[iwar] [fc:Hackers.target.Linux.sites]

From: Fred Cohen (fc@all.net)
Date: 2002-07-29 18:33:24


Return-Path: <sentto-279987-5083-1027992660-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 29 Jul 2002 18:35:08 -0700 (PDT)
Received: (qmail 19977 invoked by uid 510); 30 Jul 2002 01:29:58 -0000
Received: from n3.grp.scd.yahoo.com (66.218.66.86) by all.net with SMTP; 30 Jul 2002 01:29:58 -0000
X-eGroups-Return: sentto-279987-5083-1027992660-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.95] by n3.grp.scd.yahoo.com with NNFMP; 30 Jul 2002 01:31:00 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 30 Jul 2002 01:31:00 -0000
Received: (qmail 90361 invoked from network); 30 Jul 2002 01:31:00 -0000
Received: from unknown (66.218.66.217) by m7.grp.scd.yahoo.com with QMQP; 30 Jul 2002 01:31:00 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 30 Jul 2002 01:31:00 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6U1XOH01354 for iwar@onelist.com; Mon, 29 Jul 2002 18:33:24 -0700
Message-Id: <200207300133.g6U1XOH01354@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 29 Jul 2002 18:33:24 -0700 (PDT)
Subject: [iwar] [fc:Hackers.target.Linux.sites]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Hackers target Linux sites

» Madeline Bennett , 26-07-2002
<a href="http://www.vnunet.com/News/1133918">http://www.vnunet.com/News/1133918>
VNUNET
Windows systems have long been the most common target for online
attacks, but many hackers are now turning their attention to open-source
systems as well, according to the results of a new report issued by
security solutions provider MI2G.

MI2G says that the number of attacks on Linux-based open-source Web
applications is increasing. The firm's monitoring unit reported 5,736
attacks in the whole of 2001, but this figure rose to 7,630 in just the
first half of 2002. According to MI2G, attacks on Windows systems
running Microsoft's IIS Web server fell by 20 percent, from 11,828
during the first six months of 2001 to 9,404 over the same period this
year. These figures do not include viruses and worms.

Linux has enjoyed a reputation as a more secure alternative to Windows
operating systems, but security experts warned that firms with Linux
systems should not be complacent. Ian Tickle, UK manager at data
integrity company Tripwire, said, "Although Linux is classed as a secure
solution, users still need protection." He added that as the number of
Linux users has grown, particularly within corporates, Linux systems
have become a much more attractive target for attackers.

Mark Lillycrop, chief executive of research firm Arcati, argued that
conversely, recent Microsoft products such as Windows XP have become
more difficult to hack. This may account for the decreasing number of
attacks on these systems but it is not a sign that Microsoft has solved
all its security problems. "When these more secure products are
networked with older Windows systems, the security of the whole network
suffers. So we're not going to see vastly better security until Windows
95 and 98 boxes start to disappear," warned Lillycrop. He cautioned that
Microsoft must also address the weak points in its dot-Net platform.

Although the number of attacks on Windows appears to have fallen, the
total number of attacks - including viruses and worms - is still rising,
according to security advisory organisation the Computer Emergency
Response Team (Cert). During the first half of this year, over 43,000
incidents were reported to Cert, up from just over 52,000 during the
whole of 2001. This indicates that the total number of security
incidents reported to Cert during 2002 might be double the total for
2001.

However, the rise in reported incidents could be due to the use of more
effective security tools, which spot attacks that would otherwise be
missed, according to Madeleine Allen, director at security consultancy
DNS. "There are more and more automated packages that can detect
incidents. Because of increased use of these, there are more statistics
available," she said.

Lillycrop pointed out that the Cert figures have been climbing steeply
for a few years, so this is not a new trend. "But the fact that the
figures haven't started to level off is disappointing," he added.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT