FBI Releases List of Top 20 Computer Risks

Gonzo

Infinitesimally Outrageous
Staff member
How many are you vulnerable too?

General vulnerabilities

Default installs of operating systems and applications

Accounts with no passwords or weak passwords

Non-existent or incomplete backups

Large number of open ports

Not filtering packets for correct incoming and outgoing addresses

Non-existent or incomplete logging

Vulnerable CGI programs

Unicode vulnerability (Web Server Folder Traversal)

ISAPI extension buffer overflows

IIS RDS exploit (Microsoft Remote Data Services)

NETBIOS -- unprotected Windows networking shares

Information leakage via null session connections

Weak hashing in SAM (LM hash)


Unix-based vulnerabilities

Buffer overflows in RPC services

Sendmail vulnerabilities

Bind weaknesses

R Commands

LPD (remote print protocol daemon)

sadmind and mountd

Default SNMP strings

The FBI's National Infrastructure Protection Center, the agency's cyberwatchdog, has released a list of seven simple measures computer users can take to step up security on their machines:

Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts.


Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup weekly and incremental backups every day. At least once a month, the backup media should be verified.


Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically.


Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in.


Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.


Do not open email attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected email attachment from someone you do know because it may have been sent without that person's knowledge from an infected machine.


Regularly download security patches from your software vendors.
 

fury

Administrator
Staff member
Default installs of operating systems and applications Yup

Accounts with no passwords or weak passwords Yup

Non-existent or incomplete backups Yup

Large number of open ports Nope

Not filtering packets for correct incoming and outgoing addresses Dunno

Non-existent or incomplete logging It depends on what you mean by logging

Vulnerable CGI programs Dunno

Unicode vulnerability (Web Server Folder Traversal) Nope

ISAPI extension buffer overflows Nope

IIS RDS exploit (Microsoft Remote Data Services) Nope

NETBIOS -- unprotected Windows networking shares Nope

Information leakage via null session connections Dunno

Weak hashing in SAM (LM hash) Dunno
 

a13antichrist

Moderator from Hell
Vulnerabilities like this are all very well, but people who really want to exploit these holes aren't going to be interested (all that much) in home users; in many cases they aren't anything that home users will be able to do anything about anyway... :retard:
 
S

s4

Guest
I think a13 is right in that the interest for the professional hacker is not home users.

Corporations are where their interests are. However they are thousands maybe even millions of wannabe hackers out there using port scanners and ip sniffers just looking for anything they can hack. Cable and dsl users are of more interest to them because they contain files they can either download or infect with viruses.

In the first 4 years of being on the web, I never ran any virus protection software and never used a firewall. Now, I wouldn't even think of logging on with out both. I'm glad I bought Norton AV.
 
Top