Blog Posts Tagged with "IPv6"
May 24, 2012 Added by:Jayson Wylie
IPv6 has created a vast address space and only portions are taken up by the typical allocations. A paid for, theme based, segmented and constrained IPv6 sub-network would provide users with some feeling of safety in an environment where that is not offered today...
April 16, 2012 Added by:Pierluigi Paganini
The report showed 19.1TB of data and 14 billion packets of malicious traffic were aimed at financial services during Q4 2011, and that the traffic increased during Q1 2012, with 65TB of data and 1.1 trillion packets that were identified and mitigated. The figures are amazing...
February 22, 2012 Added by:Headlines
"The same thing that made the IPv6-enabled Internet valuable has also made it an increasingly valuable venue for attacks. While the frequency of attacks is relatively modest on IPv6 today, we expect that accelerated adoption will be followed in-kind by an accelerated pace of attacks..."
February 10, 2012 Added by:Pierluigi Paganini
The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...
February 01, 2012 Added by:Pierluigi Paganini
According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...
January 27, 2012 Added by:Simon Heron
The pace of technological innovation is getting faster. At the same time, the work place is changing significantly, driven by organizations’ need to be more competitive and efficient. These two factors mean that there is a lot of change on the horizon for 2012...
October 17, 2011 Added by:Craig S Wright
Done correctly, IPv6 can make for extremely secure networks. By using Group Policy and a number of other tools with Linux or Mac it is possible to make a secure mobile network. It is more difficult under IPv4 due to the constraints on the protocol and the nature of DHCP (against DHCPv6)...
October 04, 2011 Added by:Craig S Wright
When IPv6 finally becomes the norm, IPSec will become ubiquitous. It will be deployed far wider than SSL. As for being as good or better than SSL, well SSL is flawed. It was from the start and it remains flawed. This point is moot as it would be difficult to make the protocol worse...
September 23, 2011 Added by:Craig S Wright
Nearly all SCADA systems are online. The addition of a simple NAT device is NOT a control. Most of these systems are horribly patched and some run DOS, Win 95, Win 98 and even old Unixs. Some are on outdated versions of VMS. One I know of is on a Cray and another is on a PDP-11...
September 21, 2011 Added by:Craig S Wright
People have seen IPv6 as a simple addressing extension to the existing internet and see few changes to the way we secure systems. These people cannot be further from the truth. IPv6 will change the way we think about security. We need to start planning now or we will be left in the dust...
August 29, 2011 Added by:Jamie Adams
The new draft STIG requires entries in a configuration file to prevent the kernel from loading modules – even if the modules aren't installed on the system. Nonetheless, I have compiled a list of the required settings which must be set in your modprobe.conf configuration file...
August 18, 2011 Added by:Mike Meikle
As infosec pros debate the finer points of IPv6, cloud security, it behooves us to stop and remember our customers. They don’t care if your solution is FIPS certified and is SAS 70 compliant. They are only concerned if their identity is stolen and used to open a pickle stand in Zanzibar...
May 31, 2011 Added by:Kyle Young
You could setup your N900 on a victim network and have ssh listing on your public IPv6 address and then log in to your N900 from an outside network over IPv6. You wouldn’t even have to do any port forwarding on the victim’s firewall/gateway/router...
April 11, 2011 Added by:Stefan Fouant
Practical conservation may never be needed given the trillions of addresses available in IPv6, but maybe in the very distant future it could very well be due to some of these recommendations being put in place today. After all, 640K did turn out to be a rather small number didn't it?
April 06, 2011 Added by:Headlines
“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."
February 28, 2011 Added by:Headlines
"Over the next few months, it will become increasingly difficult for mobile and broadband carriers with fast-growing networks to acquire the blocks of contiguous IPv4 address space that they need to build out their networks. Some carriers are predicting massive IPv4 address shortages this year..."
Join Trend Micro & SecurityWeek in Belle... Shah Alam on 12-06-2013
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013
Projectile Dysfunction... ryan mccarthy on 12-01-2013