In this article series I will describe active and passive OS fingerprinting, the concepts that make them plausible, and go through some examples of how to do this in a manual and automated fashion.
As schools continue the move toward smart classrooms, students are provided with near constant access to the Internet and web usage is growing at an exponential rate. As an IT admin, this leaves a big responsibility for providing safe internet access to the network for students, teachers and faculty alike.
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud IPv6 TC WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get business done while cutting costs and increasing productivity . Register
I find it utterly amazing that security vendors believe that one size of product and solution can fit in any size organization. Some have had even major summer releases that address scalability and performance in this one-product- fits-all approach. Point and shoot scanners as standalone products can operate in any size environment, but without a [...]
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud IPv6 TC WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get business done while cutting costs and increasing productivity . Register
An Iranian user reported that there is the threat of man-in-the-middle attacks using a fake SSL certificate that was circulating as of Aug. 29. The fake certificate, which was legitimately signed, was displayed when logging into Google's Gmail. - Mozilla will be releasing new versions of Firefox, Firefox Mobile and Thunderbird
to revoke certificates signed by DigiNotar after reports of at least
one fake SSL certificate from DigiNotar for various Google services.
Google will also mark DigiNotar untrusted in the next release of the Chrome...
Project managers aren't properly assessing low-probability, high-impact risks when planning budgets and timelines for IT projects. - Major
IT projects are 20 times more likely to fail than other business projects,
according to a recent study from Oxford University.
IT
projects on average are 27 percent over budget and take 55 percent longer to
complete than originally planned, researchers from the University
of Oxford's Sai...
Nokia shut down its developer community site after it discovered that an earlier security breach wasn't just a page redirect, but that attackers had obtained user data. - Nokia has suspended its
developer forum after a recent attack compromised member data.
Users registered with the
Nokia developer forum had their personal information, including email
addresses, compromised, the Finnish phone giant said in a note posted Aug. 29 on
the company Website. Other info...
The latest Internet worm targeting Windows Remote Desktop Protocol attacks the lowest-hanging fruit: weak administrator passwords. A tip: "letmein" is not a good password. - A new worm, called quot;Morto, quot; has
been infecting machines via Remote Desktop Protocol on Windows machines,
according to security researchers.
Morto is the first Internet
worm to use RDP as an infection vector, Mikko Hypponen, the chief research
officer of F-Secure, wrote Aug. 28 on the ...
I had to do a double take on my Google Alerts this weekend when I saw the first of discussions around a worm dubbed “Morto” infecting systems via weak password brute forcing of Windows accounts over the Remote Desktop Protocol (“RDP”). These automated worms take me back, to the old days of CodeRed, Slammer, Sasser, [...]
The top IT security news of the past week included the discovery of new malware with Zeus banking fraud features along with new development in Web user privacy-related news and mobile-application security. - Security
researchers identified new malware variants that had taken on features from Zeus to turn ordinary
run-of-the-mill malware into sophisticated worms with back fraud capabilities.
With both Zeus and SpyEye code readily available to cyber-criminals, there will
be more strains with capabilit...
Confident Technologies introduced an image-based add-on to its authentication technology to foil attackers relying on brute-force methods to crack passwords and break into accounts. - Confident Technologies
claimed its latest authentication technology can prevent hacking attempts while
they are happening.
The new product, Confident
KillSwitch, identifies and protects against quot;brute force quot; attacks on
account log-ins, password-reset processes, transaction verificatio...
Google follows new Facebook privacy controls with options to ignore and block users at a time when the social media noise is building on the nascent network. - A few days
after Facebook added more granular privacy features for its vast network of
nearly 800 million users, Google+ has added two more grains of private sharing:
the quot;ignore quot; and quot;block quot; options.
Ignore means
users will see less of what a person is sharing. The new bloc...
As Hurricane Irene barrels up the East Coast, cyber-criminals will likely launch phishing attacks and other malicious activity tied to the storm news, according to the Department of Homeland Security. - Cyber-criminals may take
advantage of the public's desire for information about
Hurricane Irene to push out malicious emails and other cyber-scams, the
Department of Homeland Security warned.
Government agencies and
private companies should be on the lookout for phishing attacks masquerading as...
Salesforce.com acquired Navajo Systems, a company that locally encrypts and decrypts corporate data via its VPS platform before it leaves the enterprise and goes into the cloud. - New encryption technology at
Salesforce.com may ease customer concerns about data security in the cloud.
The software as a service (SaaS)
giant quietly acquired Navajo Systems, an Israeli cloud security encryption
vendor earlier this month, Salesforce.com told eWEEK Aug. 26. The company will ann...
Researchers at F-Secure identified the malicious Excel spreadsheet and the email that was used to phish RSA Security earlier this year when SecurID information was stolen. - After EMC's RSA Security disclosed earlier this year that
unknown attackers had breached its systems via an e-mail with a malicious
attachment, security researchers wondered what the file had contained and how exactly
it had breached the security company.
Researchers at F-Secure think they may h...
I recently watched IT administrator mailing lists buzzing with conversations about where everyone could buy an HP TouchPad – with the almost free price, now that HP has discontinued the product. It was not only IT people looking to cash in on the sweet deal, but consumers also, which means employees (maybe at your company!), who [...]
Masked data is used in application development, testing, quality assurance, support and business analysis by a range of private and governmental entities. - Data security intelligence and protection specialist Dataguise released a report suggesting data masking, or the de-identification of sensitive data used in application development, testing and business analysis, can go a long way to improving a business or organizations ability to protect itself ag...
