics call it spying
It's not government that is emerging as the clearest embodiment of Big Brother — the all-seeing all-knowing entity in Orwell's novel "1984" — but Corporate America. [more]
Tuesday, 2 September 2003, 4:38 AM CET


Mice sign on the dotted line
Soon the way you use your mouse could help prove who you are. [more]
Tuesday, 2 September 2003, 4:29 AM CET


Security: giving an outsider the keys
Michael Warrilow, analyst in security and risk strategy at META Group, says non-government expenditure on managed security services will reach about $100 million during 2003 in Australia. [more]
Tuesday, 2 September 2003, 4:28 AM CET


Survey: fears grow that cyberattack may strike America
Americans are increasingly worried that terrorists could launch cyberattacks against banks, transportation networks and other critical systems, a new survey shows. [more]
Monday, 1 September 2003, 5:50 PM CET


Blaster-B worm author released on bail
Jeffrey Lee Parson, the American teenager charged with unleashing the MS Blast internet worm, was released on bail following a hearing Friday in the US Federal Court. [more]
Monday, 1 September 2003, 5:45 PM CET


Viruses boost 'Big Brother' software
It has never been easier for employers to monitor the e-mails and Internet activity of their staff. [more]
Monday, 1 September 2003, 5:43 PM CET


SMEs turn blind eye to protection
A third of SMEs in the UK ignore anti-virus or firewall security, says survey. [more]
Monday, 1 September 2003, 5:39 PM CET


Review - Google Hacks: 100 Industrial-Strength Tips & Tools
Even if you use Google all the time, this exceptional book will show you things you didn't know were possible. Since the Internet is developing and growing quite rapidly, the audience of this book is basically everyone. We all need to learn how to search more efficiently. [more]
Monday, 1 September 2003, 5:38 PM CET


HNS Newsletter issue 177 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 1 September 2003, 5:34 PM CET


Mobile security
Backing-up and encryption can alleviate some of the pain caused by losing a mobile device. [more]
Monday, 1 September 2003, 3:15 PM CET


Virus attacks switched off US power
August 2003 was the worst month for virus attacks in history – and one virus may have switched off the lights on America's East Coast, according to the experts. [more]
Monday, 1 September 2003, 3:13 PM CET


Hacking by subpoena ruled illegal
Issuing an egregiously overbroad subpoena for stored e-mail qualifies as a computer intrusion in violation of anti-hacking laws, a federal appeals court ruled. [more]
Monday, 1 September 2003, 3:10 PM CET


Network defense - diversity is strength
One of my favourite quotes is: "He who fails to learn the lessons of history is doomed to repeat it". And I believe what is going on in the IT industry today is a good example. [more]
Monday, 1 September 2003, 5:30 AM CET


Social security numbers sold on Web
Group buys data on top U.S. officials to underscore need for tougher laws. [more]
Monday, 1 September 2003, 5:20 AM CET


IBM squashes worms
IBM researchers in Zurich, Switzerland, have developed novel worm-squashing software the company says it wants to turn into a product to help guard against computer-network attacks such as those that slowed Internet traffic earlier this month. [more]
Monday, 1 September 2003, 5:11 AM CET


Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //