[iwar] More news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 17 May 2000 17:18:32 -0700 (PDT)


fc  Wed May 17 17:19:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 17 May 2000 17:19:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu May 18 00:19:11 2000)
X-From_: sentto-279987-367-958609115-fc=all.net@returns.onelist.com  Wed May 17 19:18:34 2000
Received: from hk.egroups.com (hk.egroups.com [208.50.144.91]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id TAA03354 for ; Wed, 17 May 2000 19:18:34 -0500
X-eGroups-Return: sentto-279987-367-958609115-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by hk.egroups.com with NNFMP; 18 May 2000 00:18:36 -0000
Received: (qmail 32318 invoked from network); 18 May 2000 00:18:34 -0000
Received: from unknown (10.1.10.142) by m2.onelist.org with QMQP; 18 May 2000 00:18:34 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta3 with SMTP; 18 May 2000 00:18:33 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id RAA20653 for iwar@onelist.com; Wed, 17 May 2000 17:18:33 -0700
Message-Id: <200005180018.RAA20653@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 17 May 2000 17:18:32 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] More news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

'Love' bug may have 40-plus authors
Philippine investigators said Tuesday that a computer disk seized in a
Manila flat from where the "Love" bug is suspected to have spread has a
program with characteristics of the destructive computer worm.  The disk
also credits more than 40 people for creating the program, investigators
said.  The National Bureau of the Investigation (NBI) said the disk, one
of 17 seized from the lower-middle-class flat in the Manila suburb of
Pandacan, contained a computer-bug program reported to be authored by
computer school student Michael Buen.  "No incriminating data were found
on diskettes other than Diskette 17, which contained a strain of virus
in the deleted document files," attorney Elfren Meneses, director of the
NBI's anti-fraud and computer crimes division, told reporters. 
http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2570175%2C00.html
http://www.nwfusion.com/news/2000/0515convict.html

Saboteur guilty
Jury convicts net manager in landmark case.  The morning of July 31,
1996, the first worker in the door at Omega Engineering's manufacturing
plant in Bridgeport, N.J., logged on to his computer and unwittingly
detonated a software time bomb that systematically eradicated all the
programs that ran the company's manufacturing operations.  To make
matters worse, executives soon found there were few options to keep the
department running.  Shortly before the attack, Tim Lloyd, a 37-year-old
network administrator, moved the programs off individual workstations
and onto Omega's central NetWare file server.  And there were no back-up
tapes to access because Lloyd brought them home and reformatted them,
according to testimony at his trial for computer sabotage, which ended
last week in a guilty verdict. 
http://www.networkworld.com/news/2000/0515convict.html

Acton Web site hit by attacks
A leading Internet site for geeks has been getting whacked from all
directions.  The latest episode at SlashDot.org came last week when a
hacker attack crippled the Web site operated by Andover.Net Inc.  of
Acton.  The denial of service attack, similar to the assaults that shut
down eBay Inc.  and other popular Web sites earlier this year, came as
hundreds of geeks were griping about a nasty-gram from Microsoft Corp. 
http://www.bostonherald.com/business/technology/geek05162000.htm

Chirac urges G8 nations to intensify cooperation to fight cybercrime
The world's leading industrial nations must narrow the differences in
national laws to combat cybercriminals who use loopholes to launch
global Internet attacks, French President Jacques Chirac said Tuesday. 
The Internet is ``testing our laws and our institutions,'' Chirac said
in a speech to government and private officials attending a Group of
Eight conference on cybercrime.  ``Given the enormous progress of
technology, governments and parliaments must harmonize our national laws
with regard to the Internet,'' Chirac said.  ``We must overcome the
obstacles of differences in national legislation.  Criminals take
advantage of these.  They exploit the loopholes.''
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/050393.htm

U.S., Europe debate how to co-regulate Net crime
With attacks on the Internet spreading worldwide, government and
business leaders are working on developing more powerful tools to fight
cross-border Net crime.  A three-day conference of the Group of Eight
industrial nations was planned long before the "I Love You" virus
surfaced, but that attack and other recent Net incursions have focused
G8 leaders on the urgency of protecting the Internet. 
http://news.cnet.com/news/0-1005-200-1882198.html

Net Industry Wary About New Cybercrime Rules
Internet industry groups urged the Group of Eight (G8) industrialized
nations on Tuesday not to over regulate the global computer network as
they try to stamp out cross-border cybercrime such as the recent "Love
Bug" virus.  The Internet Alliance and the Global Internet Project, two
U.S.  groups with multinational membership, told a Paris conference on
cybercrime that overly tight regulations on the Internet could burden
the industry with extra costs and stifle the spread of e-commerce. 
http://www.techweb.com/wire/story/reuters/REU20000516S0007

France makes a first move at G8 Net Summit
FRANCE on Tuesday set a timely example to the other G8 nations attending
a conference here on the subject of security and trust in cyberspace. 
The Central Office to Fight IT-related Crime, which was set up to
counter threats such as those posed by February's mass DOS (denial of
service) attacks or outbreaks of viruses such as the Melissa and "I Love
You" viruses, will begin operations Tuesday, said French Interior
Minister Jean-Pierre Chev=E8nement, reading a message from the Prime
Minister in his opening address to the conference. 
http://www.infoworld.com/cgi-bin/deleteframe.pl?story=3D/articles/hn/xml/00=/05=20/16/000516hnfrance.xml

Anti-spam fever on the rise in D.C.
The daily furor over unsolicited electronic mail seems to have died
somewhat, but the cause is alive and well in Washington, D.C., and there
is even a new proposal to offer bounties for errant bulk commercial
e-mailers.  The idea of establishing a bounty for spammers' scalps came
up during the Spam Summit 2000 conference, held recently in the nation's
capital.  The problem with anti-spam laws, some participants said, is
that unless the unsolicited message onslaught is particularly
troublesome, Internet service providers (ISPs) have little incentive to
pursue the spammers in court. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2569928,00.html

Study Eyes Child Privacy Online
Many children feel comfortable giving out personal family information on
the Internet in exchange for free gifts and sweepstakes, an independent
study finds.  In exchange for a free gift, about two thirds of children
ages 10-17 said they would provide commercial Web site operators with
the names of their favorite stores and more than half would give their
parents' favorites, according to the study released Tuesday by the
University of Pennsylvania's Annenberg Public Policy Center. 
http://www.latimes.com/wires/wbusiness/20000516/tCB00V0214.html

Beware your boss is watching you surf
Employers routinely snoop on their employees to clamp down on Net abuse
and to protect against liability.  Over three quarters of UK companies
routinely snoop on their employees' Web surfing, according to research
published Tuesday.  Research company Industrial Relations Services,
which canvassed 74 British organisations in its study, says the snooping
is not purely to clamp down on Net abuse during work time, but also to
protect companies against liability for illegal Internet activity. 
http://www.zdnet.co.uk/news/2000/19/ns-15401.html

Phone Phreaks to Rise Again?
Back before there were hackers, phreakers ruled the underground.  They
may be making a comeback, to the chagrin of those on whom they prey.  A
phreaker explores the telephone system.  Some are just electronic
voyeurs who want to understand how telecom structure works.  Others
exploit vulnerabilities in the system to get free long distance service,
re-route calls, change phone numbers, or eavesdrop on conversations. 
http://www.wired.com/news/business/0,1367,36309,00.html

------------------------------------------------------------------------
Accurate impartial advice on everything from laptops to table saws.
http://click.egroups.com/1/3020/7/_/595019/_/958609115/
------------------------------------------------------------------------

------------------
http://all.net/