[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Tue, 27 Jun 2000 20:08:09 -0700 (PDT)


fc  Tue Jun 27 20:10:15 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 27 Jun 2000 20:10:15 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Jun 28 03:10:12 2000)
X-From_: sentto-279987-434-962161759-fc=all.net@returns.onelist.com  Tue Jun 27 22:09:23 2000
Received: from ef.egroups.com (ef.egroups.com [207.138.41.172]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id WAA19643 for ; Tue, 27 Jun 2000 22:09:23 -0500
X-eGroups-Return: sentto-279987-434-962161759-fc=all.net@returns.onelist.com
Received: from [10.1.10.37] by ef.egroups.com with NNFMP; 28 Jun 2000 03:09:21 -0000
Received: (qmail 17963 invoked from network); 28 Jun 2000 03:08:15 -0000
Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 28 Jun 2000 03:08:15 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 28 Jun 2000 03:08:12 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id UAA09543 for iwar@onelist.com; Tue, 27 Jun 2000 20:08:09 -0700
Message-Id: <200006280308.UAA09543@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 27 Jun 2000 20:08:09 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Russia Holds Lithuanian for Spying for Washington
Russia's FSB domestic security service said Monday
it had exposed and detained a Lithuanian on charges
he spied for the United States by hacking into its
computer systems. ``A Lithuanian citizen, exposed by
members of the FSB, gave a detailed testimony that,
while being an agent of the Lithuanian state security
department, he was active on a CIA special operation
from the beginning of 1999,'' the FSB, a successor
body to the Soviet-era KGB, said in a statement.
http://dailynews.yahoo.com/h/nm/20000626/pl/russia_spy_dc_3.html
http://dailynews.yahoo.com/h/ap/20000626/wl/russia_spy_1.html

Hacker taps into 24,000 credit cards
A COMPUTER hacker has breached the security of a
pioneering internet service provider to obtain the
names, addresses, passwords and credit card details
of more than 24,000 people. The victims include
scientists at the top-secret Defence Evaluation and
Research Agency, senior officials in the government,
BBC bosses and executives at companies such as Shell,
Barclaycard and Halifax. The hacker, an information
technology consultant, says that he targeted Redhotant
to expose security lapses.
http://www.the-times.co.uk/news/pages/sti/2000/06/25/stinwenws01002.html

Wall Street Awash In Crooks
Two major cases of criminal fraud involving Internet
companies made it to the courts recently. One has all
the makings of an episode of The Sopranos, complete
with mobsters, the threat of violence and a plot to
murder a witness. During the course of five years,
investors lost about $50 million. The case captured
front-page headlines. The other case was a massive
accounting fraud that investigators believe lasted
more than a decade, cost investors billions of
dollars and almost ruined a reputable company.
http://www.zdnet.com/intweek/stories/news/0,4164,2593253,00.html

Internet crooks taking new identities
When Maureen Mitchell, a nurse living in Ohio,
found out that her credit card number was being
used to make mail-order purchases at a Carson Pirie
Scott store in Chicago, she quickly canceled her card,
got a police report on the incident and presumed the
matter was closed. Two months later, she found the
matter was far from closed. A representative from the
J.C. Penney credit department called her to find out
why she wasn't making payments on a $2,600 line of
credit taken out at its Woodfield mall department
store in her husband's name by her "niece and nephew."
http://www.chicago.tribune.com/tech/news/article/0%2C2669%2CART-45229%2CFF.html

FBI doesn't share cyberinfo, exec says
Despite the boss' suggestion that agencies and
industry should share information to defend against
cyberattacks, the FBI does not play along, according
to a senior executive with an information technology
security company. Phillip Lacombe, a senior vice
president with Veridian Corp., remarked on the FBI's
unwillingness to share data after being told that
Attorney General Janet Reno urged industry leaders
to work cooperatively with government agencies to
defend against cybercrime and cyberterrorism.
http://www.fcw.com/fcw/articles/2000/0626/web-fbi-06-26-00.asp

