The Federal Aviation Administration (FAA) has agreed to examine computer security at air traffic control centers around the country, following a government audit that found the systems insufficiently secured against cyber attacks.
Auditors found that the FAA hadn't adequately secured computers running at the 20 "en route centers" that direct high-altitude traffic nationwide. "While having limited exposure to the general public, en route center computer systems need to be better protected," reads the report, dated October 1st.
This is the first in a series of articles on SSH in-depth. We start with looking at standard SSH host keys by examining the verification process to ensure you have not been the victim of an attack. Please note that this article applies to the widely used OpenSSH application that is bundled with most Unix based operating systems, and not the commercial version of SSH.
A US computer programmer has created a software robot that uses instant messenger – a program that allows people to exchange messages over the internet in real time - to control a computer remotely.
So-called “chatterbots” have been created in the past, allowing programmers to use IM to automatically upload files from their computer. But “Nmapbot", created by Virginia-based Abe Usher, is the first that allows someone to scan a remote network for machines that could be hacked into. Nmapbot also allows a hacker to use compromised machines to launch a denial of service attack.
Poor consumer awareness around broadband security is putting the UK at risk, according to the director of the government's National Infrastructure Security Co-ordination Centre.
In an exclusive interview with Computing, Cumming said it is essential that consumers are better informed about the potential dangers of their broadband-enabled machines.
And with Prime Minister Tony Blair promising broadband internet access for all British homes if he gets a third term in power, UK security experts are calling on ISPs and the government to educate consumers.
Respondents to the 2004 Ernst & Young Global Information Security Survey cited lack of security awareness by end users as the top barrier to achieving the required level of security. Yet raising awareness through security training programs was ranked just sixth and eighth in the list of security priorities in 2004 by business chiefs and IT execs, respectively.
Business leaders ranked enforcing information and security policy as the first priority, which begs the question, how will this be done if training isn't even a top-five initiative?