As a matter of fact, I have been asking Symantec the same question about
their anti virus software updates for the past 2 years.  Even for one of the
security staff at KPMG who would be willing to sign a NDA, they
catagorically refuse and will only say that "the site is secure, there is no
way in".  Now I think we know the REAL REASON why they don't want to
disclose their security, they have none.

-----Original Message-----
From: Kathy [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, December 06, 2000 7:41 PM
To: [EMAIL PROTECTED]
Subject: More info on NAI & McAfee website hacked. 



Wired has a story on the Network Associates hack.
http://www.wired.com/news/business/0,1367,40445,00.html
[edit]
Additional question is if the hackers changed the NAI website content, would
that also imply that the hackers could have changed the file download
content of their antivirus software and replaced with a trojan?  Obviously,
this is conjecture and no proof that hackers did this, but I think it is a
fair question to ask of NAI or any security company that gets their website
hacked.  


[EMAIL PROTECTED] wrote: 
> Maybe she was assuming that since NAI IS supposed to be a network
> security
> company (or at least one of the things they do is network
> security) they
> would have designed their network using industry accepted best
> practices
> (i.e. the "dmz off the firewall" thing..  I immediately thought
> the same
> thing.
> 
> I would love to hear from NAI on what happened.. but then I guess
> we would
> get the "positive spin" version of the story.  Maybe if their
> network
> security guy got fired, he will no longer be bound by loyalty and
> we can
> get the skinny...  >=)
> 
> 
> Carric Dooley
> Senior Consultant
> COM2:Interactive Media
> 
> "But this one goes to eleven."
> -- Nigel Tufnel
> 
> 
> On Tue, 5 Dec 2000, Paul D. Robertson wrote:
> 
> > On Tue, 5 Dec 2000, Kathy wrote:
> > 
> > > If you follow http://www.attrition.org/mirror/attrition/ , 
> > > it contains a list of hacked websites.  Last week, Network
> Associates and McAfee's website in Brazil was hacked.  
> > > 
> > > For a mirror of the hacked NAI web page,
> > >
> http://www.attrition.org/mirror/attrition/2000/11/29/www.nai.com.
> br/ 
> > > 
> > > The hackers must have bypassed NAI's Gauntlet firewall and
> CyberCop monitor? 
> > 
> > That's a pretty big leap to make.  Most people don't put Web
> Servers
> > behind firewalls *especially* proxy-based firewalls.  Also,
> there are a
> > significant number of Web server attacks that are in-band
> (HTTP-based
> > attacks), there's not a great deal a firewall can do about
> traffic that's
> > permitted (hence the long and drawn-out ranting about opening
> up inane
> > services and protocols yesterday.)  Do you have any proof that
> the Web
> > site was *behind* a firewall, or is it pure conjecture?
> > 
> > Paul
> >
> -----------------------------------------------------------------
> ------------
> > Paul D. Robertson      "My statements in this message are
> personal opinions
> > [EMAIL PROTECTED]      which may have no basis whatsoever in
> fact."
> > 
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> > 
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]

- Kathy

---======-----
--=========---
-============-
--=========---
---=======----
--------------



Free web-based email 
Performance Testing of your web site
Only at: http://www.perfstat.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
*****************************************************************************
The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.         
*****************************************************************************
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to