Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: January 2005

Laptop Data At Risk, Vendor’s Study Finds

Posted on January 24, 2005December 30, 2021 by admini

According to the study of about 200 small- and medium-sized business IT managers, 50 percent of those businesses don’t have a formal procedure in place for backing up enterprise data stored on laptops, Imation said in a statement.

“As the workforce becomes increasingly mobile, more and more ‘mission-critical’ information, such as customer records, sales presentations and company financials, is being stored on laptops putting data at potential risk of loss,” Brent Ashton, Imation’s marketing manager for small and mid-sized businesses said in a statement.

About 40 percent of the companies in the survey have what the vendor called an extensive network of laptop computers, but only half of those companies had formalized backup procedures for those laptops, the survey found.

http://www.mobilepipeline.com/showArticle.jhtml?articleID=57703148

Read more

Hackers use old-fashioned eavesdropping to steal data

Posted on January 24, 2005December 30, 2021 by admini

The danger of attacks with insider information was illustrated earlier this month with the arrest of a California man accused of breaking into mobile phone network T-Mobile USA’s database and reading e-mails and files of the U.S. Secret Service, and by the exploits of a hacker who breached a hospital’s database and changed mammogram results.

The nature of threats to network security has changed as sophisticated hackers learned to tap into sensitive information flowing through telecommunications’ servers, especially those that provide wireless and Internet access.

Security experts at Intrusic captured 4,466 passwords and 103 master passwords allowing global access to corporate databases while monitoring one Internet service provider for a 24-hour period, Intrusic President Jonathan Bingham said.

“Telecoms and cable companies are pretty high on the list simply because of their huge customer bases,” Koetzle said. “If they can crack T-Mobile’s database they can get user names and passwords for (millions of) subscribers at all once.” In a statement, T-Mobile, a Deutsche Telekom AG unit, said it “quickly put in safeguards to prevent further access and began an investigation” after a hacker broke into its internal computer systems in 2003 and accessed data on 400 customers.

The key to cutting down on damage from inevitable insider attacks is to constantly monitor data flow and train employees to guard passwords and access to computers, he said. Stan Quintana, director of managed security services at AT&T Corp added that among the “best practices” AT&T advocates is that its customers periodically hack into their own networks.

http://www.usatoday.com/tech/news/computersecurity/2005-01-24-hackers-listening-in_x.htm

Read more

Flaw found in Office encryption

Posted on January 20, 2005December 30, 2021 by admini

The problem arises because Microsoft programmers did not implement the encryption correctly in its Office applications, Hongjun Wu, a cryptographer at the Institute of Infocomm Research in Singapore, wrote in a paper on the topic.

“A lot of information could be retrieved from those encrypted files,” Wu said in the paper. “If anyone has used the encryption in Microsoft Office…then it is time for him/her to assess the damage that has been caused.”

Microsoft said that it has begun investigating the flaw. “Our early investigation indicates that this issue poses a very low threat for customers,” Microsoft said in a statement sent to CNET News.com. “In some cases, an attacker may be able to read the contents of an encrypted file, if multiple versions of that file are available to the attacker. The attacker would need to have access to two distinct files with the same name that are protected by the same password in order to attempt to exploit the vulnerability.”

In the world of cryptographers, encryption schemes that encode more than one message using the same key are seen as flawed. That’s because a comparison of the information in the encrypted messages can significantly shorten the search for the correct key to unlock the messages.

The Microsoft Office flaw is the latest issue that Microsoft has had with implementing encryption in its products. Security researchers have taken the company to task repeatedly in the past for the weak passwords in previous versions of the Windows operating system. Moreover, the company was at the center of a debate in 1999 on whether the code keys central to Windows NT security were actually secure.

The current issue is almost identical to the weak system key issue in 1999, said Bruce Schneier, chief technology officer of Counterpane Internet Security and author of “Applied Cryptography.” “This is a kindergarten crypto mistake,” Schneier said. “And to make it twice is worse.” Schneier, who wrote about the issue on his blog earlier this week, hammered at Microsoft for not learning from past mistakes. The software maker said that it had not uncovered the newly reported vulnerability in its code reviews, but noted that the flaw appeared similar to a previous flaw.

