Russia detains suspect in carding, online fraud scheme

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Russia detains suspect in carding, online fraud scheme


Russia detains suspect in carding, online fraud scheme

Posted: 05 Oct 2010 09:00 AM PDT


Russian authorities have detained a Ukrainian national who oversaw a group that manufactured fraudulent payment cards and identity documents, according to a press release from the country's Interior Ministry on Monday.

Oracle to buy SSO vendor Passlogix

Posted: 05 Oct 2010 09:00 AM PDT


Oracle plans to buy enterprise SSO (single sign-on) technology vendor Passlogix, a move that will boost its portfolio of security offerings. Terms of the deal, which is expected to close this year, were not disclosed.

Cloud computing in the U.S. shows momentum

Posted: 05 Oct 2010 09:00 AM PDT


How widespread is business use of cloud computing? The results of one survey published Tuesday suggest use of both public and private clouds has real momentum in the United States, with private cloud computing appearing to be more popular.

BT defers court case seeking downloader details

Posted: 05 Oct 2010 09:00 AM PDT


BT has deferred a court case that would have seen the telecommunication company ordered to hand over details of web users thought to have illegal downloaded until next year.

Facebook users warned over 'free iPhone' scam

Posted: 05 Oct 2010 09:00 AM PDT


Facebook users are being warned about a scam that claims they can get their hands on a free iPhone.

PCI security group speaks out on encryption

Posted: 05 Oct 2010 09:00 AM PDT


The organization in charge of defining security for the payment-card industry's merchants and service providers Tuesday issued two guidance papers, the first on end-to-end encryption and the second on payment card technology used more commonly in Europe than the United States.

Facebook hit by new iPhone spam attack

Posted: 05 Oct 2010 09:00 AM PDT


Facebook users are being warned about a new spam scam that tries to tempt users into visiting a website with the promise of a free Apple iPhone.

Symantec Unveils Strategy to Protect Mobile Devices and Data

Posted: 05 Oct 2010 09:00 AM PDT


Recognizing that the technology landscape is shifting rapidly toward mobility, Symantec today unveiled new tools to help protect mobile devices, and the sensitive data they contain. The mobile security and management strategy from Symantec enables businesses, service providers, and users to manage and secure mobile devices no matter where they may roam.

EU Parliamentarians move to block anti-counterfeiting pact

Posted: 05 Oct 2010 09:00 AM PDT


Four members of the European Parliament on Tuesday called for the international anti-counterfeiting trade agreement (ACTA) to be halted.

Piracy group threatens more DDoS attacks

Posted: 05 Oct 2010 09:00 AM PDT


The self-styled campaigners who launched DDoS attacks on a range of prominent copyright and anti-piracy organisations last week has threatened further attacks in an interview with security company, Panda Security.

Cisco bolsters branch switches, routers

Posted: 05 Oct 2010 04:59 AM PDT


Cisco Tuesday announced a doubly powerful Catalyst Ethernet switch, a condensed edge router and a slew of other new and enhanced products designed to help companies extend more powerful networking services to branch offices.

HP branches out

Posted: 05 Oct 2010 09:00 AM PDT


HP unveiled new products and services across its networking, security and computing portfolios designed to improve application performance and delivery. Rival Cisco also announced its own branch office application acceleration extensions this week, and the two are expected to compete aggressively in this space with their respective new offerings.

Cisco expands 11n Wi-Fi line, mobile VPN client

Posted: 05 Oct 2010 09:00 AM PDT


Cisco expanded its mobile offerings with a new low-end 802.11n Wi-Fi access point, a new version of its AnyConnect secure client for mobile devices, and took the first step to creating virtual mobile clients, unveiling support for Citrix and VMware products.

Cisco launches high-end security appliance

Posted: 05 Oct 2010 09:00 AM PDT


Cisco today announced a multi-function security appliance that combines a firewall with VPN support, plus an intrusion-prevention system (IPS), to reach speeds up to 20 Gbps with 10,000 VPN connections and 350,000 connections per second.

