Skip to main content

Networking

Security and Internet Issues for US Businesses

posted onSeptember 4, 2001
by hitbsecnews

According to a May 2001 survey from N2H2, Inc., 31% of US companies say their biggest internet-related problem is security. Another 21% cite bandwidth as a major issue and only 5% think reliability is an issue.

L33tdawg: More charts attached.

New virus targets .exe files

posted onSeptember 4, 2001
by hitbsecnews

Antivirus vendor Central Command Inc. has detected a new worm that, disguised as a warning from Microsoft Corp., mass mails itself to users and once launched from an attachment, encrypts executable files, rendering them unusable.

The Medina, Ohio-based security company rates the virus as a medium risk, and said that so far there's only one report of an infection. The worm reportedly can infect computers running Windows, Windows NT and Windows 2000.

SuSE: nkitb/nkitserv/telnetd vulnerabilities

posted onSeptember 4, 2001
by hitbsecnews

The telnet server which is shipped with SuSE distributions contains a remotely exploitable buffer-overflow within its telnet option negotiation code. This bug is wide-spread on UN*X systems and affects almost all implementations of telnet daemons available.

L33tdawg: I've attached the advisory in the read more.

SuSE Security Announcement

Code Red virus probably began in China, according to a GAO official

posted onSeptember 3, 2001
by hitbsecnews

WASHINGTON (September 2, 2001 11:42 p.m. EDT) - The Code Red computer virus that gummed up Web servers around the world probably originated at a university in China, a congressional report released Friday said.

The Code Red virus "is believed to have started at a university in Guangdong, China," according to Keith Rhodes, the chief technologist for the General Accounting Office, Congress' investigative arm of Congress.

Rhodes' testimony was given to a hearing Wednesday and released Friday by the GAO. He did not elaborate on the origin of the virus.


Code Red Traced To University In Southern China

posted onSeptember 3, 2001
by hitbsecnews

The Code Red computer worm, which caused $2.4 billion in estimated clean-up costs, seems to have been born at a university in China's southern Guangdong province, according to an investigative arm of the U.S. Congress.
August 31, 2001. Full story over at SCMP.com (registration required).

NASA uses OpenBSD; overcomes 802.11b security flaws

posted onSeptember 3, 2001
by hitbsecnews

The network security group in the NASA Advanced Supercomputing (NAS) Division at Ames Research Center, in California's Silicon Valley uses OpenBSD and other open source software for its wireless firewall gateway implementation. They successfully installed a secure interoperable wireless network addressing the well-known problems of the 802.11b standard wireless systems.

The NAS security group believed that the wireless network
provided provide no substantial security protection in any of three
important respects:

Hotmail hacked yet again - Microsoft thankful.

posted onSeptember 2, 2001
by hitbsecnews

Well it looks like Microsoft's Hotmail and Passport services have been hacked
yet again. This time however, Microsoft owes this computer geek their soul. Jeremiah
Grossman, a former security auditor for Yahoo!, had created a mere 3 lines of code
which compromised Hotmail and Passport. After it had been patched, in a short
matter of time he released another single line of code. The only difference however, is he released the

US Government re-issues telnet warning

posted onSeptember 1, 2001
by hitbsecnews

A warning has been re-issued by the National Infrastructure Protection Centre (NIPC)
about a vulnerability in the telnet daemon program following "numerous reports" of intruders
exploiting the hole. The NIPC, part of the US government, also fears that users may face a
flood of worms that attack the vulnerable program using a buffer overflow technique,
following the recent discovery of a Unix worm, 'x.c'.

Top Hacking Tools Site Restricts Access to Hacker Programs & Tools

posted onSeptember 1, 2001
by hitbsecnews

Citing a desire to thwart "script kiddies" and security companies, a popular site that provides free hacking tools has closed its doors to the general public. Hack.co.za will no longer allow all visitors to download its collection of exploits, according to its operator, a South African who uses the nickname Gov-Boi.