Network security is a daily and complicated struggle for most network administrators who strive to keep on top of the latest virus outbreaks, network intrusion attempts, software patches, and web and email scams. Comprehensive Network security today requires a layered approach so that internal network resources can be properly protected against all the different types of malicious content out there. Properly designing and maintaining a network to guard against these attacks can be a challenge to even the most seasoned admin
Why attack Twitter?
The recent high profile attacks on social networking sites such as Twitter and Facebook may give us a glimpse into the underground world of spammers, crackers, and those who style themselves as 'bot-herders'. As you're probably aware Twitter is a social networking site that allows users to generate short messages or 'tweets' which are then disseminated throughout the internet to a larger audience. The service started only a few years ago and since then its usage has exploded partly due to its high profile involvement in such recent events as the Iranian presidential election protests
How to protect your network from cyber-attacks
There are three measures network administrators can take to avoid the types of network attacks that plagued US and South Korean websites including www.whitehouse.gov, NASDAQ, NYSE, Yahoo!'s financial page and the Washington Post. The three areas to focus on are network based mitigation, host based mitigation and proactive measures. Network based mitigation: Install IDS/IPS with the ability to track floods (such as SYN, ICMP etc.) Install a firewall that has the ability to drop packets rather than have them reach the internal server.
Choose the battlefield
PC World's Jaikumar Vijayan recently reported on the attacks against US government public information infrastructure. In the article, Karen Evans, a Bush administration Information Systems executive outlined what she thought should be fast-tracked. It includes using TICs (Trusted Internet Connections) for all public infrastructures.
As Slowloris HTTP DoS Rises Astaro is Ready
Recently the Slowloris Denial of Service attack has jumped in popularity. This attack is similar to SYN flood, but uses HTTP instead, basically consuming sockets on the Web Server vs
Advice for the Cyber Czar
Yesterday, the Washington Post reported that President Obama is preparing to announce the appointment of a national “'cyber czar,' a senior White House official who will have broad authority to develop strategy to protect the nation's government-run and private computer networks”, and that this announcement will coincide with the release of the government's cyber-security initiatives and policies. While I am not holding my breath waiting for a call from the White House, I do have some advice for the new cyber czar. First of all, it is going to be important for you to be transparent and to quell fears that this is the first step towards an Orwellian world.
Upcoming Up2Date 7.009
Tomorrow morning (CEST) we will release Up2Date 7.009 which will fix two remaining issues from 7.008: downloads via HTTP Proxy using MS Internet Explorer and HTTP domain whitelist entries. Downloads via HTTP Proxy using Internet Explorer (ID6859) When trying to download a file via HTTP Proxy with Microsoft Internet Explorer 6 or 7, the download manager page does not refresh automatically and the download is not shown as finished after scanning succeeds. Mozilla based browsers are not affected.
ACC 1.400 released [Middle]
This new ISO and Up2Date changes the GUI to the new look&feel to the ASG V7 style and it adds V7 support.
Astaro Security Client V8.2
We are pleased to announce Astaro Security Client V8.2 This new release includes the following new features: Enhanced Personal Firewall capabilities: advanced options to configure stateful packet inspection rules for individual applications all firewall mechanisms are optimized for Remote Access applications and are activated when the computer is started Personal Firewall is activated as soon as the computer starts Automatic Hotspot Logon automatically detects hotspot websites in a public WLAN area dynamically releases the ports for http or https for hotspot logon or logoff prohibits client from direct communication to the Internet bypassing the VPN tunnel Import of Configuration Data from ASL Profile settings created by Astaro Security Linux can be exported from the gateway (starting with Release 5.203) and imported directly into the Astaro Secure Client Support of compression type Deflate compression type Deflate can now be used in conjunction with ASL to speed up data transfer Automatic detection of familiar and unfamiliar networks different firewall rule sets can be deployed and activated automatically for each type of network Download Information The new release of Astaro Secure Client is available immediately. Customers currently using Astaro Secure Client 8.1x can upgrade to the new release free of charge. Use MyAstaro for Downloads and Licenses
New Astaro Secure Client released
Astaro Secure Client for VPN Networks. A Virtual Private Network (VPN) allows organizations to use the Internet for communication with mobile employees and remote offices at a low cost while maintaining excellent security. The Astaro Secure Client ensures the highest levels of security for VPN. It provides strong user authentication and end-to-end encryption so that mobile workers, home workers, and remote offices can communicate securely over the Internet with a central VPN gateway.