Attacks+network

Showing results 1 to 20 of 99

Colasoft Packet Builder

Colasoft Packet Builder is useful tool used for creating custom network packets, you can use this tool to check your network protection...

March 31, 2010 by Colasoft

New wave of phishing attacks serves malware to PCs and Macs

Malware distributors have launched a new wave of attacks aimed at taking over unpatched PCs and Macs. They look like routine messages from a bank or a social network, but instead of phishing for passwords, they're serving up malware.

March 22, 2012

Hide My Ass throws light on 'LulzSec' logs

British virtual private network company Hide My Ass has said that it turned over logs on a suspected LulzSec member to the FBI in response to a UK court order.The court order requested information related to an account associated with a number of attacks on computer systems, Hide My Ass said in a blog post on Friday.

September 27, 2011 by

TracksTracker Lite

TracksTracer Lite allows network administrators to quickly and easily identify attacks against Microsoft IIS Web Servers. This tool...

March 14, 2007 by TrueProtection Software

LulzSec: Is it too cocky for its own good?

With a 19-year-old behind bars following network intrusions and denial of service attacks against "a number of international business and intelligence agencies," the fate of LulzSec remains an open question.

June 20, 2011

Melbourne IT shares show virtue: Turnbull

Shadow Communications Minister Malcolm Turnbull has said that he's just being honest when he attacks the $43 billion National Broadband Network (NBN) project, despite holding shares in a company that stands to benefit from the NBN.

November 21, 2010 by

Blended network attacks evade defences, says firm

Attacks that blend techniques to evade detection are slipping past network defences, according to security company Stonesoft.Individual evasion techniques such as packet fragmentation and IP header spoofing are currently detected by network defence tools, Stonesoft chief executive Ilkka Hiidenheimo told ZDNet UK on Monday.

October 19, 2010 by

Vocus takes action against DDoS

Arbor Networks announced this morning that network provider Vocus has selected its Peakflow platform to protect its network against distributed denial-of-service (DDoS) attacks.

August 31, 2010 by

Network security and fun with routing

I've been reviewing the use of DHCP as an attack vector -and what I found is the usual thing: most of the attacks follow highly traditional paths with a ten year history of increasingly clever solutions to increasingly clever variations on the same themes. Great, except that it seems to me there's an easy and virtual foolproof way of using DCHP with NAT to blow holes in just about anybody's network "security."

February 19, 2010 by

Apple warns of Mac attack risk via image files

Apple today warned that opening or viewing image files could lead to remote code execution attacks against Mac OS X users.In an update that contains fixes for a total of 19 documented vulnerabilities, Apple said malicious hackers could rig PNG (Portable Network Graphics) and other images to take complete control of unpatched Mac systems.

August 5, 2009 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories