[iwar] news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Tue, 16 May 2000 05:29:29 -0700 (PDT)


fc  Tue May 16 05:30:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 16 May 2000 05:30:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue May 16 12:30:07 2000)
X-From_: sentto-279987-356-958480172-fc=all.net@returns.onelist.com  Tue May 16 07:29:31 2000
Received: from hi.egroups.com (hi.egroups.com [208.50.144.89]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA21960 for ; Tue, 16 May 2000 07:29:31 -0500
X-eGroups-Return: sentto-279987-356-958480172-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by hi.egroups.com with NNFMP; 16 May 2000 12:29:32 -0000
Received: (qmail 22449 invoked from network); 16 May 2000 12:29:31 -0000
Received: from unknown (10.1.10.26) by m4.onelist.org with QMQP; 16 May 2000 12:29:31 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 16 May 2000 12:29:30 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA08912 for iwar@onelist.com; Tue, 16 May 2000 05:29:29 -0700
Message-Id: <200005161229.FAA08912@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 16 May 2000 05:29:29 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Today's Love Bug update: A Philippine Internet provider
said it used caller ID to trace the "Love Bug'' e-mail
virus to a Manila phone line that had been previously
been used to break into its computer network. Meanwhile,
a young Filipino computer school graduate proclaimed his
innocence Sunday in the virus outbreak, saying he was
hurt to be called a possible suspect. Michael Buen became
a focus of the investigation last week when officials at
the Philippines' AMA Computer College said a program used
in his thesis project could have been combined with the
work of fellow student Onel A. de Guzman to create the
virus. Incidentally, reaction in the Philippines to the
worldwide attention the hacker has focused on the country
has been mixed.
http://www.sjmercury.com/svtech/news/breaking/merc/docs/015497.htm
http://www.sjmercury.com/svtech/news/breaking/merc/docs/036861.htm
http://www.sjmercury.com/svtech/news/breaking/merc/docs/052226.htm
http://www.wired.com/news/technology/0,1282,36342,00.html
http://www.zdnet.com/zdtv/cybercrime/viruses/story/0,9955,2569950,00.html
Also...
http://www.technologypost.com/internet/Daily/20000515102751692.asp
http://search.washingtonpost.com/wp-srv/WPlate/2000-05/15/042l-051500-idx.html
http://www.washingtonpost.com/wp-dyn/articles/A62575-2000May13.html
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/68944l.htm

Russia Internet pranksters sentenced to prison
Two Russians were sentenced to a year each in prison
on Monday for posing on the Internet as renegade
nuclear rocket commanders with plans to wipe out
cities in Europe, Itar-Tass news agency reported.
The two had posted messages claiming to be officers
at a strategic rocket unit, driven to the edge by
the harsh realities of post-Soviet life, who would
launch a nuclear strike on European cities if their
demands were not met, Tass said. The hoax triggered
the alarm of the U.S. FBI and police in Austria,
who both asked Russia to investigate, Tass said.
http://www.sjmercury.com/svtech/news/breaking/merc/docs/011878.htm

France: We must close 'hacker havens'
The world's leading industrialised states, struggling
against Love Bug-style computer attacks from the most
unexpected places, opened a cybercrime conference on
Monday with a call to prevent lawless "digital havens"
from springing up around the globe. French Interior
Minister Jean-Pierre Chevenement, addressing officials
from the Group of Eight (G8) nations and private
industry, urged countries to agree on a world convention
on cybercrime and harmonise their laws to crack down on
hackers, virus writers, software pirates and other
Internet fraudsters.
http://www.zdnet.com/zdnn/stories/news/0,4586,2569414,00.html
http://www.sjmercury.com/svtech/news/breaking/merc/docs/081666.htm
http://news.bbc.co.uk/hi/english/world/europe/newsid_748000/748597.stm

The next e-security threat: Cell phones
The next threat to Internet security could come from
mobile phones, as hackers taking advantage of third
generation high-speed access will be able to disguise
their location, a Web security firm said on Friday.
"Personal computers are at present the weak link in
Internet security. Tomorrow, it will be mobile phones,"
said Herve Bourgois, European chief executive for Check
Point Software Technologies, in an interview. Bourgois
said that Wireless Application Protocol (WAP) technology,
which allows mobile phone users to use online services,
"will generate more traffic, while UMTS third generation
technology will speed up the process." "Canny users will
thus be able to hack into vulnerable data banks using
their mobile phones and store the information on a laptop
computer, or unleash a virus before disappearing," said
the head of the Israeli company, which specialises in
computer security software.
http://www.zdnet.com/zdnn/stories/news/0,4586,2569065,00.html

More 'exploring' than you probably wanted: Microsoft has
acknowledged a bug in Internet Explorer that could let
hackers steal personal information from cookie files if
the victim uses Microsoft Internet Explorer and clicks
on a disguised string of JavaScript code. The company
said it is working on a patch for the hole, which was
first reported Thursday on the Peacefire.org.
http://www.sjmercury.com/svtech/news/breaking/merc/docs/015570.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,2568274,00.html

VA's 'user's manual for hackers'
Hackers could exploit at least 18 vulnerable spots in
computer systems at the Department of Veterans Affairs,
according to an internal VA memo. The memo is so
sensitive that it has been described as a "user's manual
for hackers" by some government officials who have read
it, and it has not been released to the public.
http://www.fcw.com/fcw/articles/2000/0508/web-va-05-12-00.asp

Security draws extra millions
The Senate last week responded to the growing menace of
cyberattacks by adding $76.8 million to the fiscal 2001
Defense authorization bill to kick-start a new information
security scholarship program and a security institute.
The Information Security Scholarship Program will be
designed to recruit and retain Defense Department
personnel who have computer and network security skills.
http://www.fcw.com/fcw/articles/2000/0515/web-senate-05-15-00.asp

Security glitches plague State Department, IG testifies
The recent disappearance of a notebook computer
containing sensitive information is just one of
several security gaffs at the State Department,
an official told the House International Relations
Committee. Weaknesses include a lack of
disciplinary actions against those who violate
security measures or punitive actions too lenient
to deter future breaches, State inspector general
Jacquelyn L. Williams-Bridgers testified last week.
Officials in State's overseas posts make security
and safety a top priority, but the agency's domestic
offices do not, she said.
http://www.gcn.com/vol1_no1/daily-updates/1985-1.html

New DDoS tools developed
A new distributed denial-of-service (DDoS) tool
found recently in computers at several universities
may be able to avoid defenses put up by Web sites
after a rash of DDoS attacks in February temporarily
shut down eBay, Amazon.com and others, said an
executive with Computer Associates. The tool, called
"mstream," has been found at several universities,
including the University of Washington, where it was
sitting in a computer running a Linux operating
system, said Alan Komet, a Computer Associates manager.
http://www.networkworld.com/news/2000/0512ddos.html

Swiss police seek blocks on racist, porn websites
Swiss federal police called on Monday for Internet
service providers and website hosting firms to block
access to sites with suspected criminal content once
notified by criminal investigators. The Federal Police
Bureau unveiled a proposal setting rules on quashing
racist and pornographic material on the Internet and
keeping organised and white collar crime offline.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/048871.htm

EU moves against online crime
The European Commission is set to issue its Communication
on Cybercrime very shortly after the world's computers
were hit by the Love Letter virus. In co-ordination with
the Council of Europe, the Commission is establishing
guidelines for member states of the EU to deal with
IT-related crimes.
http://www.zdnet.co.uk/news/2000/19/ns-15386.html

China punishes Web site for `spreading rumors'
China has punished a financial website for spreading
rumours that damaged the government's image as
authorities announced further moves were under way to
regulate news content on the unruly Internet. ``China
Finance Information Network downloaded and spread
rumours that damaged the government's image,'' the
official Wenhui Daily newspaper quoted an announcement
by the Wuhan Public Security Bureau as saying on Sunday.
``The website has been suspended from service and was
  fined 15,000 yuan ($1,800),'' it said.
http://www.sjmercury.com/svtech/news/breaking/merc/docs/031324.htm

ACA prepares legal action against 30 ISPs
The Australian Communications Authority is preparing to
take legal action against as many as 30 Internet Service
Providers in matters involving the Telecommunications
Industry Ombudsman, the Federal Court heard Friday.
The ACA's plans were mentioned during a hearing before
Justice Matthews. The hearing involved two separate
cases where ISPs have been charged with not joining
theconsumer complaints watchdog TIO.
http://www.zdnet.com.au/zdnn/stories/zdnn_display/au0002630.html

Myanmar orders stop to E-Mail
Myanmar, where the government bars public access to
the Internet, has ordered a stop to unauthorized
e-mail and telephone services, state-run newspapers
reported Saturday. The communication minister told
telecommunications officials Friday in the capital,
Yangon, that outsiders using sophisticated equipment
are illegally engaged in international telephone and
e-mail services.
http://www.mercurycenter.com/svtech/news/breaking/ap/docs/66159l.htm

Six Sanguine Senators Slam Spam
In a bid to "protect" consumers from unsolicited
commercial e-mail--unaffectionately known as spam
--a pair of senators Friday introduced legislation
that would allow Internet service providers to sue
spammers who violate certain codes of conduct.
Similar to legislation currently pending in the
House of Representatives, the "Controlling the
Assault of Non-Solicited Pornography and Marketing"
(CAN-SPAM) Act would require spammers to use valid
return addresses, honor recipients' requests to be
removed from spam mailing lists and refrain from
lying about the origin of spam messages.
http://www.currents.net/news/00/05/15/news1.html

ACLU Accuses Intel Of Violating Free Speech
The ACLU is backing a former Intel employee who
was ordered to stop sending e-mail critical of
Intel to coworkers. In a case of e-mail as free
speech, the Northern California chapter of the
American Civil Liberties Union has filed an Amici
Curiae (Friend of the Court) brief in an appeal
pending in the lawsuit brought against Kourosh
Hamidi by Intel Corporation. The brief was filed
Thursday and addresses the right of a court to
suppress the conduct of an employee who uses an
employer's e-mail system to criticize the employer,
according to Ann Brick, one of the attorneys
representing the ACLU.
http://www.currents.net/news/00/05/15/news2.html

Users told to get proactive on e-security
Management consultant Deloitte & Touche has urged
organisations to take a "holistic approach" to
e-security in the struggle to protect systems from
security breaches and virus attacks. The company
also says companies and individuals should be more
proactive. Yag Kanani, partner responsible for
Deloitte's European Secure ebusiness practice, said:
"Hackers are always one, if not two, steps ahead,
and placing reliance on one security countermeasure
alone, such as a virus scanner, may not be enough."
http://www.vnunet.com/News/1101283

Take steps to thwart hacker before he strikes computer
Is your family computer hooked up to the Internet through
a high-speed digital subscriber line (DSL) or cable modem?
If so, a hacker may scan the openings, or ports, through
which data flow into and out of your computer and read,
change or erase everything on your hard drive: financial
records, word-processing files and, if you work at home,
business records. If you save passwords on your computer,
a hacker can find them and use them to access your accounts.
To find out how vulnerable your system is, you can hack
yourself with Shields Up, a free, easy-to-run program
available at www.grc.com.
http://www.deseretnews.com/dn/view/0,1249,165011407,00.html

FC

------------------------------------------------------------------------
Make new friends, find the old at Classmates.com:
http://click.egroups.com/1/4052/7/_/595019/_/958480172/
------------------------------------------------------------------------

------------------
http://all.net/