Microsoft also said it would review the cryptographic code in Office. “Upon completion of this investigation, Microsoft will take the appropriate actions to protect customers, which may include providing a security update through our monthly release process,” the company said.

http://news.com.com/Flaw+found+in+Office+encryption/2100-1002_3-5543940.html?part=rss&tag=5543940&subj=news.1002.5

Read more

‘Evil twin’ fear for wireless net

Posted on January 20, 2005December 30, 2021 by admini

Once logged onto an Evil Twin, sensitive data can be intercepted.

“Users need to be wary of using their wi-fi enabled laptops or other portable devices in order to conduct financial transactions or anything that is of a sensitive or personal nature,” said Professor Brian Collins, head of information systems at Cranfield University. “Users can also protect themselves by ensuring that their wi-fi device has its security measures activated,” he added.

BT Openzone, which operates a vast proportion of public hotspots in the UK, told the BBC News website that it made every effort to make its wi-fi secure.

“This means that users’ personal information and data, logon usernames and passwords are protected and secure,” said Mr Clark.

In the vast majority of cases, base stations straight out of the box from the manufacturers are automatically set up with the least secure mode possible, said Dr Nobles.

Cybercriminals who try to glean personal information using the scam, jam connections to a legitimate base station by sending a stronger signal near to the wireless client. “Cybercriminals don’t have to be that clever to carry out such an attack,” said Dr Phil Nobles, a wireless net and cybercrime expert at Cranfield. “Because wireless networks are based on radio signals they can be easily detected by unauthorised users tuning into the same frequency.”

Although wi-fi is increasing in popularity as more people want to use high-speed net on the move, there have been fears over how secure it is.

http://news.bbc.co.uk/2/hi/technology/4190607.stm

Read more

Intrusion-Protection Systems

Posted on January 20, 2005December 30, 2021 by admini

The Blaster attack came only 25 days after the patch was released, and Sasser was even faster–18 days.

In March, the Witty worm struck a buffer-overflow vulnerability one day after the flaw was discovered.

Network IPSs (intrusion-prevention systems) can help keep your systems safe by identifying and blocking suspicious traffic.

Fully 80 percent of respondents to Network Computing’s 2004 Reader Poll have a NIP in place or plan to implement one within a year.

We invited vendors to send their systems to our University of Florida partner labs during the height of the 2004 hurricane season for what turned out to be a storm-wracked test–literally.

Ultimately, we tested nine devices: Check Point Software Technologies’ InterSpect 610, Fortinet’s FortiGate-3600 Antivirus Firewall, Internet Security Systems’ Proventia G1000-400, Juniper Networks’ NetScreen-IDP 1000, Lucid Security’s ipAngel X3 AVS-400, Radware’s Defense- Pro AS-III/SME, SecurityMetrics’ Security Appliance Model 60, TippingPoint Technologies’ UnityOne-1200 and V-Secure Technologies’ V-Secure V-1000.

Determina, Mazu Networks, NetContinuum and Privacyware decided that their products did not fit our requirements.

Our invitation specified that each device must be a self-contained system able to identify network attacks and prevent them through its own action, rather than by sending commands to a firewall or other piece of network infrastructure.

We also requested systems capable of handling the expected 400-Mbps flow through our test network core switches.

As it turned out, we tested using traffic moving across the core of the university’s network, where flows averaged more than 600 Mbps, peaking at more than 800 Mbps with 180,000 to 250,000 simultaneous connections.

Of course, we wouldn’t penalize entrants for not coping with conditions we hadn’t told them to expect, but the larger flows did give us an off-the-record look at device capacity, revealing how the products handled a large amount of real network traffic with lots of live exploits and false positives.

Lucid’s and SecurityMetrics’ offerings, using applications such as Snort combined with proprietary console and management software, are more configurable than their proprietary brethren.

Some can rate-limit particular traffic streams, and Radware’s product offers sophisticated traffic-shaping capabilities.

In most cases, you’ll want to stop high-volume and disruptive attacks, knowing that attacks on the fringes of your definitions will get past the IPS and be stopped by other network components.

