Skip to main content

Networking


Airport web access offers open house to hackers, say e-security experts

posted onAugust 14, 2001
by hitbsecnews

Experts are warning the wireless internet connections on offer at airports may pose a security risk to users. Wireless web networks are already a regular feature in frequent-flier lounges across the US and are being extended to many hotels and coffee shop chains.

In many cases users are unaware the lack of encryption means it may be easy for others to read their business e-mails and monitor their browsing. Digital security specialists Predictive Systems say public access local area networks - known as Wi-Fi in the US - often lack standard data security measures...


Security Tokens - Buyers Guide and indepth Review

posted onAugust 13, 2001
by hitbsecnews

If your organization is like most, your users log into your enterprise system with user names and passwords. And they probably log into multiple accounts, with each account requiring its own user name-password pair. Some applications employ authentication, asking for another user name-password set, and now your users are up to their necks in passwords.

MS Passport hijack

posted onAugust 12, 2001
by hitbsecnews

An explicit account hijacking exploit against Microsoft's Hotmail was published at Eye on Security, which can be easily adapted for other Web Applications and Web Mail packages, which make use of HTML, JavaScript and Cookie technology.


Step by Step Guide to Computer Attacks and Defenses - New Book by Ed Skoudis

posted onAugust 10, 2001
by hitbsecnews

Prentice Hall PTR today announced the publication of Counter Hack: A Step-by-Step Guide to Computer Attacks and Defenses by Ed Skoudis. Unlike other hacker books on the market, Counter Hack is a next-generation hacking book that presents a complete solutions-based approach to computer attacks and defenses for the IT professional protecting network infrastructure and data.

Various DoS techniques explained (Part 1)

posted onAugust 10, 2001
by hitbsecnews

This article details various DoS attack techniques. There have been many papers written about DoS attacks, so you are probably asking yourself why Netflood is writing one. The main reason is because when I discuss DoS attack techniques to people, very few seem to have a grasp of what they are, what they do, and/or why they work Lately, I've also gotten involved in conversations about whether DoS attacks (other than DDoS) even work and what the best methods are for doing DoS attacks. Since people seem to be asking me about it more, DoS must be a "hot topic", so why not cover it?

Microsoft Releases Code Red Cleanup

posted onAugust 10, 2001
by hitbsecnews

To undo the effects of an Internet worm that may have burrowed into hundreds of thousands of computers, Microsoft has released a new tool, Code Red Cleanup. Available from the Microsoft Web site, the small utility is designed to "eliminate the obvious effects of the Code Red II worm" from infected Web servers, according to the company.

86 percent of end users concerned about security

posted onAugust 9, 2001
by hitbsecnews

When it comes to security online, the Internet still has an image problem, with 86 percent of U.S. adults indicating that they are very concerned about the security of online bank and brokerage transactions, according to a study released Tuesday by Gartner Inc.