[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Thu, 15 Jun 2000 06:20:12 -0700 (PDT)


fc  Thu Jun 15 06:21:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 15 Jun 2000 06:21:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Jun 15 13:21:07 2000)
X-From_: sentto-279987-409-961075215-fc=all.net@returns.onelist.com  Thu Jun 15 08:20:10 2000
Received: from hk.egroups.com (hk.egroups.com [208.50.144.91]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id IAA20893 for ; Thu, 15 Jun 2000 08:20:10 -0500
X-eGroups-Return: sentto-279987-409-961075215-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by hk.egroups.com with NNFMP; 15 Jun 2000 13:20:16 -0000
Received: (qmail 20724 invoked from network); 15 Jun 2000 13:20:14 -0000
Received: from unknown (10.1.10.142) by m2.onelist.org with QMQP; 15 Jun 2000 13:20:14 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta3 with SMTP; 15 Jun 2000 13:20:13 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA16944 for iwar@onelist.com; Thu, 15 Jun 2000 06:20:12 -0700
Message-Id: <200006151320.GAA16944@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 15 Jun 2000 06:20:12 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Huge Securities Bust: Five Mob Families Hit the Net
Members of five organized crime families, two
chain restaurant officers, and a long list of
brokers were charged on Wednesday in a mammoth
securities fraud case demonstrating the mob's
determination to infiltrate Wall Street.
As part of the overall fraud, the Internet was
used to promote stocks, and companies were
falsely touted as dot-com companies to induce
investors to capitalize on the Internet boom,
prosecutors said.
http://www.zdnet.com/zdtv/cybercrime/internetfraud/story/0,9955,2587796,00.html
http://news.cnet.com/news/0-1007-200-2077962.html
http://www.newsbytes.com/pubNews/00/150643.html

Philippine president signs law to punish computer crimes
President Joseph Estrada signed an electronic
commerce law Wednesday, spurred by criticism
the Philippines had no system to punish
perpetrators of last month's ``ILOVEYOU''
computer virus. Under the law, which went into
effect immediately, hackers and those who spread
computer viruses can be fined a minimum of
$2,350 and a maximum ``commensurate'' with the
damage caused, and can be imprisoned for up to
three years.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/030004.htm
http://news.cnet.com/news/0-1005-200-2076049.html

HK Government Web site attacks show up lack of awareness
Two attacks within 24 hours on a popular Hong
Kong Government Web site had exposed security
weaknesses and officials' lack of awareness of
computer hacking, legislators said on Monday.
The interactive home page, offering investment
advice and traffic details, was still suspended
last night pending a full-scale review of ways
to strengthen protection.
http://technology.scmp.com/internet/DAILY/20000613082007849.asp

Gorton campaign accuses Cantwell of Web 'hacking'
As she launched a TV ad campaign touting Internet
privacy, Democratic Senate candidate Maria Cantwell
found herself accused by the campaign of her opponent,
Republican Sen. Slade Gorton, of computer hacking.
A picture posted by Gorton's campaign on its newly
minted Slade2000.com Web site suddenly showed up
last Friday on the Cantwell2000.com Web site,
illustrating a press release excoriating the GOP
senator. Gorton's campaign charged that it had been
"hacked" and "hijacked." Identifying Cantwell as the
culprit, it charged: "Maria had inappropriately
connected her home page to our system and
inappropriately used a picture from our site."
http://seattlep-I.com/local/cant14.shtml

Security firm warns of outdated software
Outdated and untested software used to run the
Internet address system has undermined online
security, an Australian company is warning.
Sydney-based DeMorgan said 30 percent of the
computers controlling the ".com" domain name
system (DNS)--including several of the highest
level root servers--are vulnerable to "denial
of service" and other attacks because they are
running software that is outdated or was never
meant for commercial release. Such attacks,
which overwhelm a server with bogus requests
for information, recently crippled several
large e-commerce sites.
http://news.cnet.com/news/0-1005-200-2073583.html

