Skip to main content

Networking

FBI Issues Water Supply Cyberterror Warning

posted onJanuary 31, 2002
by hitbsecnews

Source: SecurityFocus

Members of Osama bin Laden's al-Qaida terrorist network have sought information on the Web about the networks that U.S. utility companies use to remotely control water supply distribution and treatment systems, according to a bulletin issued by the FBI's National Infrastructure Protection Center (NIPC) Wednesday.

Home is where the Hacker is

posted onJanuary 31, 2002
by hitbsecnews

Source: NewsFactor

Many well-known security vulnerabilities remain open on home machines and networks, and there is less risk to hackers of getting caught.

Thanks to advancing technology and the growth of high-speed Internet service, home computer systems have become faster and more powerful. But they remain a favorite target of hackers and virus writers who are looking for easy prey with less fear of prosecution.

Intrusion Software Maker Snorts At Security Alert

posted onJanuary 30, 2002
by hitbsecnews

Source: NewsBytes

The developer of Snort, a popular open-source intrusion detection system (IDS), downplayed reports of a security flaw that could enable attackers to disable the software.
According to an alert released Monday by Internet Security Systems (ISS), Snort versions 1.8.3 and earlier are susceptible to a denial of service attack.

"If launched successfully against a Snort-protected network, all IDS functionality may be disabled until Snort is manually restarted," said ISS in its alert.

Understanding IDS Active Response Mechanisms

posted onJanuary 30, 2002
by hitbsecnews

Source: SecurityFocus

Debates still rage in the developer community over which methods of detecting attackers are best, but IDS customers as a whole are satisfied with the current IDS technology. To get an edge on the competition, many of the IDS vendors are adding active response capabilities to their products. This article will offer an overview of active response mechanisms in intrusion detection systems.

How to break into your own computer (it's easy)

posted onJanuary 30, 2002
by hitbsecnews

Source: ZDNet

By now you've probably heard of Trojan horses that can infect your PC and give a malicious user access to all your data. The well-known SubSeven is one such Trojan horse. Its victims notice something is wrong when their applications open and close on their own, or their mouse moves across the desktop without their help.

NIST prepping security guides

posted onJanuary 29, 2002
by hitbsecnews

Source: FCW.com

The National Institute of Standards and Technology's security team will be releasing more than 30 guides over the coming year to help agencies with many crucial technical and policy security concerns, officials said last week.

What Defines a "Black Hat" Hacker?

posted onJanuary 28, 2002
by hitbsecnews

Source: Cipherwar.com

I wouldn't be writing this story if I hadn't have received, what amounts to commercial spam, in my own inbox. I would still have felt the things I'm going to express, but I would not have gone to the trouble of writing them down and posting them on Cipherwar had I not been provoked. The question is: What Defines a "Black Hat" Hacker? In my opinion, this can be established by observing one's moral compass.

The dangers of destroying documents

posted onJanuary 28, 2002
by hitbsecnews

Source: SiliconValley.com

Wells Fargo shreds teller trash. Intel rips up top-secret plans for a new chip manufacturing process. Biotech giant Chiron orders outdated packaging material destroyed so its products can't be reformulated or sold on the black market.