New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 988
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image crkatk: Internet: Internet Attacks Climb During Third Quarter image
Crack Attack
Internet Attacks Climb During Third Quarter
By Gregg Keizer
Courtesy of TechWeb News

Confirming what most enterprise IT administrators already know, a security firm on Tuesday released a report that concluded the Internet poses an increasingly more dangerous threat.

According to Internet Security Systems' newest report, which tracked security events from July through September, the number of security threats climbed 9 percent in the third quarter over the previous three months, and the more serious incidents -- which ISS defines as confirmed attacks or those that present unusual risk -- rose by 15 percent.

Although fresher, ISS's data mirrors that of other security firms. In early October, for instance, Symantec also noted a spike in security threats and attacks during 2003.

Like Symantec before it, ISS's researchers attributed the rise in security incidents to ever-nimbler hackers who jump on vulnerabilities almost as soon as they're discovered.

There's this myth that companies have weeks to patch a vulnerability before an exploit hits, said Dan Ingevaldson, the director of ISS's X-Force threat research team. But the fact is really that there are now only a handful of days between when a vulnerability is made public and when an exploit appears on the wire.

Citing a slew of examples, including the notable MSBlast worm -- which took advantage of a vulnerability in Microsoft Windows with an widespread attack just 11 days after that flaw was revealed -- and a less-well-known denial-of-service (DoS) vulnerability in Cisco's hardware, which was exploited only two days after disclosure, ISS said the fast, aggressive tactics by hackers give enterprises little time to patch systems before worms and Trojan horses start appearing in the wild.

Patching vulnerable servers and desktops is increasingly seen as a resource drain by enterprises, with no real end in sight to the problem, said ISS in the report. The disclosure of vulnerabilities, release of proof-of-concept or malicious code and active exploitation of vulnerabilities creates a cycle of exposure, urgency to patch, and possible compromise or disruption, the report stated.

ISS has an interest in pointing out the profit-draining qualities of patching, for it sells security software and appliances which it touts as able to defend against exploits of unpatched vulnerabilities.

ISS also noted that attacks during the third quarter were more varied -- often relying on blended threats that use multiple vectors, or avenues of infection -- than in the previous three months, making administrators scramble all the more to close security gaps.

Likewise, the sheer number of worms, viruses, and Trojan horses released by hackers in the third quarter present problems. According to ISS, some 823 new exploits were sent into the wild during July, August, and September, an increase of some 26 percent.

Down the road, things look just as gloomy, said Ingevaldson, who claimed that his team can predict which vulnerabilities become worms, automated exploits that can spread rapidly and because of that, wreck havoc on networks.

Among recent vulnerabilities that Microsoft has disclosed in its various products, Ingevaldson said, he's betting that Windows Messenger Service and the Workstation service in Windows will become worm targets.

Unfortunately, although we can fairly accurately predict if a worm is going to come out of an exploit, it's a lot harder to predict when.

The full article is at SecurityPipeLine
Posted on Monday, 24 November 2003 @ 04:10:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· More about Crack Attack
· News by phoenix22


Most read story about Crack Attack:
Beware Attacker from IP 200.55.7.235 and Whole 200.x.x.x Block

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register