contact contact contact
ÊAdvertise
ÊContact
ÊSecurityWatch
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business
More information released on Cisco code theft
Wednesday, 19 May 2004, 11:00 GMT

More details about the computer code stolen from Cisco Systems were revealed yesterday, including new samples of the source code and information on how the code was distributed, four days after a Russian website reported news of the theft and posted sample code files to support the claim. Additional copies of Cisco code files for the Internetwork Operating System (IOS) may be circulating on the internet after the thief compromised a Sun Microsystems server on Cisco's network, then briefly posted a link to the source code files on a file server belonging to the University of Utrecht in the Netherlands, according to Alexander Antipov, a security expert at Moscow security firm Positive Technologies.

Antipov downloaded more than 15Mbytes of the stolen code, which is estimated to be around 800Mbytes, after an individual using the online name "Franz" briefly posted a link to a 3Mbyte compressed version of the files in a private Internet Relay Chat (IRC) forum on Friday.

Read More at ' '

Back to main page


Monday, May 23, 2005

Network Security

Hackers get tricky with pharming
Hiring a hacker? Think again, experts warn
Why security vulnerabilities expand beyond operating system, enterprise
How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

picoChip, Hifn unveil WiMAX basestation reference
Why wireless devices must be connected to critical applications
Securing 'strange' Wi-Fi devices
IT giants fight wireless patent

InfoSec Directory

Phishing attacks and countermeasures
Overview of image security techniques with applications in multimedia systems
Inoculating SSH Against Address-Harvesting Worms
What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

nCipher helps combat phishing attacks with Chip and PIN
LANDesk Named to 2005 Red Herring Top 100
HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
ÊCopyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: PrivacyÊ
Site Meter

Ê