Experts warned that the law would not fully protect anyone from dedicated hackers but acknowledged it could raise awareness of the vulnerabilities inherent in wireless technology.
http://entmag.com/news/rss.asp?editorialsid=7368
Security News Curated from across the world
Experts warned that the law would not fully protect anyone from dedicated hackers but acknowledged it could raise awareness of the vulnerabilities inherent in wireless technology.
http://entmag.com/news/rss.asp?editorialsid=7368
Security experts presume that cooperation amongst hackers, numerous websites and blogs containing root codes and binary executables all helped rootkits to spread and become even more difficult to detect and get rid of.
The only way to stop the fast growth and spread of rootkits is with the coming of Windows Vista, McAfee thinks.
http://www.xatrix.org/article4357.html
Development of the standards and supporting guidelines are the first phase of FISMA implementation, he said. “We’re completing the last document now,” Katzke said.
NIST has begun the second phase of implementation, which is an accreditation program for security assessment providers. A third phase, development of a system to validate FISMA compliance tools, is “out in the future.”
Keith Beatty of Science Applications International Corp. went out on a limb by praising the oft-criticized Common Criteria program operated by NIST and the National Security Agency. “You don’t get your evaluation before the product goes out the door,” one person said.
One person said the Common Criteria evaluation was not worth the $150,000 “entry fee” a vendor could expect to pay unless the vendor had a government contract in hand that would justify the process.
http://www.gcn.com/online/vol1_no1/40437-1.html
“We have a fair number of employees who are telecommuters,” says Dan Lukas, lead security architect at Aurora Health Care in Wisconsin, which operates 13 hospitals and dozens of clinics and has about 25,000 employees. These transcriptionists, situated all over the country, then remotely access Aurora’s private-line network over the Internet to file each transcribed recording with a patient’s online medical records. “More and more, physicians want access to their offices from home, and we’re giving radiologists secure access so they can read images from home,” says Bob Burritt, Kettering Medical Center Network’s director of technology.
Lukas says Aurora transcriptionists who telecommute are given PCs with a standard image on them for hospital applications and security, such as anti-virus. The hospital is migrating from a Cisco IPSec VPN to a Juniper SSL VPN, because it doesn’t require special agent-based software to deploy.
Despite the industry buzz about automated procedures for checking a user’s anti-virus and patch updates before granting network access, Lukas says Aurora officials, who recently tested Cisco’s Network Admission Control products, believe that for the moment it’s not a mature technology and is too expensive.
Consultant Tom Walsh recommends that organizations adopting telecommuting equip at-home employees with dedicated PCs to be used for work only.
http://www.networkworld.com/cgi-bin/mailto/x.cgi
Malicious users are also adapting and are exploiting security flaws quicker than ever before, paving the way to the appearance of so-called “zero-day” exploits: these appear virtually at the same time that the vulnerability is disclosed.
http://www.viruslist.com/en/news?id=184476427
The botnets are used by their owners to defraud Internet advertisers, as in Ancheta’s case, or they can be rented out by the hour to those who want to carry out cheap mass-mailing campaigns. Extortionists may also rent them to launch denial-of-service attacks on legitimate Web sites.
“We are seeing less of the big virus outbreaks such as Sasser and Blaster, and so some people believe the situation is getting better, when in fact it is getting worse,” said Mikko Hypponen, chief research officer at security company F-Secure. He sees botnets as a major problem that cannot be easily fixed, because the hijacked machines are mostly home PCs connected to an ADSL line.
“Once active, it monitors every Internet connection, every access to Web pages and access to the bank, and reports it back to the creator of the Trojan,” Sancho said.
While Windows PCs remain the prime target for attacks, prepare to see more activity targeted at the mobile phone. F-Secure recently detected the first malicious Java software on a cell phone, meaning it could affect most handsets, and not just the high-end models, Hypponen said. And in March, he spotted a Trojan horse that plants itself on the cell phone and calls a premium rate number in Russia, each time clocking up five euros ($6.04) for the criminal who sent it.
Even so, the rapidly growing world population of broadband users means that botnets will continue to be the main focus for Internet criminals.
All of the people in the Rogues Gallery of the world’s top 10 spammers, on the Spamhaus Project Web site, are constantly topping up their networks with new zombie machines owned by people with little concept of security.
http://news.com.com/Whats+the+next+security+threat/2100-7349_3-6061341.html