Routing Fundamentals

Posted: 05 Oct 2010 07:03 AM PDT


When IP packets travel over the Internet, routing information is exchanged between the devices that control the flow of information over the Internet. These devices are known as routers, and they use the IP address as the basis for controlling the traffic. These devices need to talk the same language to function properly, though they belong to different administrative domains. For example, one router may be in Newyork(US), and the receiving router may be in London (UK). It is necessary that a routing protocol is followed for smooth flow of traffic. Given below are the widely used routing protocols for routing Internet traffic:
  • RIP v1
  • RIP v2
  • OSPF
  • IGRP
  • EIGRP
  • BGP
Notations used: Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Border Gateway Protocol (BGP).
One often get confused between a routing protocol and a routed protocol. A routing protocol such as RIP is used to route information packets over the Internet, where as a routed protocol such as IP (or IPX) is the payload (contains data) that get routed from source to the destination.
Routing protocols are primarily distinguished into three types:
  • Distance Vector Protocols
  • Link State Protocols
  • Hybrid Protocols
RIP is an example of distance vector protocol. IS-IS is an example of Hybrid protocol, and OSPF is an example of Link State Protocol.
The table below provides the routing protocol used with different routed protocols:
Routing Protocol Routed Protocol
RIP, OSPF,IS-IS, BGP,EIGRP IP
RIP, NLSP, EIGRP IPX
RTMP, EIGRP AppleTalk
The list of routed, and routing protocols given in the above table is not complete, and given to serve as an example only.
Routing Metric: This is a fundamental measure that routing protocols use for determining appropriate route to deliver packets. Each routing protocol uses its own measure of metric, and a sample of routing metrics used by different routing protocols is given below:
Routing Protocol Metric
RIPv2 Hop count
EIGRP Bandwidth, Delay, Load, Reliability, and MTU
OSPF Cost (Higher bandwidth indicates lower cost)
IS-IS Cost
The best route in RIP is determined by counting the number of hops required to reach the destination. A lower hop count route is always preferred over a higher hop count route. One disadvantage of using hop count as metric is that if there is a route with one additional hop, but with significantly higher bandwidth, the route with smaller bandwidth is taken. This is illustrated in the figure below:

The RIP routed packets take the path through 56KBPS link since the destination can be reached in one hop. Though, the alternative provides a minimum bandwidth of 1MBPS (though using two links of 1MBPS, and 2MBPS each), it represents 2 hops and not preferred by the RIP protocol.

Link State vs. Distance Vector

Distance Vector routing protocols usually send their entire routing table to their nearest neighbors at regular intervals. A router that receives several such routing tables filter the routes and arrive at its own and retransmits it to its neighbouring routers. There will some period of time where different routers hold non-optimized routes initially. After some time, known as convergence time, a final routing table is arrived at by all the routers. A faster convergence time results in a stable network. 
RIP, as mentioned earlier uses hop count as the metric for computing a route to a given destination. Other Distance Vector routing protocols, such as IGRP, improve on this by using hop count, bandwidth, current load, cost, and reliability to determine the best path.
Link State routing protocols usually send only the routing changes to every other router within their area. Unlike Distance Vector, routers using Link State routing protocols maintain a picture of the entire network. A router can use this network wide information to determine the best route for traffic.
Example Question:
What is true about IP routing?
A. The frame changes at each hop
B. The source IP address changes at each hop
C. The destination IP address changes at each hop
D. The hardware interface addresses remain constant

Correct answer: A

Explanation:
IP Packets are transported from source network to the destination network by what is known as routing. Hop-by-hop routing model is used by the Internet for delivery of packets. At each hop, the destination IP address is examined, the best next hop is determined by the routing protocol (such as RIP, OSPF or BGP) and the packet is forwarded by one more hop through this route. The same process takes place at the next hop. During this process, the logical addresses remain same. In an IP network, the logical addresses are IP addresses. The hardware interface addresses, such as MAC address change with each hop.

Start-up CloudFlare secures Web sites and improves loading times

Posted: 04 Oct 2010 09:00 AM PDT


A start-up called CloudFlare has launched a cloud-based firewall that also improves website performance, and says it will release an enterprise version of its technology one year from now.

Why to Celebrate National Cyber Security Awareness Month

Posted: 04 Oct 2010 09:00 AM PDT


It's that time of year again. The weather is turning cooler, football season has begun, Halloween is fast approaching. That can only mean one thing--it's National Cyber Security Awareness Month! Just in case you aren't really sure what the big deal is, or why you should care, here are five recent security threats that highlight why we need an entire month to raise awareness and promote better computer and network security.

Online groups introduce labeling for targeted ads

Posted: 04 Oct 2010 09:00 AM PDT


Five advertising trade groups, including the Direct Marketing Association (DMA) and the Interactive Advertising Bureau (IAB), have launched a new program that will label online advertisements that their members serve based on the Web-surfing habits of consumers.

Collaboration, training key to Westpac's security success

Posted: 04 Oct 2010 09:00 AM PDT


Collaboration and training are vital to the success of security projects, according to Westpac's Chief Information Security Officer, Richard Johnson.

0 comments:

Post a Comment