[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 31 May 2000 05:56:53 -0700 (PDT)


fc  Wed May 31 05:57:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 31 May 2000 05:57:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed May 31 12:57:07 2000)
X-From_: sentto-279987-387-959777814-fc=all.net@returns.onelist.com  Wed May 31 07:56:49 2000
Received: from hm.egroups.com (hm.egroups.com [208.50.144.92]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA23361 for ; Wed, 31 May 2000 07:56:49 -0500
X-eGroups-Return: sentto-279987-387-959777814-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by hm.egroups.com with NNFMP; 31 May 2000 12:56:55 -0000
Received: (qmail 15302 invoked from network); 31 May 2000 12:56:54 -0000
Received: from unknown (10.1.10.26) by m4.onelist.org with QMQP; 31 May 2000 12:56:54 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 31 May 2000 12:56:53 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA27541 for iwar@onelist.com; Wed, 31 May 2000 05:56:53 -0700
Message-Id: <200005311256.FAA27541@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 31 May 2000 05:56:53 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

FBI pursues cause of e-mail virus
Computer experts and the FBI pursued yet another
e-mail virus Saturday, this one using a guise of
a woman's work resume to threaten the world's
computers. Unlike an earlier bug that claimed to
be looking for love, the new threat was discovered
Friday looking for a job. The virus -- called
``Killer Resume'' -- is spread through e-mail
systems using the Microsoft Outlook program, FBI
officials said. They refused to elaborate on the
investigation.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/40873l.htm

Anti-Metallica Hackers Hit DC Metro Web Site
A computer hacker vandalized the DC Metro's Web
site for at least five hours Monday by replacing
transit information with an X-rated message
lashing out at recording artists who have filed
lawsuits to stop people from swapping music files
over the Internet. The attack, the first for Metro,
illustrated how vulnerable many public Internet
sites have become to being exploited by vandals.
http://www.newsbytes.com/pubNews/00/149769.html

Pacific Bell, Excite@Home pawns in domain hijack
Web surfers going to www.pacificbell.com would
expect to find information about the products
and services offered by the local phone company
that operates primarily on the West Coast.
Instead, potential Pacific Bell customers are
greeted with a fully operational Web page for
Excite@Home, which markets high-speed Net access
over cable TV systems. The site appears to be
the work of a Pacific Bell customer in Santa Ana,
Calif., named Mike Mead, according to online
domain name registration records. Mead could not
be reached for comment, but he lists a Pacific
Bell email address.
http://news.cnet.com/news/0-1004-200-1981048.html

All Star site gears up for hackers
Major League Baseball's (MLB) All-Star Game has
been taking great pains to make sure fans don't
hack, hack, hack for the home team. Last year,
MLB collected 1 million online ballots -- the
most since it kicked off electronic balloting
in 1996. The organization hopes to double that
number before this year's July 2 deadline,
according to MLB spokesman Pat Courtney. But
All-Star officials are trying to reach that goal
without a repeat of an incident last season where
a fan from Carver, Mass., tried to stuff 39,000
votes for Boston Red Sox shortstop Nomar
Garciaparra through the online balloting system.
http://computerworld.com/home/print.nsf/all/000526E3A2

US groups target hackers
Information technology companies once relied on
anti-virus software and consultancies to protect
themselves from malicious hacker attacks. But now,
US companies are set to form an industry self-help
group to provide early warning of online assaults.
The group, known as an "information sharing
mechanism," will enable high technology companies
to share data anonymously about software
vulnerabilities and systems attacks. The mechanism,
to be launched in the next few months, may even
give participants access to classified government
information.
http://news.ft.com/ft/gx.cgi/ftc?pagename=3DView&c=3DArticle&cid=3DFT3POQIFU8C

Beating big bad bugs
Computer security companies are developing novel
ways to spot viruses and malicious hacking before
serious damage is done. Under development are
populations of smart software programs that can
spot suspicious behaviour or programs that might
be viruses.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_765000/765359.stm

Malaysian ISP Admits 'Human Error' In Security Fiasco
Malaysian Government-funded research corporation
and Internet service operator Mimos Berhad admits
that a staff member carelessly placed a large
number of confidential company files on a publicly
accessible Internet server. Mimos Chief Operating
Officer Dr Mohamed Awang-Lah said in an e-mail
response to Newsbytes on Sunday that the incident
was the result of "human error" and "carelessness."
http://www.newsbytes.com/pubNews/00/149718.html

Plug pulled, but data still exist
Shortly after 9:30 a.m. yesterday, a group of
federal government bureaucrats gathered around
a computer terminal in Ottawa to witness the
severing of an electronic cord that bound up
information on the lives of more than 33 million
adults who have lived in Canada since 1971. The
morning ceremony was, in official government
parlance, the dismantling of the Longitudinal
Labour Force File (LLFF), a gigantic computerized
record of the names, addresses, social insurance
numbers, annual incomes, and much more personal
information about millions of Canadians.
http://www.nationalpost.com/news.asp?f=3D000530/303252&s2=3Dnational

INTRUSION-DETECTION SERVICES PROLIFERATE AS ATTACKS
BECOME MORE FREQUENT AND DAMAGING
It was 2 a.m. when the intrusion-detection alarm
sounded at DefendNet Solutions Inc. Security
technicians at the managed-security services
firm scrambled to find the source of the
suspicious traffic, which was hitting one of
its client's networks. Once they traced it to
the source, DefendNet's techs phoned the IT
department of the company running the culprit
machine. Turns out the unauthorized traffic
wasn't a hack attack, but the result of an
innocent mistake-a misconfigured Simple
Network Management Protocol machine.
http://web.lexis-nexis.com/more/cahners-chicago/11407/5893007/2

Internet Pornography Detection Patent Filed by Heartsoft, Inc.
Heartsoft, Inc., reported today that the company
has filed for patent protection of its proprietary
on-line Internet pornography detection software
with the U.S. Patent and Trademark Office. The
image detection and analysis technology described
in the patent application filed on Friday, May 26,
2000, will make its initial debut as part of the
advanced security of the company's new secure
Internet browser for children, Internet Safari(R).
The application entitled, "Evaluating Graphic Image
Files for Objectionable Content," was submitted to
the U.S. Patent office in order to protect the highly
proprietary image detection software developed by
Heartsoft.
http://www.businesswire.com/cgi-bin/f_headline.cgi?day0/201510449&ticker=3Dhtsf


------------------------------------------------------------------------
Hot off the press- summer's here!
School's out and it's sizzling hot. Whether you're planning a 
graduation party, a summer brunch, or simple birthday party, 
shop GreatEntertaining.com before your next celebration.
http://click.egroups.com/1/4473/7/_/595019/_/959777815/
------------------------------------------------------------------------

------------------
http://all.net/