Blog Posts Tagged with "IPv6"


Segmenting Safe Zones in IPv6

May 24, 2012 Added by:Jayson Wylie

IPv6 has created a vast address space and only portions are taken up by the typical allocations. A paid for, theme based, segmented and constrained IPv6 sub-network would provide users with some feeling of safety in an environment where that is not offered today...

Comments  (2)


A Detailed Analysis of the DDoS Phenomena

April 16, 2012 Added by:Plagiarist Paganini

The report showed 19.1TB of data and 14 billion packets of malicious traffic were aimed at financial services during Q4 2011, and that the traffic increased during Q1 2012, with 65TB of data and 1.1 trillion packets that were identified and mitigated. The figures are amazing...

Comments  (0)


IPv6 Protocol Implementation is Not a Security Panacea

February 22, 2012 Added by:Headlines

"The same thing that made the IPv6-enabled Internet valuable has also made it an increasingly valuable venue for attacks. While the frequency of attacks is relatively modest on IPv6 today, we expect that accelerated adoption will be followed in-kind by an accelerated pace of attacks..."

Comments  (0)


DDoS Attacks: An Excuse to Talk About IPv6 Security

February 10, 2012 Added by:Plagiarist Paganini

The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...

Comments  (0)


New Drive-By Malware Spam Infects Upon Opening Email

February 01, 2012 Added by:Plagiarist Paganini

According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...

Comments  (0)


IT Security Issues for 2012

January 27, 2012 Added by:Simon Heron

The pace of technological innovation is getting faster. At the same time, the work place is changing significantly, driven by organizations’ need to be more competitive and efficient. These two factors mean that there is a lot of change on the horizon for 2012...

Comments  (0)


How IPv6 and the Cloud Will Help Us be More Secure

October 17, 2011 Added by:Craig S Wright

Done correctly, IPv6 can make for extremely secure networks. By using Group Policy and a number of other tools with Linux or Mac it is possible to make a secure mobile network. It is more difficult under IPv4 due to the constraints on the protocol and the nature of DHCP (against DHCPv6)...

Comments  (2)


IPv6 - The Death of SSL

October 04, 2011 Added by:Craig S Wright

When IPv6 finally becomes the norm, IPSec will become ubiquitous. It will be deployed far wider than SSL. As for being as good or better than SSL, well SSL is flawed. It was from the start and it remains flawed. This point is moot as it would be difficult to make the protocol worse...

Comments  (10)


FACT CHECK: SCADA Systems Are Online Now

September 23, 2011 Added by:Craig S Wright

Nearly all SCADA systems are online. The addition of a simple NAT device is NOT a control. Most of these systems are horribly patched and some run DOS, Win 95, Win 98 and even old Unixs. Some are on outdated versions of VMS. One I know of is on a Cray and another is on a PDP-11...

Comments  (20)


IPv6: The End of Security As We Know It

September 21, 2011 Added by:Craig S Wright

People have seen IPv6 as a simple addressing extension to the existing internet and see few changes to the way we secure systems. These people cannot be further from the truth. IPv6 will change the way we think about security. We need to start planning now or we will be left in the dust...

Comments  (0)


Red Hat 5 STIG: Kernel Modules

August 29, 2011 Added by:Jamie Adams

The new draft STIG requires entries in a configuration file to prevent the kernel from loading modules – even if the modules aren't installed on the system. Nonetheless, I have compiled a list of the required settings which must be set in your modprobe.conf configuration file...

Comments  (0)


And Now a Word from Your Commonsense

August 18, 2011 Added by:Mike Meikle

As infosec pros debate the finer points of IPv6, cloud security, it behooves us to stop and remember our customers. They don’t care if your solution is FIPS certified and is SAS 70 compliant. They are only concerned if their identity is stolen and used to open a pickle stand in Zanzibar...

Comments  (0)


Weaponizing the Nokia N900 Part 3.8: Backtrack 5

May 31, 2011 Added by:Kyle Young

You could setup your N900 on a victim network and have ssh listing on your public IPv6 address and then log in to your N900 from an outside network over IPv6. You wouldn’t even have to do any port forwarding on the victim’s firewall/gateway/router...

Comments  (0)


IETF Provides Guidance on IPv6 End-Site Addressing

April 11, 2011 Added by:Stefan Fouant

Practical conservation may never be needed given the trillions of addresses available in IPv6, but maybe in the very distant future it could very well be due to some of these recommendations being put in place today. After all, 640K did turn out to be a rather small number didn't it?

Comments  (0)


MITM Attack Exploits Windows IPv6 Protocols

April 06, 2011 Added by:Headlines

“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."

Comments  (0)


Top Six Misconceptions About IPv6 Adoption

February 28, 2011 Added by:Headlines

"Over the next few months, it will become increasingly difficult for mobile and broadband carriers with fast-growing networks to acquire the blocks of contiguous IPv4 address space that they need to build out their networks. Some carriers are predicting massive IPv4 address shortages this year..."

Comments  (0)

Page « < 1 - 2 > »