Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The Web: Mobsters extinguish firewalls
UPI ^ | UPI

Posted on 05/03/2006 8:52:12 AM PDT by 2Jim_Brown

CHICAGO, May 3 (UPI) -- Firewall? Forgetaboutit. Cyber-criminals, including the mafia, are now so savvy they can penetrate past these supposedly sturdy security measures and hack your computer network, whether you work at a university, Fortune 500 company or smaller firm, experts tell UPI's The Web.

"The firewall and the network perimeter are dead," Ted Demopoulos, author of the best-selling book, "Blogging for Business" (Kaplan, 2006), and IT expert based in Durham, N.H., tells The Web. "Firewalls offer less protection than before." By Gene Koprowski

(Excerpt) Read more at upi.com ...


TOPICS: Extended News; Miscellaneous
KEYWORDS: firewalls; internet
Navigation: use the links below to view more comments.
first 1-2021-22 next last
Cyber-criminals can penetrate past security measures such as firewalls.
1 posted on 05/03/2006 8:52:14 AM PDT by 2Jim_Brown
[ Post Reply | Private Reply | View Replies]

To: 2Jim_Brown

what about a "hard wired" firewall?


2 posted on 05/03/2006 8:53:49 AM PDT by goodnesswins ( "the left can only take power through deception." (and it seems Hillary & Company are the masters)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2Jim_Brown

Firewalls are a tool and more dependant on using & maintaining it properly than just having one sitting. For example, Ted Kennedy has a brain but there does not appear to be any documented uses of it.


3 posted on 05/03/2006 9:01:56 AM PDT by pikachu (For every action there is an equal and opposite government program)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2Jim_Brown
So...?

This is nothing new in the computer industry. Firewalls have been breached for years. What is NEW, is a growing trend by cyber criminals to use extortion and bribery to get someone on the inside of the company to place a rouge computer / device on the inside network. This then creates an outbound connection that can be used to gain access behind the firewall. Viruses and worms are also used for similar purpose.

Understand that I work in this field. I'm the guy at IBM that runs the threat mitigation competency that gets called in to protect people's networks and data. What we are seeing is that more and more people are realizing that firewalls alone are not the answer. What is required is what we have been saying for years -- defense in depth. Know all the traffic on your network, treat all unapproved traffic as potential "bad" traffic, protect your servers on the inside with additional firewalls, monitor server activity and access, centralize your logging of events, implement a dual approval requirement for the creation of sensitive accounts (root or administration access), etc etc etc.

What is new is that EXECUTIVES are starting to listen. SOX and HIPPA and GLB and other regulations / laws are starting to change cooperate behavior.... and my team has way too much work at the moment.

Good news in some ways.... but do not panic over this article.
4 posted on 05/03/2006 9:14:16 AM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2Jim_Brown
In general, they can only penetrate if something is left open or otherwise compromised.

Firewalls are effective, but they don't stop all information from getting in or out (if they did, there would be no need for a firewall to filter traffic). Spyware and viruses are only protected against to the extent of updates meant to tackle already-found viruses. Once infected, much traffic can go both ways through the firewall to remote "attackers".
5 posted on 05/03/2006 9:15:52 AM PDT by ConservativeMind
[ Post Reply | Private Reply | To 1 | View Replies]

To: pikachu

No, he's gotten out of murder and rape charges with some fast thinking.


6 posted on 05/03/2006 9:49:40 AM PDT by MeanWestTexan (Many at FR would respond to Christ "Darn right, I'll cast the first stone!")
[ Post Reply | Private Reply | To 3 | View Replies]

To: 2Jim_Brown

Your chances of being hacked past the firewall are slim and none. My DSL modem has a firewall and I use a software firewall. If someone goes to all the trouble to defeat that, they can have anything on the box. Which is nothing but saved game files.

Use your noodle. Don't leave non-critical financial stuff on the box.


7 posted on 05/03/2006 9:52:36 AM PDT by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

8 posted on 05/03/2006 10:36:27 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2Jim_Brown
Cyber-criminals can penetrate past security measures such as firewalls.

Regular criminals can penetrate past security measures such as door locks. So, you gonna toss out all your deadbolts?

Didn't think so.

9 posted on 05/03/2006 10:45:40 AM PDT by Senator Bedfellow
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Put me on your tech ping, please, and thanks!


10 posted on 05/03/2006 10:53:54 AM PDT by banjo joe (Work the angles. Show all work.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: banjo joe
You've been added.

Welcome Aboard!

11 posted on 05/03/2006 11:25:51 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 10 | View Replies]

To: AppyPappy
Your chances of being hacked past the firewall are slim and none.

I have to disagree strongly with that

12 posted on 05/03/2006 11:37:38 AM PDT by N3WBI3 ("I can kill you with my brain" - River Tam)
[ Post Reply | Private Reply | To 7 | View Replies]

To: N3WBI3

I meant for a home computer. Hackers are usually looking for something.


13 posted on 05/03/2006 11:41:07 AM PDT by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: AppyPappy
I meant for a home computer. Hackers are usually looking for something.

Sometimes just a safe place from which to attack the system they are actually targeting.

14 posted on 05/03/2006 11:43:57 AM PDT by ko_kyi
[ Post Reply | Private Reply | To 13 | View Replies]

To: ko_kyi

They usually use viruses and trojans for that.


15 posted on 05/03/2006 11:49:02 AM PDT by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: ko_kyi; AppyPappy

Bingo!


16 posted on 05/03/2006 11:58:35 AM PDT by N3WBI3 ("I can kill you with my brain" - River Tam)
[ Post Reply | Private Reply | To 14 | View Replies]

To: 2Jim_Brown

'Course, if you have a Mac, this is all a moot point, isn't it?


17 posted on 05/03/2006 12:25:24 PM PDT by snowrip (Liberal? YOU HAVE NO RATIONAL ARGUMENT. Actually, you lack even a legitimate excuse.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ko_kyi
Sometimes just a safe place from which to attack the system they are actually targeting.

True, but there is so much low-hanging fruit out there that it doesn't make a lot of sense to hack through a firewall just to have a launching point.

18 posted on 05/03/2006 12:34:34 PM PDT by zeugma (Come to the Dark Side... We have cookies!)
[ Post Reply | Private Reply | To 14 | View Replies]

To: 2Jim_Brown
I didn't sign up so I couldn't read the entire article. I'd like to see how? They always make claims like this, but when you go into methods used, and they hardly ever go into details.

In almost all cases a firewall is never going to be any better than your most gullible user.
19 posted on 05/03/2006 2:57:38 PM PDT by KoRn
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy
What is someone broke into your house =). Physical security is just as important as network security. If someone was able to get into your house and leave without you knowing, you are fully compromised. In most cases passwords won't matter with physical security. People can use Live CDs to access your hard drive, and USB drives to copy your data. Or they could just steal your entire computer lol.
20 posted on 05/03/2006 3:01:57 PM PDT by KoRn
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson