Linux distributor Suse has warned of one of the most serious security holes to date in version 2.6 of the Linux kernel, which could allow attackers to shut down a system running 2.6-based software.
The 2.6 kernel, completed at the end of last year, brings a number of enterprise-friendly features to Linux, but is still in the early stages of rolling out in commercial products. While a number of Linux vendors have released software for technical enthusiasts running the new kernel, Novell-owned Suse is one of the few offering an enterprise product based on 2.6.
Robert Graham says that many hackers are graduating into the pro ranks, a development that carries worrisome implications for corporate security. "Before this year, we really saw just kids that are playing and pretending to be masterminds," said Graham, who did important early work in the development of intrusion-prevention systems. "But this year, we saw the rise of the professional hacker."
One of the latest security books I read had a fascinating example in the preface. The authors, well-known and trustworthy experts in the field http://wwwdev.securityfocus.com/cgi-bin/preview/infocus_preview.pl?id=18... security, made an outrageous claim that most of the Fortune 2000 companies have already been penetrated by hackers (and have been in that state for years!).
A hacker defaced more than 200 Brazilian government Web sites this week what appears to be a political protest. According to security experts, the attacker penetrated a single Internet service provider that hosts all the government Web sites. The hacker left abusive anti-government messages on some of the sites and a photo of a woman's eye on others.
Internet users at home are not nearly as safe on-line as they believe, according to a U.S. inspection by researchers.
They found most consumers have no firewall protection, outdated antivirus software and dozens of spyware programs secretly running on their computers.
One beleaguered home user in the U.S. government-backed study had more than 1,000 spyware programs running on his sluggish computer when researchers examined it.