[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 17 May 2000 17:07:07 -0700 (PDT)


fc  Wed May 17 17:08:15 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 17 May 2000 17:08:15 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu May 18 00:08:12 2000)
X-From_: sentto-279987-366-958608429-fc=all.net@returns.onelist.com  Wed May 17 19:07:09 2000
Received: from b05.egroups.com (b05.egroups.com [207.138.41.189]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id TAA02768 for ; Wed, 17 May 2000 19:07:09 -0500
X-eGroups-Return: sentto-279987-366-958608429-fc=all.net@returns.onelist.com
Received: from [10.1.10.37] by b05.egroups.com with NNFMP; 18 May 2000 00:07:11 -0000
Received: (qmail 4203 invoked from network); 18 May 2000 00:07:08 -0000
Received: from unknown (10.1.10.26) by m3.onelist.org with QMQP; 18 May 2000 00:07:08 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 18 May 2000 00:07:07 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA20572 for iwar@onelist.com; Wed, 17 May 2000 17:07:07 -0700
Message-Id: <200005180007.RAA20572@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 17 May 2000 17:07:07 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

-- 13 May 2000  Shooter Worm Found in the Wild
The South Park Shooter worm was discovered in the wild in Europe.  The
worm has the capacity to crash e-mail servers as it sends itself to the
entire address book of the infected machine every 30 seconds.  It also
fills up hard drives.
http://www.computeruser.com/news/00/05/13/news1.html

-- 12 May 2000  Cellular Phones the Next Security Threat
Cell phones connected to the Internet could be used to launch viruses
and store information on PCs while hiding the perpetrator's location,
according to a European software executive.
http://www.zdnet.com/zdnn/stories/news/0,4586,2569065,00.html?chkpt=zdhpnews01

-- 12 May 2000  Intel Notebook Security Plans
Intel is aiming to make laptops more secure by implementing biometric
user identity authentication before boot up.
http://www.computerworld.com/home/print.nsf/all/000512DE46

-- 12 May 2000  ActiveX and Viruses
An ActiveX control flaw exposes users running Internet Explorer 5.0 or
Microsoft Office 2000 to viruses without users opening attachments or
visiting rogue sites.  The hole can be patched quickly with tools
available on Microsoft's security site.
http://www.computerworld.com/home/print.nsf/all/000512DE32 
Editor's (Paller) Note: Many virus watchers believe the next major
destructive virus incident will take advantage of this Microsoft error
to spread very rapidly.  PC users can correct the error in less than
five minutes.  It makes sense to act early rather than needing to
apologize after the next virus spreads.

-- 12 May 2000  Cyber Sleuths Track Worm Authors
A trio of cyber sleuths who helped track down the author of last
spring's Melissa worm again used their combined skills to pinpoint the
source of the ILOVEYOU worm.
http://www.wired.com/news/technology/0,1282,36275,00.html

-- 12 May 2000  Suspects Named in ILOVEYOU Worm Case
Four people have been identified as suspects in the ILOVEYOU worm case.
Some of the suspects are people named on diskettes confiscated from an
apartment in Manila.
http://www.wired.com/news/technology/0,1282,36303,00.html

-- 10 May 2000  Worse Viruses to Come, and Many Aren't Prepared 
A Senate Subcommittee on Technology heard testimony from computer
experts who warned that not much can be done to prevent the worms even
more virulent than ILOVEYOU from infecting information systems, and that
many government agencies lack effective detection and prevention
protocol.  
http://www.internetwk.com/story/INW20000510S0002

-- 11 May 2000  Cracker Targets Maine Broadcasting Customer Info
A cracker managed to access a file containing names, credit card
numbers, and other personal information belonging to members of Maine
Public Broadcasting.  Some employees learned about the break-in from an
anonymous e-mail.  
http://www.usatoday.com/life/cyber/tech/cth890.htm

-- 11 May 2000  IE Hole Exposes Cookies
Microsoft is developing a patch for a hole in its Internet Explorer
browser that could expose users' cookies to malicious web site
operators.  In the mean time, users are being recommended to disable
JavaScript.  
http://news.cnet.com/news/0-1005-200-1857707.html
http://www.computerworld.com/home/print.nsf/all/000512DEF6
http://www.msnbc.com/news/406496.asp?0m=N16N

-- 10 May 2000  Man Found Guilty of Computer Sabotage
A US District Court jury in New Jersey found a former employee of a
Connecticut measurement equipment manufacturing company guilty of
setting a computer time bomb that wiped out all the manufacturing
programs and code generators.
http://www.computerworld.com/home/print.nsf/all/000510DDCA

-- 10 May 2000  Hotmail Down to Fix Vulnerability
In order to fix a security hole that could allow malicious e-mail
senders to read, send, and delete e-mail from others' accounts,
Microsoft took Hotmail off line for about four hours last Wednesday.
http://www.wired.com/news/technology/0,1282,36249,00.html

-- 10 May 2000  State Department Security Problems
A Senate Committee says the State Department has suffered numerous
information security breaches in recent years, and hopes to enact
legislation requiring more stringent security protocol, including
certification of the department's information handling and storage
procedures compliance with certain directives.  Classified information
and funding could be withheld if the criteria are not met.
http://www.fcw.com/fcw/articles/2000/0508/web-state-05-10-00.asp

-- 10 May 2000  Federal Agency Security Lapses
An audit of 16 government agencies revealed a lack of appropriate
procedures for changing software, thus exposing the agencies' computer
systems to security vulnerabilities.
http://www.fcw.com/fcw/articles/2000/0508/web-gao-05-10-00.asp

-- 10 May 2000  Intel to Replace Unsound Motherboards
A bug in a memory translator hub (MTH) has led Intel to offer to replace
motherboards in affected machines.  The flaw could cause system failures
or data corruption.  Intel has established a web site that details the
problem, and allows customers to test their machines for the bug.
http://news.cnet.com/news/0-1006-200-1851832.html
http://www.computerworld.com/home/print.nsf/all/000510DDD2

FC

------------------------------------------------------------------------
Was the salesman clueless? Productopia has the answers.
http://click.egroups.com/1/3019/7/_/595019/_/958608429/
------------------------------------------------------------------------

------------------
http://all.net/