Energy asking for millions for security
The Energy Department is seeking hundreds of
millions of dollars in the fiscal 2001 budget
to dramatically increase security at its
defense facilities. Even before the latest
breach of security was disclosed at Los Alamos
National Laboratory, chief information officer
John Gilligan said the request was part of the
appropriations process to make major security
improvements at strategic locations.
http://www.fcw.com/fcw/articles/2000/0612/web-funding-06-14-00.asp

Federal cybersecurity efforts outpace private sector
The federal government is one step ahead of
private sector companies when it comes to
computer security, an industry expert said
Tuesday. Federal agencies typically know
where their technology security problems lie,
while private companies are unaware of their
vulnerabilities, said Jim Gerretson, director
of operations for information assurance at
ACS Defense Inc. ACS is one of 27 prime
contractors on a series of information
security contracts administered by the General
Services Administration.
http://www.govexec.com/dailyfed/0600/061400j1.htm

House committee OKs anti-spam bill
Federal anti-spam legislation passed a key test
today, as the House Commerce Committee voted to
approve a bill limiting junk email. The Unsolicited
Electronic Email Act would place restrictions on
email marketers. Those limits include requiring
spam to include a valid reply address and forcing
people and companies to stop spamming upon request.
"This legislation weeds out fraudulent spam and
eliminates the burden" of deleting unwanted email,
Rep. Gene Green, D-Texas, said in a statement.
http://news.cnet.com/news/0-1005-200-2077968.html

Michigan A.G. goes after Web cookies
Michigan Attorney General Jennifer Granholm has
threatened legal action against four World Wide
Web publishers, alleging that each site fails to
warn customers that they are being tracked by a
third party. Granholm said these sites fail to
tell customers that a third-party company is
placing "cookies," or small programs that
automatically upload on the individual's
computer that track the visitor's surfing.
http://www.civic.com/civic/articles/2000/0612/web-1ag-06-14-00.asp
http://www.newsbytes.com/pubNews/00/150620.html

AMA passes guidelines for doctor/patient e-mail
The American Medical Association has adopted a
set of guidelines for making e-mail a more
effective means of communication between
doctors and patients, while staying mindful of
privacy issues and possible technical glitches.
http://www.cnn.com/2000/HEALTH/06/14/medical.email/index.html

Internet Game Teaches Kids to Avoid Sex Predators
With sexual predators prowling the Internet,
often digitally disguised as friendly
teenagers or modeling agents, it may no
longer be enough to admonish children not
to talk to strangers. Pedophiles who once
lurked on street corners or near schoolyards
have taken their sinister hunt into
cyberspace, a tough-to-police world where
candy and tales of lost kittens have given
way to more sophisticated temptations.
http://www.zdnet.com/zdtv/cybercrime/viceonline/story/0,9955,2587765,00.html

Computer hackers ride into town today
It's billed as the Midwest's largest computer
security convention, but when the three-day
RootFest opens in St. Paul's RiverCentre today,
think of it simply as hackers' heaven. Heaven,
after all, is supposed to be fun, and, in this
case, for good hackers. And that's what RootFest
hopes to promote -- hackers as the guys in the
white hats who actually improve security on the
Internet as they light up brain cells and hard
drives trying to poke holes in computer security
systems.
http://www.pioneerplanet.com/yhoo/mtc_docs/020426.htm

The Death of Unencrypted Connections?
Over the last few years "hacker" tools have become
much more widespread and available to malicious
attackers.  Combine this with the ease of getting
operating systems - almost anything a corporation
has short of a mainframe OS you can download from
the Internet and run on your Intel PC.
http://www.securityportal.com/closet/closet20000614.html

------------------------------------------------------------------------
IT Professionals: Match your unique skills with the best IT projects at
http://click.egroups.com/1/3381/7/_/595019/_/961075215/
------------------------------------------------------------------------

------------------
http://all.net/