[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 28 Jun 2000 02:00:11 -0700 (PDT)


fc  Wed Jun 28 02:01:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 28 Jun 2000 02:01:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Jun 28 09:01:15 2000)
X-From_: sentto-279987-435-962182812-fc=all.net@returns.onelist.com  Wed Jun 28 04:00:08 2000
Received: from ho.egroups.com (ho.egroups.com [208.50.144.85]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id EAA02472 for ; Wed, 28 Jun 2000 04:00:08 -0500
X-eGroups-Return: sentto-279987-435-962182812-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by ho.egroups.com with NNFMP; 28 Jun 2000 09:00:13 -0000
Received: (qmail 31405 invoked from network); 28 Jun 2000 09:00:12 -0000
Received: from unknown (10.1.10.142) by m4.onelist.org with QMQP; 28 Jun 2000 09:00:12 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 28 Jun 2000 09:00:11 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id CAA11573 for iwar@onelist.com; Wed, 28 Jun 2000 02:00:11 -0700
Message-Id: <200006280900.CAA11573@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 28 Jun 2000 02:00:11 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

U.S. watchdog unveils software piracy settlements
The Business Software Alliance, an anti-piracy
industry group, said Tuesday that three Mid-West
companies had agreed to pay a combined total of
more than $300,000 for having unlicensed software
installed on office computers.
(***EDITOR'S NOTE - Article includes the names of
11 companies and what programs they had on their
computers)
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/026514.htm

Investigative firm played both sides with Microsoft
When a Microsoft law firm needed help recently
in tracking down pirates and counterfeiters of
the company's software, it turned to a private
investigative firm with a reputation for coming
up with sensitive information for high-profile
clients. So Microsoft was taken aback this month
by reports that linked the firm, Investigative
Group International, to mysterious efforts to
obtain the trash of a pro-Microsoft trade
association in Washington, D.C., presumably
looking for documents that would embarrass the
company as it fought a high-stakes antitrust case.
http://www.sjmercury.com/svtech/news/breaking/merc/docs/014070.htm

Companies See Barriers to Cooperating on Cybersecurity
When major Web sites were crippled earlier this year
by a series of criminal attacks, the White House and
business leaders vowed to work together to increase
cybersecurity. But as a series of recent meetings
has shown, such cooperation raises a number of
complicated legal questions.
(NY Times article, free registration required)
http://www.nytimes.com/library/tech/00/06/cyber/capital/27capital.html

US seeks cyber-attack solution
Leading US military and corporate security experts
will meet on Tuesday to discuss strategies to protect
vital technology from cyber-attacks originating in
foreign countries. The move is the latest indication
of growing US concern about the threat to national
security from new methods of "information warfare".
The National Defence Industrial Association's
symposium on critical infrastructure will address
conventional threats to infrastructure, such as
telecommunications, banking and power supply, but
will also unveil new products to defend these vital
services from hacker attacks originating in foreign
countries.
http://news.ft.com/ft/gx.cgi/ftc?pagename=3DView&c=3DArticle&cid=3DFT31SQDHY9C

U.S.-EU Net Privacy Proposal in Jeopardy
A controversial data-privacy protocol hammered out
by the Commerce Department and the European
Commission earlier this year could get derailed at
the last minute by opponents who say it doesn't go
far enough to protect European personal privacy
from U.S. companies.
http://www.thestandard.net/article/display/0,1151,16387,00.html

Inept crackers stung by intended 'victim'
A small group of inept crackers fell into a trap set
by SecurityFocus in which the attackers' own clumsy
exploit became an ironic means of eavesdropping on
their entire plan. The wannabes, in addition to
whacking several hundred machines, were in this case
actually cracking a honey pot trap, a bait box set
up to attract hack attempts and log information about
the methods used to compromise it. Logs are usually
diverted to another box, to prevent advanced crackers
from finding and deleting them on the target machine.
http://www.theregister.co.uk/content/1/11602.html

Scenes From the Hacker's 'Hood
Watching hackers in the middle of a recent Internet
attack drove one point home to security experts who
listened in: These guys like to make it up as they
go along. "The impression that most people fail to
get from regular attacks is how trivial they are,"
said Elias Levy, chief technology officer of
SecurityFocus.com. "These people tend to choose their
targets pretty much at random -- or whoever bothers
them that day, or pisses them off."
http://www.wired.com/news/culture/0,1284,37238,00.html

------------------------------------------------------------------------
Challenged with e-Business quality management? Register for a free
Webinar featuring e-business testing and performance experts.
http://click.egroups.com/1/5935/14/_/595019/_/962182813/
------------------------------------------------------------------------

------------------
http://all.net/