[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Wed, 12 Jul 2000 06:55:45 -0700 (PDT)


fc  Wed Jul 12 06:56:16 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 12 Jul 2000 06:56:16 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Jul 12 13:56:09 2000)
X-From_: sentto-279987-449-963410147-fc=all.net@returns.onelist.com  Wed Jul 12 08:55:46 2000
Received: from fl.egroups.com (fl.egroups.com [208.50.144.74]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id IAA23321 for ; Wed, 12 Jul 2000 08:55:46 -0500
X-eGroups-Return: sentto-279987-449-963410147-fc=all.net@returns.onelist.com
Received: from [10.1.10.35] by fl.egroups.com with NNFMP; 12 Jul 2000 13:55:50 -0000
Received: (qmail 12310 invoked from network); 12 Jul 2000 13:55:46 -0000
Received: from unknown (10.1.10.27) by m1.onelist.org with QMQP; 12 Jul 2000 13:55:46 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 12 Jul 2000 13:55:45 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA20445 for iwar@onelist.com; Wed, 12 Jul 2000 06:55:45 -0700
Message-Id: <200007121355.GAA20445@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 12 Jul 2000 06:55:45 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

FBI system covertly searches e-mail
The U.S. Federal Bureau of Investigation is using a superfast
system called Carnivore to covertly search e-mails for messages
from criminal suspects. Essentially a personal computer stuffed
with specialized software, Carnivore represents a new twist in
the federal government's fight to sustain its snooping powers
in the Internet age. But in employing the system, which can scan
millions of e-mails a second, the FBI has upset privacy advocates
and some in the computer industry. Experts say the system opens
a thicket of unresolved legal issues and privacy concerns.
http://www.zdnet.com/zdnn/stories/news/0,4586,2601502,00.html

Internet hacking threat to national security
Nearly a third of all Britons believe the Internet poses a
serious threat to national security, according to figures
published by WhichOnline Tuesday. According to the report
security was the third most serious concern posed by the
Internet after fraud and immorality. Thirty percent of
those surveyed believe the Internet could be used to
launch a serious attack on the country's critical
infrastructure.
http://www.zdnet.co.uk/news/2000/27/ns-16534.html

Learning how to hack the enemy
With a few keystrokes, nearly 40 student hackers started
mapping the computer network of Rutgers University. Using
a Unix-based command known as a "traceroute," students who
were sequestered in a room just south of San Francisco's
Market Street caused every server in the path used to send
data between the class and Rutgers to identify itself. "If
you are doing a denial-of-service attack, this is a perfect
way to find out how high up in the hierarchy you need to
hit to take out their entire service," said William Chan,
one of the instructors.
http://www.zdnet.com/zdnn/stories/news/0,4586,2601980,00.html

[FC - Talk about new and exciting information! This shows just how far
behind the ;learning curve the press and others are.]

Virus comes from the scrap heap
The LifeChanges virus made its rounds during the week of
June 19, and even though the trail is a little cold, it
is instructive of the creativity with which malicious
code is being churned out. The e-mail message that
delivered LifeChanges had various subject lines, including
"FW: joke," and its payload was hidden by a scrap file
based delivery mechanism.
http://www.civic.com/civic/articles/2000/0710/web-civic2-07-11-00.asp

Stolen Computers Will Self-Destruct
The thief barrels wildly through darkened city streets,
the stolen hard drive that holds his competitor's trade
secrets on the seat beside him, when a wisp of smoke curls
up from the suddenly burning hard drive. Sound implausible?
Not according to The Cyber Group Network Corp., a four
month-old, California-based startup. The Cyber Group Network
Corp. is developing a software-controlled hardware device
that can be installed in computers worldwide to either locate
or destroy the devices when they are lost or stolen.
http://www.newsbytes.com/pubNews/00/151921.html