Utilities are expected to invest in cyber-security measures to protect electrical grids as they upgrade the infrastructure to include smart meters and other technologies. - Increasing risks to the
electrical grid will require utilities to invest a total of $4.1 billion
between 2011 and 2018 in cyber-security for industrial control systems,
research firm Pike Research said Aug. 23. The investments will be part of the
larger upgrade to the nation's energy grid, which...
Diabetic security researcher Jerome Radcliffe, who hacked his insulin pump at Black Hat, accused Medtronic of not taking security of its devices or his research seriously. - At
the Black Hat security conference earlier this month in Las Vegas, a security
researcher stood on stage and demonstrated how a malicious third party could
transmit wireless commands to
remotely disable his insulin pump.
During
his Aug. 4 demonstration, Jerome Radcliffe declined to disclose ...
Apache has promised a patch in the "next 96 hours" to fix the vulnerability that exposes Web servers running the Apache software to denial of service attacks. - A denial-of-service tool that exploits a security flaw in the Apache
Web server software is available in the wild. The Apache team is
working on a fix and is expected to roll it out over the next few days.
Called quot;Apache Killer, quot; the DoS tool appeared Aug. 19 on the quot;Full
Disclosu...
Researchers at Kaspersky Lab and Trusteer have identified two different malware samples that have clearly taken on Zeus components to make it more complex and dangerous. - Shortly after the source code for the Zeus banking Trojan
was leaked earlier this year, security researchers predicted malware
developers would add Zeus features to existing malware to create complex and sophisticated variants. Researchers identified two such samples this week.
Portions of Zeus c...
The more conversations I have with security professionals, the more I see them strategizing how to best secure their networks with lower operating budgets. I see more and more individuals having to deal with security issues as well as other aspects of their IT department during daily operations. Their strategy has been condensed to acquire [...]
Symantec Altiris Client Management Suite was selected the winner in the Patch Management category of the WindowSecurity.com Readers' Choice Awards. WinINSTALL and GFI LANguard were runner-up and second runner-up respectively.
. Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Mike Fratto Bio Contact Archive Mike Fratto Network Computing Editor Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud IPv6 TC WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get business done while cutting costs and increasing productivity . Register Now More
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued a security advisory for Siemens' SIMATIC Step 7 PLCs a couple of weeks ago. I've previously recommended asset owners to monitor the network traffic in their Industrial Control Systems (ICS), and ICS-CERT have followed my[...]
It helps sometimes to laugh at yourself. It usually helps even more to laugh at someone else though. Rich, Zach and Martin spend a little time laughing at some of the stories in the security news at the moment as well as laughing at each other. We even laugh at the music for tonight’s podcast. [...]
Searching the internet finds a plethora of definitions, services, products, solutions, and even training classes for Enterprise Security and Risk Management. The topic is so broad that almost every security vendor falls into this category. At the middle of almost all the definitions (excluding physical security theft) is the protection of an organizations most treasured [...]
, Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud IPv6 WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get business done while cutting costs and increasing productivity . Register
Here at eEye, we’ve been discussing in great depth, the value of various risk scoring mechanisms, attack vectors, and exploit intelligence. Considering all the various standards that are being used to derive risk scores (proprietary, CVSS, PCI (based on CVSS with conditions), DoD Categories, etc.) and how organizations are currently prioritizing remediation efforts, we found a [...]
It’s funny that we’re getting to upload episode 251 before uploading episode 250. But given the chaos that was recording at Defcon in front of a hostile crowd, maybe it’s for the best. And maybe ‘hostile’ isn’t the proper word for it, since they were very friendly, they just enjoyed throwing the Core Impact balls [...]
Business network security and particularly web security can be tricky. On one side you’re trying to make sure users are happy, productive, and can get to all the websites and files they need to download – on the other, you’ve got to secure the network and prevent infection. One common mistake we see with web security is when administrators try to whitelist or allow a domain. Rather than being specific and allowing just what they need, they end up opening up the floodgates for infection or data loss.
Over the next few blog posts I’ll show you ways to leverage your investment in Retina CS to help automate and streamline various scenarios I run into in the field. One common scenario I see quite often happens when customers are first implementing a vulnerability management solution into their organization. I call this the ‘What [...]
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get business done while cutting costs and increasing productivity . Register Now More
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Whitepapers About Us Home News and Analysis Pro Reports Tech Centers Deduplication End to End APM Private Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Frank Berry Jeff Doyle Stephen Foskett Mike Fratto David Hill Howard Marks Joe Onisick Jim Rapoza Tom Trainer Upcoming Events Interop New York Oct 3-7 Register now to attend Interop New York , the IT industry's most comprehensive conference and expo . Learn about important innovations that help get business done while cutting costs and increasing productivity . Register Now More
The following is a special interview with Mr. Gregory Evans, conducted July 6th, 2011. This interview is unedited and played in it’s entirety. Mr. Evans is a unique individual and we’ll leave it up to you to form your own opinions about him. Interview with Gregory Evans
True to form for the even months of 2011, Microsoft released thirteen security bulletins today. Of the most interest are MS11-057 (Internet Explorer) and MS11-058 (DNS Server). While it has become fairly commonplace for Microsoft to release an Internet Explorer patch every other month, this release also patches IE9 – the second time a critical [...]
This article will take you through the mobile device management journey and how the holy grail of central device management is quickly being reinvented to ensure that your data, device and resources are safe.
Before I introduce you to the new networking features in vSphere 5, I want to take a moment and introduce myself first. My name is Venky and I work in the Technical Marketing group at VMware. I am responsible for...