Because almost all IPSs are deployed inline, false positives are almost certain to generate more user complaints than attacks stopped by an application firewall.

In the first phase of testing, ISS’ Proventia identified the majority of attacks confirmed by our IDS with very few false positives.

This is in contrast to Radware’s DefensePro, which was tougher than a celebrity bodyguard, treating virtually anything anomalous as a possible undesirable.

The FortiGate’s signatures also discovered many of the attacks confirmed by our IDS, while flagging some activities that signature refinement would pass.

While Juniper’s NetScreen IDP identified a considerable amount of traffic as problematic in a default configuration, generating a high number of alerts that might be considered false positives, this product begs to be customized, with a toolset that will make the modification process quick for a security specialist.

They balanced solid default performance and easy setup with rich functions for drilling into attack details and writing custom signatures.

However, we award only one Editor’s Choice per review, and Juniper’s NetScreen has the edge.

FortiGate is reasonably priced and has tons of good features and a well-made interface, but NetScreen is the most flexible and powerful IPS we tested.

There are systems designed to make intrusion prevention an automated and unobtrusive process–and then there’s the NetScreen-IDP 1000.

If your security staff includes someone with the know-how and desire to delve into every detail of an attack and who will be tasked with writing custom signatures to handle the specific requirements of your network, the IDP 1000 is your kind of IPS.

As a signature-based device, Fortinet takes the automated approach, in which new signatures are pushed to the device through the management system after being downloaded from Fortinet’s signature service.

We found that with the system fully configured, the base latency peak with no device under test in the network was triple what it had been when the traffic flow went beyond 500 Mbps.

We agree–we tried running the two apps on a single server.

Although it was a well-configured server (dual Xeon processors and plenty of RAM), the management console’s performance was noticeably slow in several situations, particularly when we were trying to generate reports based on sizable log files.

In our live data testing, ISS identified the majority of attacks without blocking much legitimate traffic.

During the generated traffic testing, the G1000-400 stopped the Code Red worm with signatures and responses defined as a default event within the interface.

The management console showed the stopped attack as an event rather than a standard attack–all the individual facts of the event were correctly reported, but we were fascinated by the bin into which the attack was placed.

From a security standpoint, we found a solid level of paranoia built into the system; for example, when we started the sensor, it wouldn’t pass any traffic.

Once we configured interfaces and zones, we found that attacks were properly identified and stopped.

The rule was nice and tight, too, allowing legitimate traffic through, though similar in many respects to banned traffic.

Other traffic passed without noticeable latency being introduced at any traffic level up to the 400-Mbps rated throughput and beyond.

There’s a plug-in for using the ISS vulnerability-assessment scanner as part of the total management interface–useful for organizations looking to build integrated security capabilities.

In the final analysis, there are a lot of nice touches in this reasonably priced system.

If you need a constant stream of reports for management, or if you simply need an IPS with very solid reporting for your own analysis, the Proventia appliance is a sound choice.

Proventia Intrusion Prevention Appliance G1000-400, $29,314 (includes tech support, updates and advanced exchange; unlimited SiteProtector console costs are built into the appliance price).

TippingPoint’s UnityOne-1200 Intrusion Prevention System is the best unit we saw for out-of-the-box “set it and forget it” intrusion prevention.

If you want an appliance that will handle a lot of traffic with solid protection while insulating your network admins from the nitty-gritty details of the IPS, the UnityOne is for you.

But if you take a serious hands-on approach to tweaking an IPS, there are some portions of the interface that will give you pause.

TippingPoint starts with a clean user interface that didn’t give us too many places to go looking for things.

It almost feels like there aren’t enough things to do, but that might be related to the number of functions enabled out of the box, such as workable initial configurations for signature use, response and reporting.

Setup was quick and easy, but some daily administration items are hidden–TippingPoint made us jump through hoops to get raw data to verify which packets triggered events, for example, or for forensics purposes.

TippingPoint says it designed UnityOne to always be deployed inline; the company had serious reservations about the first phase of our testing.

When we looked at its performance results, we were puzzled by some jitter–latency increased, but individual packet latency varied widely because of the nature of our test traffic.