Online privacy fears growing
Public alarm about online privacy is growing nearly as
fast as the Internet, according to a new paper published
by the Internet Policy Institute. People who surf the Web
offer up information about themselves as they go, sometimes
voluntarily and sometimes without even knowing it. That
personal information is then compiled, bought and sold,
the authors of the report, lawyers Ellen Alderman and
Caroline Kennedy, say in the paper entitled "The Internet,
Consumers and Privacy."
http://www.cnn.com/2000/TECH/computing/07/11/privacy.fears.idg/index.html

U.S.-Japan business leaders call for secure Net
In the wake of a rash of recent high-profile denial of
service attacks and virus attacks, business leaders from
the U.S. and Japan called Tuesday for greater public and
private sector work to make the Internet more resilient
and secure.
http://idg.net/ic_199402_1773_1-483.html

Browser Plug-ins To Ensure Online Privacy
Few people on Earth contentiously read the privacy policies
of all the Web sites they go to -- much less check back to
make sure nothing changed since their last visit. But that's
the only way to make sure a site doesn't take the information
it collects about you and your surfing habits and use it in
ways you'd rather it didn't. A possible answer to this problem
is in the final stages of development and should become
available as a browser plug-in sometime in the next year.
http://www.newsbytes.com/pubNews/00/151936.html

E-mail probe triggers firings
As part of an ongoing corporate crackdown, employees and
contractors at pharmaceutical giant Merck & Co. last week
faced discipline, including dismissal, for inappropriate
e-mail and Internet usage. While Merck spokeswoman Sharyn
Bearse confirmed the most recent disciplinary measures,
she wouldn't say how many employees had been terminated
or otherwise disciplined. Bearse also declined to say how
many employees had been subjected to e-mail and Internet
monitoring or what, specifically, employees had communicated
or downloaded to provoke the measures.
http://www.cnn.com/2000/TECH/computing/07/11/email.firing.idg/index.html

AT&T Gets FBI Award For Telemarketing Fraud Center
AT&T Corp. rang its own bell today as it received recognition
from the Federal Bureau of Investigation (FBI) for its role in
the success of an anti-telemarketing fraud center established
earlier this year. Earlier today, FBI Director Louis Freeh
awarded AT&T the Director's Award for Exceptional Public
Service, for its participation in the agency's Telemarketing
Victim Call Center (TVCC), a team dedicated to fighting
telemarketing fraud perpetrated against unwitting senior
citizens.
http://www.newsbytes.com/pubNews/00/151941.html

Companies cozy up to chief privacy officers
Move over, CEO, CIO and COO. Your titles are passe' compared
to the newest position in high demand from corporate
headhunters: chief privacy officer. With consumers increasingly
concerned about their privacy and new technology able to track
Internet users click by click, companies are rapidly hiring
privacy officers and giving them broad powers to set policies
that protect consumers from invasion and companies from public
relations nightmares.
http://news.cnet.com/news/0-1005-200-2240350.html

A Prime Port of Call for Hackers?
The easy passage of all kinds of data through computers'
Port 80 is making it harder to build Web virus killers.
Go ahead, click a hyperlink -- any hyperlink -- while
surfing the Web. Chances are, you just sailed through
Port 80 and probably didn't even know it. Port 80 is
an abstract destination, a numerical designation that
tells Web servers where to send data to your computer.
http://www.businessweek.com/bwdaily/dnflash/july2000/nf00711e.htm

Security, the Way It Should Be
Today, security is often provided by patched-together,
reactionary defenses, which many see as an inhibitor to
business. In order to take their rightful place as a business
enabler, security systems must provide distributed, real-time,
flexible defenses against attacks. What if IT managers
discovered a magic way to shield e-commerce from all things
illegal, such as online credit-card heists, denial-of-service
attacks, Web page destruction, viruses and data thefts?
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO46810,00.html

------------------------------------------------------------------------
Respond.com - Technology Solutions for your Business!
http://click.egroups.com/1/6828/14/_/595019/_/963410147/
------------------------------------------------------------------------

------------------
http://all.net/