[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

Virus Attacks Cost $12Bil
Virus attacks cost organizations a total of $12.1 billion
during 1999, according to a report released today. Released
by Computer Economics, the report said that over the last
three years there has been a major programming shift as
viruses have become far more malicious and specifically
designed for destruction and damage. In the past, the firm
said, viruses were designed to create a minor annoyance.
Now they are very complex and come in a multitude of forms,
and many today are polymorphic.
http://www.currents.net/newstoday/00/01/20/news14.html

Clinton Favors Computer Snooping
Visions of stealthy black helicopters landing on your
lawn and disgorging Nomex-clad troops to steal your
PGP keys aren't just for conspiracy theorists. The
Clinton administration wants to be able to send
federal agents armed with search warrants into homes
to copy encryption keys and implant secret back doors
onto computers.
http://wired.com/news/business/0,1367,33779,00.html

Cyber-crooks face radical new laws
Radical laws to combat a dramatic surge in computer crime
may be on the way. The news came yesterday as a special
team of government lawyers started targeting cyber-crooks.
The unit will consider making it a crime to refuse demands
from investigators for the "key" to coded information
stored on computers. Outlawing the spamming of junk e-mail
(sending unsolicited e-mail messages in bulk), increasing
penalties for computer criminals, forcing Internet service
providers to keep records and making it an offence to
"deceive a machine" are also in the spotlight.
http://www.technologypost.com/internet/Daily/20000120101304432.asp

Curb on Net security imports to go
THE Info-Comm Development Authority of Singapore (IDA)
will lift control on the import of cryptographic products
from Jan 21 to boost e-commerce. Cryptographic products
protect electronic data from hackers and ensure the
security of online transactions. IDA said the Trade
Development Board will amend the relevant regulations
to lift the control. Companies now have to apply for
permission to import these products and the approval
may not be granted.
http://www.straitstimes.asia1.com/cyb/cyb4_0120.html

Compaq unveils encryption hardware
In an effort to reduce performance delays caused by the
time taken to process secure, encrypted transactions,
Compaq Computer Corp. yesterday introduced its AXL200
Accelerator PCI hardware, which basically redirects the
encryption processing to an auxiliary card.
http://www.computerworld.com/home/print.nsf/all/000119E14A

The Fastest Growing Crime in America: Identity Theft
(Or How I Can Be a Boy Named Sue)
Back in the covered wagon days, when I was considered young
and only had to shave every other day, I was called in to my
company commander's office and read my rights under Article 32
of the Uniform Code of Military Justice (UCMJ). He then
proceeded to read the charges and specifications that I had
been absent without leave from guard duty and read my name.
When he read my social security number (by that time it also
served as your service number in the U.S. Army), I stopped him
and informed him that I was not the person specified in the
charges.
http://securityportal.com/direct.cgi?/topnews/identity20000120.html

FC