SecurityMetrics entered the IPS market with a system based on Linux, Snort, Nessus and other open-source software joined with a custom integration and management wrapper.

If your needs are more modest than the large-enterprise model we used in our testing, the Model 60’s bandwidth limitations should be of no concern.

Add in the fact that we got to know four separate Radware boxes, and we wound up with a high-performance product that finished in the middle of the pack.

We’re not sure what happened–nor are the Radware engineers–but three consecutive DefensePro devices didn’t like our lab.

DoS attacks, for example, can be limited to a small portion of your total bandwidth, minimizing the impact while letting legitimate traffic from the offending network (or server) continue.

The default settings from Radware were restrictive, and we ended up tweaking considerably (as you will with any product of this type) to limit the number of positive responses.

The InterSpect 610 lived up to our performance expectations, with no meaningful latency introduced, and it offers an easy-to-understand, mature user interface for configuring and administering its functions.

These devices continue to refine their detection and response characteristics over the life of their deployment, so it’s highly unlikely that any limited-duration test will showcase all their capabilities.

After looking at reports from the first portions of our testing, we did tweak settings so that the InterSpect was more active in reporting worm detection.

The facilities for writing your own signatures are built into the system’s software, with an interface that’s consistent with the product’s straightforward nature.

The ipAngel is one of two systems we tested that make use of the open-source software available to run on Linux.

Read more

Some Companies Switching From Microsoft’s IE Browser

Posted on January 18, 2005December 30, 2021 by admini

While the results may fall short of a trend–in many cases they involve companies with fewer than 100 employees–there were enough organizations making the switch to deem their actions noteworthy.

A full 106 of the 186 respondents–57%–to our unscientific poll had recommended to computer users that they switch from IE to an alternative browser. In almost every instance, these organizations said concern over IE security problems hasn’t been overstated.

Asked to comment on the responses to our poll, Microsoft, through its public relations agency, sent a lengthy E-mail (full text of E-mail) stating, “We’re aware that some people have recommended against IE, but we also know that hundreds of millions of users use Windows because of its broad ecosystem of applications that are constantly being tested and implemented.” Also in its reply, Microsoft states, “Microsoft exhaustively tests all new updates to IE (security and otherwise) to ensure that applications and Web sites continue to behave as expected.”

Because of the unscientific nature of the poll, perhaps the most reliable information comes from detailed interviews with those working with the two browsers. Some had informal business-technology operations, where people with an affinity for computers become de facto tech staff along with their other duties.

One Information Technology Services department made the move “because the threats are real and alternatives exist to mitigate Web browser vulnerabilities,” according to a statement the department issued.

Cliff Kachinske, for instance, said Penn State’s decision prompted him to recommend that the almost 100 employees of his company, Advanced Control Systems, drop IE. Advanced Control Systems has no formal IT department. The hospital uses IBM AIX for its main application server and Red Hat Linux for its E-mail server. At about the same time Penn State was making its recommendation to drop IE, Ben McLendon, director of IT for the Valdosta Women’s Health Center, says he was doing the same.

He hasn’t made the same recommendation to the hospital’s business office, though, because it’s protected by a physical firewall, anti-spam software on the E-mail server, and server-based Symantec antivirus apps. McLendon’s decision to leave IE alone in the business office touches on the inevitability of a browser that had a market share of 90.6% as of Jan. 7, according to the Web-analytical-application maker WebSideStory Inc. Firefox had a 4.6% market share, according to WebSideStory.

In its E-mail to us, Microsoft is in line with Yenne: “As long as malicious hackers exist, there is always an opportunity for online threats and no browser is immune to this. Its execs say tweaks are being made periodically. And, in fact, when Microsoft released Windows XP SP2 last summer, there was an upgrade to IE, called Internet Explorer 6 SP2.

Again quoting from the E-mail from Microsoft: “It’s too early to provide a list of specific [IE] features, but major investments are being made in the areas of end user features, security and privacy, and developer support (for both add-on and Web-site developers).” For some, those words are not half the promise needed to keep them in the IE fold.

http://www.securitypipeline.com/news/57702035;jsessionid=2TEMQO2R0OR0KQSNDBCCKH0CJUMEKJVN

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme