[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Tue, 18 Apr 2000 05:21:42 -0700 (PDT)


fc  Tue Apr 18 05:22:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 18 Apr 2000 05:22:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Apr 18 12:22:08 2000)
X-From_: sentto-279987-301-fc=all.net@returns.onelist.com  Tue Apr 18 07:21:45 2000
Received: from jk.egroups.com (jk.egroups.com [208.50.144.83]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA00501 for ; Tue, 18 Apr 2000 07:21:45 -0500
X-eGroups-Return: sentto-279987-301-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by jk.egroups.com with NNFMP; 18 Apr 2000 12:21:49 -0000
Received: (qmail 4352 invoked from network); 18 Apr 2000 12:21:44 -0000
Received: from unknown (10.1.10.26) by m2.onelist.org with QMQP; 18 Apr 2000 12:21:44 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 18 Apr 2000 12:21:43 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
Message-Id: <200004181221.FAA15269@all.net>
To: iwar@onelist.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 18 Apr 2000 05:21:42 -0700 (PDT)
X-eGroups-From: Fred Cohen 
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] News 
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Computer with secret information missing
An investigation is under way into the disappearance
from the State Department of a lap top computer
containing classified information, officials disclosed
today. Department spokesman James P. Rubin said the
matter is being investigated by the State Department's
office of Diplomatic Security and the FBI.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/084438.htm
http://news.cnet.com/news/0-1003-200-1708583.html

Hackers tear open heart of QNX encryption
HACKERS claim to have cracked the encryption code for
the QNX realtime operating system, the I-opener Linux
website has reported. The website has posted source
code for a program it says will "decrypt ANY qnx
password". Companies using the QNX software platform
for embedded applications include British Telecom's
Web-enabled pay phones, the New York Stock Exchange's
facility security system, and VISA International's
transaction processing and verification system.
http://www.it.fairfax.com.au/breaking/20000417/A9352-2000Apr17.html

Spain hackers sabotage Museum site
Computer hackers supporting the armed Basque separatist
group ETA sabotaged the Web page of the Guggenheim
Museum in the Basque city of Bilbao over the weekend,
a museum official said Monday. The culprits tampered
with the site Sunday so that it showed slogans praising
ETA and its goal of independence for the Basque country,
an area straddling the border between northern Spain
and southwest France, said spokeswoman Neria Abasolo.
The site was disrupted for a few hours, she added.
Photographs of imprisoned ETA members accompanied
statements written in English calling France and Spain
oppressors.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/435122l.htm

Bell Atlantic Warns of Calling Card Scams
The old problem of calling card scamming has reared its
ugly head in New York once again, with Bell Atlantic
warning its customers late Thursday -- throughout the
Northeast and mid-Atlantic region -- about a major scam
operating this month. The scam, which is usually run by
a man and a woman, works with a man calling a Bell
Atlantic customer, claiming to be from the Bell Atlantic
fraud prevention center. The imposter tells the call
recipient that there are a lot of expensive international
long-distance calls on the customer's "new" Bell Atlantic
calling card. The customer usually claims s/he has not
received the new card, at which point the scam artist
then advises the customer to cancel the current card,
and transfers the customer over to an accomplice -- a
woman also posing as a fraud prevention center
representative. She then asks the customer for their
existing calling card and PIN number to allow it to
"continue" to be used.
http://www.currents.net/newstoday/00/04/17/news1.html

Turkey debates cyberspace controls
Turkey is considering patrolling cyberspace for threats
to its security using a powerful watchdog body which
includes senior military and intelligence officials.
Such a move would be likely to attract further European
criticism of Turkey, which has to improve its human rights
record before joining the European Union. ``Protection of
the information base...against those with evil intentions,
terrorist activities and disasters has gained importance,''
says a Defense Ministry draft law called the ''Bill on The
National Information Security Organization And Its Duties.''
http://www.sjmercury.com/svtech/news/breaking/internet/docs/433569l.htm

eBay, Bidder's Edge face off in court
A U.S. District court judge said today that he is leaning
toward issuing an injunction that limits the ability of
Bidder's Edge to search eBay's auctions and to display
the results on its Web site. "I do see a problem," Judge
Ronald Whyte said today in San Jose. "(What) Bidder's Edge
was doing was potentially slowing down eBay servers and
trespassing in a way that permission had not been granted."
eBay had asked for a preliminary injunction prohibiting
Bidder's Edge from searching its site and displaying
auction results. Whyte didn't issue a ruling today. He
said in open court that he is leaning toward issuing an
injunction, but one that isn't as sweeping as eBay's
request. Whyte didn't elaborate or say when he would rule.
eBay attorney Janet Cullum argued that searching and
displaying amounts to trespassing, in addition to damaging
eBay's servers and slowing down the site. She also said
that the information retrieved was intellectual property
and that it was often inaccurate.
http://news.cnet.com/news/0-1007-200-1697820.html

Microsoft: More security holes
For a company that prides itself on the quality of its
software development prowess, Microsoft Corp. has
encountered a rough patch of late, racking up two
security holes as well as committing a major faux pas
in the space of less than a week. One of the security
holes could allow an attacker access to pages on a Web
hosting service. The other hole could enable malicious
code to be run. All the while, a message in the code
crowed that "Netscape engineers are weenies!" If ever
there was an incident demonstrating a need for companies
to pay more attention to the code they ship, this was
it, according to Elias Levy, chief technology officer
for security information site SecurityFocus.com. "This
is definitely something that should concern people,"
he said.
http://www.zdnet.com/zdnn/stories/news/0,4586,2551396,00.html

'Whistler' OS sneaks on the Web -- again
Microsoft Corp.'s Whistler thief, it seems, has struck
again. Another version of the company's follow-on
operating system to Windows 2000, code-named Whistler,
has been posted illegally to the Internet. The OS, which
is tentatively scheduled to debut in March, 2001, is in
development inside the walls of Microsoft. The company
has been producing versions, or builds, of the OS that
are only supposed to be available to Microsoft employees.
The OS is not yet in public beta test.
http://www.zdnet.com/zdnn/stories/news/0,4586,2551229,00.html

Computer Crimes: Cold Cases
Investigating computer crimes may follow the pattern
of classic crime detection. Someone discovers the crime,
an investigator then develops leads, she follows the
clues, and then she arrests the guilty party. Sounds
like a sure trail that progresses quickly to forensic
gratification, doesn't it? Unfortunately, criminal
investigation, especially computer crime inquiries,
does not always fall into the classic pattern. If
circumstances considerably delay discovery of the crime,
the computer crime specialist may face a case without
any apparent leads. Known in the trade as a "cold case,"
the late-discovered crime poses special problems for the
computer sleuth.
http://www.securityportal.com/cover/coverstory.html

FC

------------------------------------------------------------------------
GET WHO WANTS TO BE A MILLIONAIRE FREE!  GET THE OFFICIAL COMPANION 
TO TELEVISION'S HOTTEST GAME SHOW PHENOMENON PLUS 5 MORE BOOKS FOR 
$2.  Click for details.
http://click.egroups.com/1/3014/7/_/595019/_/956060507/
------------------------------------------------------------------------

------------------
http://all.net/