HITBSecConf2017 Amsterdam (April 10th - 14th)
Register Online Now!
he assumption that network port scans are a precursor to attempted hacks into computers may be misleading, according to research at the University of Maryland’s A. James Clark School of Engineering.
An analysis of quantitative attack data gathered by the university over a two-month period shows that port scans precede attacks only around 5% of the time, said Michel Cukier, a professor in the Center for Risk and Reliability at the engineering school. In fact, more than half of all attacks are not preceded by a scan of any kind, he said.
Terrorist groups lack the capability to launch a damaging Internet-based attack on the United States but foreign governments are probably behind many online spying attempts, FBI FBI officials said on Wednesday.
Al Qaeda and other militant groups do not have the ability to disable power plants, airports and other "critical infrastructure" through the Internet, said FBI Assistant Director Louis Reigel, who heads the enforcement agency‘s Cyber Division.
More than 80 per cent of US home computers lack at least one of the three basic security measures needed to guard against online threats, a recent study of internet users has found. The study by AOL, the internet portal, and the National Cyber Security Alliance, an industry group, found that many computer users remain unaware of their vulnerability to malicious hackers, viruses, and scam artists.
A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us. With sensors all over the house, it even knows when someone opens a door, and can sense the difference between our dog and a burglar – well that’s what the man told us and after all who are we to disagree. Along with the system comes an impressive panel that allows us to switch it on, and off, and do all kinds of clever things. It’s all described in the excellent documentation although we cannot understand how to use it.
First of all, I must tell that I'm really impressed on the fast reaction of Cisco. Only 2 days after the public
release of the vulnerability (and they were not notified) they have recognised the flaw, they have
published an advisory and they offer some workarounds to this problem, and best of all, they are giving credits.
Good work Cisco, I think that's the right way.
Here you have the Cisco advisory: "http://www.cisco.com/warp/public/707/cisco-sa-20051201-http.shtml".