Skip to main content

Networking

CERT USA and CERT Australia to officially join forces

posted onAugust 22, 2001
by hitbsecnews

Carnegie Mellon's CERT Coordination Center - one of most visible Internet security groups in the U.S. - this week announced that it has joined forces with the Australian Computer Emergency Response Team (AusCERT) to address international security issues. CERT Coordination Center Manager Jeffrey Carpenter said today that the deal could be a prototype for other, similar arrangements with computer-incident-response organizations around the world.

Finnish Securities Company to Deploy Wireless VPN Security

posted onAugust 22, 2001
by hitbsecnews

The Finnish information security company SecGo Solutions Oy and data communications service provider Otaverkko Oy have that Otaverkko will deploy SecGo Solutions' VPN information security solution in its WLAN environment in Espoo, Finland.

Government Offers Tips for Wireless Security

posted onAugust 21, 2001
by hitbsecnews

While Craft hasn't encountered any serious wireless enterprise break-ins or hacks, that doesn't mean they can't happen--or aren't happening already. Nation states are known to intercept transmissions and even pass on intelligence to national industries, he says. If wireless spying is happening at opposite ends of the organizational spectrum, it's only logical to conclude that it's happening in the middle.

Craft describes the kinds of threats enterprises must be wary of; every current danger exists for wireless systems, but they will take new forms...

HOTMAIL HACKED!!

posted onAugust 21, 2001
by hitbsecnews

Grifter: And you can too...

I heard about this today but I haven't seen any news posted on this yet so I'm making my own.

Apparently you can view messages on hotmail just by knowing the Username of the individual you want to snoop on and inserting a message number. While you can't view the entire inbox, you can sift through their messages.

Info can be found at Root-Core

HTML 'Hack' Could Use Browsers To Open Net Security Hole

posted onAugust 21, 2001
by hitbsecnews

An independent computer programmer in Germany has discovered that malicious hackers
could wield seemingly ordinary-looking Web pages to send commands to servers behind
such barriers as corporate firewalls.

Jochen Topf, whose own software credits include a POP3-protocol server for managing
user access to large e-mail systems, says he found that many common Web browsers can
be tricked into passing on commands from hackers unbeknownst to the browsers' users.

Site Defacers Mining A New Vein In AIX

posted onAugust 21, 2001
by hitbsecnews

Microsoft's Windows operating system remains the overwhelming favorite target of Web
site defacers, but a relatively obscure Unix variant from IBM is all the rage with homepage
vandals.

New SSH attack weakens passwords

posted onAugust 21, 2001
by hitbsecnews

A team of researchers from the
University of California at Berkeley revealed two
weaknesses in Secure Shell (SSH) implementations
Friday that allow an eavesdropper to learn the exact
length of a user's password by observing the rhythm
of their keystrokes.

Beware MPLS VPN Tech Challenges

posted onAugust 21, 2001
by hitbsecnews

Plans to deploy virtual private networks using a new technology have sparked recent controversy, with the debate illustrating the need for technology managers to tune in to different ways carriers propose using Multiprotocol Label Switching.

MPLS is an advanced way of managing Internet traffic by letting carriers merge different types of data traffic over one IP backbone, improving their ability to offer different classes of service.

NIST releases 51 page Special Publication on Intrusion Detection Systems

posted onAugust 20, 2001
by hitbsecnews

NIST has released a 51 page comprehensive report on Intrusion Detection Systems. Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations.