Skip to main content

Networking

Teen charged with hacking into NASA research center

posted onJuly 3, 2001
by hitbsecnews

A New Mexico teenager has been charged with hacking into a
NASA-run research centre.

Jason Schwab, 18, has been charged with computer abuse and
conspiracy to commit computer abuse connected with an April 2000
attack by crackers against NASA's Ames Research Centre in
California.

Entercept releases Apache Web hacker protection

posted onJune 30, 2001
by hitbsecnews

Entercept's protection software created to put paid to Sun's Solaris servers' hacking vulnerability. Entercept Technologies has launched protection software for Sun servers running Apache software, which have been singled out for attack by hackers.

Standardization of IDS reporting protocols will benefit everyone

posted onJune 29, 2001
by hitbsecnews

There's a problem hampering the effectiveness of IDSes. Simply put, there are as many different IDS applications as there are attack vectors (figuratively speaking, of course). As many organizations have discovered, multiple IDS solutions are needed to monitor different platforms and networks. This diversity inhibits enterprise-wide pooling and correlation of attack data.

Time Magazine Runs Special Report on Internet Security

posted onJune 29, 2001
by hitbsecnews

Is a pretty basic look at privacy and internet security, aimed at home users. Most of you will think this info is for "lamers" but its worth reading for the insights it gives on how the average computer user percieves the intenet and network security.

Time.com.

Cisco releases update to fix IOS to stop authorization vulnerability

posted onJune 29, 2001
by hitbsecnews

Cisco has fixed up IOS to stop up an authorization vulnerability. Using the HTTP server, under local authorization, a nasty user could bypass the authentication and execute any command. The user will be able to exercise complete control over the device. All commands will be executed with the highest privilege (level 15).

Cisco releases updates for SSH vulnerabilities in three different product lines

posted onJune 29, 2001
by hitbsecnews

Cisco has released updates for a host of SSH flaws in three different product lines that are susceptible to multiple vulnerabilities in the Secure Shell (SSH) protocol. These issues are inherent to the SSH protocol version 1.5, which is implemented in several Cisco product lines. By exploiting the SSH protocol weakness, someone could insert an arbitrary command into an established SSH session and collect information that could help in a brute force key recovery, or in attacking with brute force a session key. A copy of the CISCO notice and update links are attached....

Sadmind/IIS Defacement Worm Strikes Quote.com Site

posted onJune 29, 2001
by hitbsecnews

An Internet worm that automatically defaces Web sites claimed another high-profile victim today, redecorating the home page of a site operated by Lycos' Quote.com investment service. The Sadmind/IIS worm replaced the home page of Quote.com's Virtual Advisor Portfolio Tracker site with its trademark anti-American message in red letters on a black background. The defacement was still viewable this morning.

Sprint confirms it was attacked with a denial-of-service attack

posted onJune 29, 2001
by hitbsecnews

Officials at Sprint Corp. confirmed late yesterday that what they described as a "very low impact" denial-of-service attack occurred on the Sprint network Tuesday around 11 p.m.

Sprint spokesman Charles Fleckenstein said, "Sprint engineers immediately identified those Internet service providers from which the offending addresses originated, and those ISPs then blocked the offending addresses." The length of the attack was undetermined at deadline..

Sprint confirms denial-of-service attack

By JAMES COPE reporting for ComputerWorld

How to trace stolen notebooks over the Net

posted onJune 28, 2001
by hitbsecnews

Software which pinpoints the exact location of laptop thieves via the
Net is due to land in Europe by the end of this year. The software, developed by US company zTrace, activates a tracing
technology when stolen laptops are connected to the Internet.

Computer owners sign up to zTrace, then notify the company if their
machine is stolen (a police report must also be submitted).

The tracing technology inside the laptop, which zTrace says cannot be
detected or uninstalled, is then activated the next time anyone tries to
get the notebook online.

Net espionage stirs Cold-War tensions

posted onJune 27, 2001
by hitbsecnews

Fears of Cold War tensions are finding new life in cyberspace, as the threat of Internet espionage shifts the nuclear-age doctrine of "mutually assured destruction" to that of mutually assured disruption.