[iwar] More news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 31 May 2000 22:19:37 -0700 (PDT)


fc  Wed May 31 22:20:13 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 31 May 2000 22:20:13 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Jun  1 05:20:06 2000)
X-From_: sentto-279987-390-959836781-fc=all.net@returns.onelist.com  Thu Jun  1 00:19:36 2000
Received: from hk.egroups.com (hk.egroups.com [208.50.144.91]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id AAA25348 for ; Thu, 1 Jun 2000 00:19:36 -0500
X-eGroups-Return: sentto-279987-390-959836781-fc=all.net@returns.onelist.com
Received: from [10.1.10.37] by hk.egroups.com with NNFMP; 01 Jun 2000 05:19:42 -0000
Received: (qmail 28770 invoked from network); 1 Jun 2000 05:19:39 -0000
Received: from unknown (10.1.10.142) by m3.onelist.org with QMQP; 1 Jun 2000 05:19:39 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta3 with SMTP; 1 Jun 2000 05:19:38 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id WAA32575 for iwar@onelist.com; Wed, 31 May 2000 22:19:37 -0700
Message-Id: <200006010519.WAA32575@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 31 May 2000 22:19:37 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] More news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Web sites 'stolen' by hackers
Two small Internet companies on opposite sides of
the globe with valuable domain names had their Web
sites "stolen" over the weekend. Crafty computer
criminals plucked "Web.Net" and "Bali.com" right
out of the database where Internet addresses are
reserved. Five days later, the Web sites are still
broken and the domain names are registered to
someone else. Both firms were likely victims of
the third publicized attack in the past six weeks
on one of the Internet's core technologies.
http://www.msnbc.com/news/414587.asp

E-mail virus info 'stolen'
An Auckland software developer who found a security
flaw in Microsoft's e-mail software that he believes
could secretly unleash a "hell virus" says files on
his discovery have been stolen from his computer.
Phil Saleh, creative director of Arabesque Multimedia -
who has a back-up of his find - discovered the flaw in
Microsoft's Outlook Express program while designing
Java script software that automatically activates
computer functions.
http://www.herald.co.nz/storydisplay.cfm?storyID=138622

Programmer pulls the plug on ICUII
The ICUII videoconferencing network has been shut
down for the second time in a month, and the
company said Tuesday a malicious programmer was
to blame. The man who developed the ICUII software
said he pulled the plug on the company's servers
after its licensing agreement expired. ICUII
servers abruptly shut down at 8:20 p.m. EDT
Wednesday, said Kevin Adair, CEO of Cybration Inc.,
which operates the network. "Someone just flipped
a switch, or a Trojan horse set to go off at that
time terminated the servers."
http://www.zdnet.com/zdnn/stories/news/0,4586,2578915,00.html

Bank manager executed
A bank manager in Guangdong province has been executed
for embezzling more than 2 million yuan (about HK$1.79
million) by manipulating computer records, state-run
media reported on Tuesday. Shen Weibiao, a 32-year-old
former manager of a Bank of China branch in Shaoguan
city, Guangdong, was executed on Saturday after the
Supreme People's Court rejected his appeal, the Beijing
Youth Daily and other newspapers reported.
http://www.scmp.com/News/China/Article/FullText_asp_ArticleID-20000530131544704.asp

Girl's Gift Computer Comes Loaded With Porn
A 15-year-old girl's grandfather and father have
been charged with giving her a computer loaded with
hundreds of images of child pornography, police said.
The grandfather, 53-year-old Rodney Saiter, admitted
downloading pornography from European Internet sites
onto a computer that he had given to his son, 34-year
old Robert Saiter, to give to his teenage daughter at
Easter time, said Detective Dane Howard of the Huron
County Sheriff's Department.
http://www.apbnews.com/newscenter/internetcrime/2000/05/31/computerporn0531_01.html

Pennsylvania makes spreading computer viruses criminal
People who intentionally spread a computer virus
face a seven-year prison sentence and a $15,000
fine in Pennsylvania after Governor Tom Ridge
signed a new bill into law May 26. The bill also
requires that restitution be paid for any damages
caused. The bill, which passed the House and
Senate unanimously, makes computer hacking
including denial of service attacks and the
willful spread of a computer virus a crime. It
also defines a computer virus for the first time.
http://www.civic.com/civic/articles/2000/0529/web-1penn-05-31-00.asp
http://www.newsbytes.com/pubNews/00/149883.html

Senate eyes Guard for info security
The Senate this month urged the Pentagon to study
how it might use the Army National Guard to make
up for the shortage of computer programmers and
information security specialists. "The reserve
component, especially the National Guard, is well
positioned" to carry out the mission of securing
the nation's critical computer systems, the Senate
Appropriations Committee said in its report on the
fiscal 2001 Defense Appropriations bill.
http://www.fcw.com/fcw/articles/2000/0529/web-army-05-31-00.asp

EU Members Approve Data Privacy Agreement - Update
US companies that want to engage in electronic
commerce with their European Union counterparts
are one step closer to complying with EU data
privacy requirements now that a key EU committee
has approved a "safe harbor" data protection
agreement. The committee vote comes while
President Clinton visits Portugal, which
currently is taking the lead role in stewarding
the European Union. A White House statement
released in conjunction with Clinton's trip
said that the safe harbor will help prevent
the disruption of about $120 billion in trade.
http://www.newsbytes.com/pubNews/00/149858.html

FTC Threat To Regulate E-privacy Gets Real
A federal regulators' call last week to legislate
Internet privacy protections re-opened a
controversial issue that had been dormant for
a year. Consumer privacy concerns have been on
the front burner and growing hotter for at least
two years as Internet participation took off.
But legislation has only been a threat, brought
up at annual hearings reviewing regulators'
surveys of how Internet sites handle privacy.
http://www.planetit.com/techcenters/docs/security/news/PIT20000531S0005

Online Gambling Bill A Web of Industry Favors
The Internet Gambling Prohibition bill was
supposed to do just what its name implied:
curb the explosion of online gambling. But
as the bill heads into the final stretch
in Congress, it has become a magnet for
favors to gambling interests.
http://www.newsbytes.com/pubNews/00/149820.html

Internet Gambling grows at torrid rate worldwide
When he is unable to sleep or needs a quick
pick-me-up, ``Neil'' turns on his home computer,
finds an Internet casino and gambles away his
money with a credit card and the click of a
mouse. From the privacy of his living room,
he can instantly find more than 800 casinos
on the Web and turn his PC into an electronic
blackjack, slot or poker machine or a sports
bookie who will take his wagers 24 hours a day.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/50795l.htm

Ethics in Information Security
I've been looking into computer ethics recently,
and it struck me that there seems to be a real
lack of any good documentation or books on the
  subject. When you consider the number of value
based judgements administrators need to make
with little or no guidance, the problem becomes
apparent. When is it okay to read a user's
email? Is it okay to monitor the sites a user
visits? Is it okay to monitor every key stroke
and take a video of their screen for later
review? Where do you draw the line at data
mining? Should students be given unsupervised
access to the Internet? Should applications
like Napster, ICQ and web browsers be restricted?
http://www.securityportal.com/closet/closet20000531.html

Marcia Clark: The Digital Criminals Among Us
The scope of the devastation was astounding.
Casualties were reported in 80 percent of the
businesses in Sweden and 70 percent in Germany.
War? Not exactly, says Marcia Clark in her Eye
on the Law column. It was just one of the latest
waves of computer virus attacks that have struck
the global networks in the past couple months.
http://www.apbnews.com/newscenter/clark/index.html

------------------------------------------------------------------------
Scrap your search engine.
Inforocket.com is the fast way to the right answer - guaranteed.
http://click.egroups.com/1/4517/7/_/595019/_/959836781/
------------------------------------------------------------------------

------------------
http://all.net/