[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 2 Jun 2000 05:01:14 -0700 (PDT)


fc  Fri Jun  2 05:02:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 02 Jun 2000 05:02:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Jun  2 12:02:14 2000)
X-From_: sentto-279987-391-959947276-fc=all.net@returns.onelist.com  Fri Jun  2 07:01:18 2000
Received: from ef.egroups.com (ef.egroups.com [207.138.41.172]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA10661 for ; Fri, 2 Jun 2000 07:01:18 -0500
X-eGroups-Return: sentto-279987-391-959947276-fc=all.net@returns.onelist.com
Received: from [10.1.10.35] by ef.egroups.com with NNFMP; 02 Jun 2000 12:01:16 -0000
Received: (qmail 10983 invoked from network); 2 Jun 2000 12:01:15 -0000
Received: from unknown (10.1.10.27) by m1.onelist.org with QMQP; 2 Jun 2000 12:01:15 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta2 with SMTP; 2 Jun 2000 12:01:15 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA10606 for iwar@onelist.com; Fri, 2 Jun 2000 05:01:14 -0700
Message-Id: <200006021201.FAA10606@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 2 Jun 2000 05:01:14 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

FBI, DOJ Issue List of Worst Net Threats
No shocker: Opening e-mail attachments without
checking the source or content is the No. 1
security mistake. The FBI, the Department of
Justice and the System Administration, Networking
and Security Institute are jointly releasing a
list detailing the 10 most critical Internet
security threats and how to eliminate them.
http://www.thestandard.net/article/display/0,1151,15608,00.html

Who Should Fight Cybercrime?
As the world's top politicians, lawmakers, and
business types argue and bleat over what must
be done to stop the horrible, world-stopping
threat known as cybercrime, a group of engineers
who built and preside over the Internet's
backbone are debating whether they should get
involved.
http://wired.com/news/politics/0,1283,36566,00.html

Web hijackers pilfer Internet Domain names
Cyberspace hijackers have stolen the Internet
domain name Web.net, a hosting site for 700 charities,
from its Canadian owners, exposing yet another of the
Internet's security flaws and jeopardizing the Web's
most valuable property -- your e-identity.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/56505l.htm
http://news.cnet.com/news/0-1005-200-1995485.html

Web security ups ante, goes nuclear
British Internet companies are increasingly turning
to complexes capable of withstanding a nuclear
onslaught in the battle against computer hackers
and other threats, according to one security
consultant. Nuclear bunkers might sound excessive
but, says Ian Johnston-Bryden, consultant with
Firetrench Security, they are the ideal security
solution. Johnston-Bryden says that these
facilities not only provide unparalleled physical
protection -- a site that his company is co-developing
in Kent can withstand a near miss from a tactical
nuclear weapon -- but also come with an abundance
of power and connectivity. Many have backup generators
as well as a backup satellite link.
http://www.zdnet.com/zdnn/stories/news/0,4586,2579948,00.html

Pentagon envisions cyber-warfare rise
The U.S. military by 2020 will develop the
capability to conduct attacks on foreign computers
and networks while defending its systems against
strategic information warfare strikes, a Pentagon
report on future war fighting made public yesterday
says. Additionally, the military will seek to
improve weaknesses uncovered during the Kosovo
conflict last year to better conduct operations
with allies in combat, the Joint Staff report
"Joint Vision 2020" says.
http://www.washtimes.com/national/default-200053122319.htm

DOD redefining info ops
Based on the lessons learned from the 78-day air
war in Kosovo, Defense Department officials are
seeking to redefine the emerging field of high-tech
information operations, a senior DOD official said
last week.
http://www.fcw.com/fcw/articles/2000/0529/news-nato-05-29-00.asp

Hacktivism in the Cyberstreets
In early May an activist calling himself "Reverend
Billy" called for thousands of computer owners to
fire up their modems for an assault on Starbucks.
 From unseen corners of the globe, they'd converge
on the company's Web site -- hoping to overload it.
http://www.alternet.org/story.html?StoryID=9223

FC

------------------------------------------------------------------------
IT Professionals: Match your unique skills with the best IT projects at
http://click.egroups.com/1/3381/7/_/595019/_/959947276/
------------------------------------------------------------------------

------------------
http://all.net/