Return-Path: <sentto-279987-5083-1027992660-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 29 Jul 2002 18:35:08 -0700 (PDT) Received: (qmail 19977 invoked by uid 510); 30 Jul 2002 01:29:58 -0000 Received: from n3.grp.scd.yahoo.com (66.218.66.86) by all.net with SMTP; 30 Jul 2002 01:29:58 -0000 X-eGroups-Return: sentto-279987-5083-1027992660-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.95] by n3.grp.scd.yahoo.com with NNFMP; 30 Jul 2002 01:31:00 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 30 Jul 2002 01:31:00 -0000 Received: (qmail 90361 invoked from network); 30 Jul 2002 01:31:00 -0000 Received: from unknown (66.218.66.217) by m7.grp.scd.yahoo.com with QMQP; 30 Jul 2002 01:31:00 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 30 Jul 2002 01:31:00 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6U1XOH01354 for iwar@onelist.com; Mon, 29 Jul 2002 18:33:24 -0700 Message-Id: <200207300133.g6U1XOH01354@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 29 Jul 2002 18:33:24 -0700 (PDT) Subject: [iwar] [fc:Hackers.target.Linux.sites] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Hackers target Linux sites » Madeline Bennett , 26-07-2002 <a href="http://www.vnunet.com/News/1133918">http://www.vnunet.com/News/1133918> VNUNET Windows systems have long been the most common target for online attacks, but many hackers are now turning their attention to open-source systems as well, according to the results of a new report issued by security solutions provider MI2G. MI2G says that the number of attacks on Linux-based open-source Web applications is increasing. The firm's monitoring unit reported 5,736 attacks in the whole of 2001, but this figure rose to 7,630 in just the first half of 2002. According to MI2G, attacks on Windows systems running Microsoft's IIS Web server fell by 20 percent, from 11,828 during the first six months of 2001 to 9,404 over the same period this year. These figures do not include viruses and worms. Linux has enjoyed a reputation as a more secure alternative to Windows operating systems, but security experts warned that firms with Linux systems should not be complacent. Ian Tickle, UK manager at data integrity company Tripwire, said, "Although Linux is classed as a secure solution, users still need protection." He added that as the number of Linux users has grown, particularly within corporates, Linux systems have become a much more attractive target for attackers. Mark Lillycrop, chief executive of research firm Arcati, argued that conversely, recent Microsoft products such as Windows XP have become more difficult to hack. This may account for the decreasing number of attacks on these systems but it is not a sign that Microsoft has solved all its security problems. "When these more secure products are networked with older Windows systems, the security of the whole network suffers. So we're not going to see vastly better security until Windows 95 and 98 boxes start to disappear," warned Lillycrop. He cautioned that Microsoft must also address the weak points in its dot-Net platform. Although the number of attacks on Windows appears to have fallen, the total number of attacks - including viruses and worms - is still rising, according to security advisory organisation the Computer Emergency Response Team (Cert). During the first half of this year, over 43,000 incidents were reported to Cert, up from just over 52,000 during the whole of 2001. This indicates that the total number of security incidents reported to Cert during 2002 might be double the total for 2001. However, the rise in reported incidents could be due to the use of more effective security tools, which spot attacks that would otherwise be missed, according to Madeleine Allen, director at security consultancy DNS. "There are more and more automated packages that can detect incidents. Because of increased use of these, there are more statistics available," she said. Lillycrop pointed out that the Cert figures have been climbing steeply for a few years, so this is not a new trend. "But the fact that the figures haven't started to level off is disappointing," he added. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/7dY7FD/R_ZEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT