Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: June 2004

Antivirus vendors await major Linux worm

Posted on June 11, 2004December 30, 2021 by admini

Many have developed Unix antivirus products, but are only now moving to Linux to deal with potential threats to businesses running both Windows and open source software.

Network Associates recently released its first Linux server antivirus software, citing the need to stop the transmission through Linux servers of malicious code aimed at Windows.

“Linux has been inherently more secure than Microsoft and the latter has also been targeted more heavily,” said Roger Levenhagan, managing director of Trend Micro UK. “But the full force of the antivirus industry won’t be devoted until Linux gets hit hard by a virus, and then consumers will demand it. We have products out there that address open source software but all the emphasis is still against Microsoft in the short term.”

The ADM worm was the first virus aimed specifically at Linux users and appeared briefly in 1998.

Symantec chief executive John Thompson confirmed in a statement that his company would “deliver a Linux desktop antivirus solution to the market” at some point this year, but did not give a time scale for development.

Graham Cluley, senior technology consultant at Sophos, added: “Linux has a better history for security than Microsoft, and hackers are more focused on Microsoft.

More info: http://www.infomaticsonline.co.uk/News/1155836

Read more

Cisco warns on Catalysis DoS danger

Posted on June 11, 2004December 30, 2021 by admini

The flaw can be activated by sending an incomplete transmission control protocol (TCP) handshake and can bring down the switch.

The Catalysis 6000, 5000, 4500 and 4000 series are all affected, as well as earlier switches that use the same code base. The company said in a statement: “Cisco is aware that some versions of the Cisco CatOS software may be susceptible to a TCP DoS attack under certain circumstances. Cisco has published a security advisory with mitigation techniques and free software upgrade information that may help customers protect themselves from potential exploitation. To date, Cisco is not aware of any active exploitations of the vulnerability and is working closely with its customers to address this issue.”

The flaw can be fixed by either a software patch or by reconfiguring the switch.

Only users of Telnet, HTTP or SSH services are vulnerable.

More info: http://www.vnunet.com/news/1155779

Read more

Computer intrusion losses waning

Posted on June 11, 2004December 30, 2021 by admini

Nearly 500 computer security professionals in US corporations, government agencies, financial institutions, medical institutions and universities responded to the 2004 survey, with 53 per cent reporting that their organization experienced unauthorized use of computer systems during the prior 12 months – down from 56 per cent in 2003.

Thirty-five per cent believed they had not been breached, and 11 per cent said they didn’t know.

Overall financial losses totaled out to $141m for the 269 respondents willing to quantify their losses, down significantly from 251 respondents reporting $202m in losses in 2003.

Reported losses to intellectual property theft plummeted to $11m in 2004, putting denial of service attacks in the number one spot as the most expensive computer crime, allegedly causing $26m of the total losses.

Twenty-eight per cent of the respondents said their organization had insurance policies to help manage cybersecurity risks.

Despite federal government efforts to encourage information sharing between industry and the Department of Homeland Security, the survey “detected no increase in the disposition to share information about security intrusions,” according to the report.

The percentage of companies suffering intrusions who reported them to law enforcement dropped from 30 per cent to 20 per cent; the most common reason for keeping an intrusion quiet was fear of negative publicity, a factor for 51 per cent of the companies that failed to report a breach.

While comparisons with previous years may be enlightening, the CSI/FBI survey is decidedly unscientific: the sample pool is self-selected from a panel of computer security professionals. CSI director Chris Keating cautioned against drawing overly optimistic conclusions from the downward trends reported in the study. “Obviously, computer crime remains a serious problem and some kinds of attacks can cause ruinous financial damage,” Keating said in a statement. We don’t believe that all organizations maintain the same defenses as our members – financial damages for less protected organizations are almost certainly worse.”

More info: http://www.theregister.co.uk/2004/06/11/csi_fbi_computer_intrusion/

Read more

Gartner: Misconfigured APs Cause Most WLAN Breaches

Posted on June 10, 2004December 30, 2021 by admini

“Whether hackers are able to enter a company’s WLAN through an unprotected AP or through a peer workstation, once they are associated with the network, they will be difficult to detect because they may not be visible in or near the network site,” said John Pescatore, vice president and Gartner fellow.

Pescatore made his comments at Gartner’s IT Security Summit this week in Washington D.C. He said that it is essential that enterprises prevent rogue APs and that “official” APs are configured correctly.

To do that, enterprises should install their own wireless intrusion detection sensors and not rely on methods such as having IT personnel walk the hallways with wireless sniffers.

More info: http://www.mobilepipeline.com/showArticle.jhtml?articleID=21700070

Read more

Security efforts paying offSecurity efforts paying off

Posted on June 10, 2004December 30, 2021 by admini

The Computer Security Institute’s survey of security professionals at nearly 500 companies found that damages related to cyberattacks declined, reaching about $290,000 per company versus $400,000 per company a year ago.

The report, conducted in cooperation with the FBI, also said respondents thought denial-of-service attacks outpaced intellectual property theft as the most costly type of information threat. Such a shift may indicate that companies are shoring up internal-network defenses, said Robert Richardson, editorial director for CSI and an author of the report. “If you get more effective in protecting what is inside your networks, then (attackers) have to resort to other things,” he said. “One thing you can resort to is denial-of-service attacks.”

Unlike thefts, which require an attacker to break into a system, DoS attacks typically involve an online miscreant sending a flood of data to a Web site to prevent others from accessing the site. This is the first time DoS attacks have topped the list of threats.

The survey, which measures responses mainly from information technology managers who work for companies that are CSI members, is considered an indicator of general trends but not a reliable measure of specific detail, said Richardson. “You have to be careful in general of results of this kind,” he said. “It highlights a lot of interesting things, but it also raises questions that can’t be answered by the data.”

Most companies kept security functions inside the company, with only 12 percent of those surveyed indicating they outsourced more than 20 percent of security procedures. Larger companies typically benefited from economies of scale and paid less per employee for security, the survey found. Companies with annual sales of more than $1 billion typically paid a little more than $100 per worker on security, while companies with revenue of less than $10 million spent an average of $500 per worker.

The survey also indicated that more companies are interested in computer security because of new government regulations. The financial, utility and telecommunications sectors believe that the Sarbanes-Oxley Act, which requires a company’s executives to be accountable for their financial statements, has resulted in management focusing on information security, Richardson said. This is the first year that the survey asked companies about the effect of the law.

More info: http://news.com.com/Survey%3A+Security+efforts+paying+off/2100-7355_3-5230787.html?tag=nefd.top

Read more

Shortage of computer security experts hampers agencies

Posted on June 10, 2004December 30, 2021 by admini

“There is an incredibly shrinking pool of IT security professionals in government,” said Jack Johnson, chief security officer at the Homeland Security Department. Johnson is working on developing the Homeland Security Information Network, which he said would be at Defense Department “secret level” by year’s end. He also said Homeland Security is looking to redesign personnel security to prevent internal cyber attacks.

“The sharing amongst bad guys is growing,” he said at a SecureE-Biz.net conference. “The sharing amongst the good guys on procurement, technology and approach needs to grow at an equal or greater rate.

The president last year signed a law authorizing a significant increase in cyber-security R&D funding, but it was not requested in the fiscal 2005 White House budget proposal.

Thomas O’Keefe, deputy director of the Federal Aviation Administration office of information systems security, said more research and development, and more collaboration among researchers and industry, is needed on cybersecurity. The air-traffic network is completely separate from the Internet, as well as other aspects of the FAA network, making it impossible for viruses to spread from those sources, he said.

More info: http://www.govexec.com/dailyfed/0604/061004tdpm2.htm

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme