[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          


FBI, Pentagon brace for Y2k hacker attacks
The FBI and the Pentagon are planning a special vigil as 1999
comes to a close, fearing both government and private sector
computers could come under attack as the calendar changes to
2000. Terrorists, hostile nations, criminals and recreational
hackers could all launch assaults at the same time -- and could
use Y2K malfunctions to hide their actions.
http://cnn.com/1999/TECH/computing/12/02/fbi.hacking.war/index.html

Cyberattacks likely at year's end, experts say
Federal officials increasingly say the greatest Y2K threat will
come not from date errors in software but from terrorists,
particularly cyberterrorists launching hacker attacks via the
Internet. Stephen R. Northcutt, chief of information warfare at
the Ballistic Missile Defense Organization, is the latest expert
to warn of this threat. He told an audience of federal managers
at the Government Technology Leadership Institute in Washington
Thursday to expect network intrusions and other cyberattacks
during the entire winter holiday period and especially around
the New Year's weekend.
http://www.govexec.com/dailyfed/1299/120399b2.htm

"Moonlight Maze"
As Defense Department, FBI and congressional investigators
examine the recent hacking of DoD systems by Russian government
entities, the more deeply the hackers appear to have burrowed
into military computers Despite all the denials, the recent
sophisticated and widespread hacks into Department of Defense
(DoD) computer networks by personnel at a Russian Academy of
Sciences lab did in fact manage to penetrate at least a few
classified systems, according to knowledgeable sources and
inferences made during recent congressional testimony.
http://www.mit-kmi.com/3_6_art1.htm

After the WTO wash out British cyber-activists switch
tactics Electrohippies resort to spam. Having failed to bring
the World Trade Organisation's (WTO) servers down, British
cyber-activists 'the Electrohippies' have decided to resort
to a good old-fashioned spam attack in their quest to harass
the colossus of global capitalism.
http://www.zdnet.co.uk/news/1999/48/ns-11944.html

Drain on security staff leaving companies open to attack
A lack of skilled security workers is leaving companies
vulnerable to attack according to Richard Parkinson, northern
European managing director of Network Associates. The market
hasn't progressed in terms of skilled employees' and this is
putting more weight on security vendors to develop increasingly
manageable and proactive products, he said.
http://www.silicon.com/public/door?REQUNIQ=944241304&6004REQEVENT=&REQINT1=3
4445&REQSTR1=newsnow

Linux hacking tool released
Nomad releases beta of Pandora. The popular security tool
Pandora, has been released in beta format for Linux by hacking
group, Nomad Mobile Research Centre (NMRC). Pandora is touted by
NMRC as a helpful tool for conscientious security professionals
interested in testing the vulnerability of Novell's NDS networking
architecture rather than a mischievous cracker's tool.
http://www.zdnet.co.uk/news/1999/48/ns-11928.html

FC