[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Fri, 16 Jun 2000 05:45:22 -0700 (PDT)


fc  Fri Jun 16 05:46:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Fri, 16 Jun 2000 05:46:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Fri Jun 16 12:46:07 2000)
X-From_: sentto-279987-414-961159525-fc=all.net@returns.onelist.com  Fri Jun 16 07:45:21 2000
Received: from ci.egroups.com (ci.egroups.com [207.138.41.176]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA10134 for ; Fri, 16 Jun 2000 07:45:21 -0500
X-eGroups-Return: sentto-279987-414-961159525-fc=all.net@returns.onelist.com
Received: from [10.1.10.37] by ci.egroups.com with NNFMP; 16 Jun 2000 12:45:26 -0000
Received: (qmail 29265 invoked from network); 16 Jun 2000 12:45:23 -0000
Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 16 Jun 2000 12:45:23 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 16 Jun 2000 12:45:22 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA24274 for iwar@onelist.com; Fri, 16 Jun 2000 05:45:22 -0700
Message-Id: <200006161245.FAA24274@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Fri, 16 Jun 2000 05:45:22 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

NZ defence force downplays teen's 'secret' e-mails
THE significance of New Zealand defence papers
turning up in a British teenager's e-mail
messages was last night being downplayed
by the country's Defence Force. Claire
McDonald, 15, of Devon, England, has been
receiving e-mails for the past six months
that she believed came from the Pentagon
in the United States, One Network News
reported last night. They include a
document on New Zealand defence strategy
for 2000-2001 which detailed - ironically
- how the country handles its defence information.
http://www.it.fairfax.com.au/breaking/20000615/A8896-2000Jun15.html

Senators hit Energy again over disks
Republican senators told Energy Department
officials yesterday that their explanations
about the disappearance of two computer hard
drives containing nuclear secrets was not
good enough. At a contentious hearing, the
lawmakers repeatedly berated the department
witnesses for a three-week delay in reporting
the missing material and their failure to
impose tight controls over classified
information at the Los Alamos National
Laboratory in New Mexico.
http://www.fcw.com/fcw/articles/2000/0612/web-doe-06-15-00.asp

Security firms disagree over movie virus threat
Security experts this week were divided on the
threat posed by a new Trojan virus after its
identification late last week. Bernardo Quintero,
a virus expert with Spanish computer security
organization HispaSec, contends that the
malicious program, which supposedly hides itself
in computer movie files, is not vicious at all.
He says it's nothing but an "elementary Trojan
virus serving the marketing purposes of a few
security firms and government departments."
http://www.networkworld.com/news/2000/0615secdisagree.html

How loose is your laptop?
People used to guard business secrets and highly
classified documents with their lives. Nowadays,
even national security secrets are getting lost
or left in homes, hotels, taxis and train stations.
The reason? When secrets shifted from paper to
electronic files, the new technology allowed
workers to carry their offices around with them.
But they forgot to bring along the sensitivity to
security that secrets are supposed to entail.
http://www.mercurycenter.com/svtech/news/top/docs/laptop061500.htm

How to Deter Theft of Laptops
While portables (especially the new ultralights)
are great for travel, they are also a magnet for
criminals. Thieves often snatch computer cases
right off airport X-ray machine belts and in
lounge areas while you're looking the other way.
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/06/15/BU19945.DTL

Old security models inadequate for ebusiness
The traditional approach to security adopted
by many companies is outdated and will leave
firms vulnerable as they enter the ebusiness
market, a leading technology consultancy has
warned. In its report E-Business Security:
New Directions and Successful Strategies,
Ovum argues that the traditional hierarchy
of trust adopted by organisations does not
fit the ebusiness model, meaning that access
channels, such as mobile devices, could pose
a major security threat.
http://www.vnunet.com/News/1103325

------------------------------------------------------------------------
Remember four years of good friends, bad clothes, explosive chemistry 
experiments.
http://click.egroups.com/1/5532/7/_/595019/_/961159525/
------------------------------------------------------------------------

------------------
http://all.net/