Terrorists use new tools, old tactics
Despite increasing concern about cyberterrorism,
a report published this month by a blue-ribbon panel
of experts concluded that the tactics and goals of
the world's terrorist organizations remain low-tech.
The report, "Countering the Changing Threat of
International Terrorism," published by the National
Commission on Terrorism, suggests that although the
terrorist's toolbox has changed with the advent of
the Information Age, the objectives of the world's
terrorist organizations have not.
http://www.fcw.com/fcw/articles/2000/0626/web-terror-06-26-00.asp

Russian government approves 'information security doctrine'
Amid growing concerns about media freedom in Russia,
President Vladimir Putin's powerful Security Council
approved an 'information security doctrine' today to
strengthen the government's role in monitoring
information flows in Russia. Putin said the doctrine
would safeguard journalists' rights, help crack down
on computer crime, and support the telecommunications
industry. But critics were skeptical about the
document's true aims. The document wasn't immediately
published; without details, its impact on media
freedom was unclear.
http://www.theage.com.au/breaking/0006/24/A30741-2000Jun24.shtml

McCain To Tack Net Filtering Onto Appropriations Bill
Legislation requiring schools and libraries to run
filtering software on computers used by children
should be easily tacked on to a Senate appropriations
bill Tuesday, Senate sources said today. Senate Commerce
Committee Chairman John McCain, R-Ariz., has introduced
his Children's Internet Protection Act as an amendment
to the Labor-Health and Human Services appropriation
bill currently under consideration in the Senate.
A committee source today told Newsbytes that the
amendment is virtually assured easy passage when it
comes to a vote early Tuesday.
http://www.newsbytes.com/pubNews/00/151219.html

Security checks crash Cisco routers
Red-faced networking giant Cisco has been forced to
warn customers that its routers can crash when tested
for security vulnerabilities by security scanning
software programs. The defect, due to a fault in
Cisco's IOS (Internet Operating System) software,
can be exploited repeatedly to produce a consistent
denial of service (DoS) attack, Cisco has admitted.
The defect first came to light two months ago but
is still an issue in the field, so Cisco has issued
a reminder to customers.
http://www.vnunet.com/News/1104718

Latest viruses exploit human frailties
At first, it didn't seem the new "Stages" worm would
cause much disruption -- Computer Associates International
Inc. ranked it a "medium threat." But two days later, CA
upgraded the risk to "medium high" as the worm ended up
disrupting mail servers across the Internet. The reason:
social engineering. Users have grown savvy in fighting
viruses, so the new challenge for those who write them
isn't how creative or damaging their script is, but
rather how well they can hide the fact that they are
launching a virus.
http://www.zdnet.com/zdnn/stories/news/0,4586,2593514,00.html

Securing dot-com
The past six months have been difficult for security
officials --from the high-profile DDoS attacks on major
Web portals to the hijacking last week of Nike Inc.'s
site --and the future doesn't look much brighter.
Despite product pitches to the contrary, you can't
stay ahead of crackers with technology hot fixes.
Only well-defined security policies and informed users
will enable a safe computing environment. Security
problems are growing more numerous as knowledge and
the number of Internet-connected systems grow. The
number of reported security problems registered a
sharp uptick last year, according to Computer
Emergency Response Team statistics: The security body
received 9,859 incident notifications in 1999, compared
with 3,734 notifications in 1998. In just the first
quarter of this year, 4,266 incidents have been reported.
http://www.zdnet.com/eweek/stories/general/0,11011,2593629,00.html

The Motives and Psychology of the Black-hat Community
Know Your Enemy: Motives - This paper is a continuation
of the Know Your Enemy series. This series is dedicated
to learning the tools and tactics of the black-hat
community. Unlike the previous papers which focused
purely on the "what" and "how" of the black-hat
community, specifically the technical tools, their use
and implementation, this paper explores the motivation
and psychology of the black-hat community, in their
very own words.
http://www.securityfocus.com/focus/ids/articles/kye/motives.html

------------------------------------------------------------------------
IT Professionals: Match your unique skills with the best IT projects at
http://click.egroups.com/1/3381/14/_/595019/_/962161759/
------------------------------------------------------------------------

------------------
http://all.net/