[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Thu, 3 Aug 2000 06:37:12 -0700 (PDT)


fc  Thu Aug  3 06:38:16 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 03 Aug 2000 06:38:16 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Aug  3 13:38:09 2000)
X-From_: sentto-279987-472-965309835-fc=all.net@returns.onelist.com  Thu Aug  3 08:37:10 2000
Received: from hl.egroups.com (hl.egroups.com [208.50.99.197]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id IAA21099 for ; Thu, 3 Aug 2000 08:37:10 -0500
X-eGroups-Return: sentto-279987-472-965309835-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by hl.egroups.com with NNFMP; 03 Aug 2000 13:37:16 -0000
Received: (qmail 15024 invoked from network); 3 Aug 2000 13:37:13 -0000
Received: from unknown (10.1.10.27) by m2.onelist.org with QMQP; 3 Aug 2000 13:37:13 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 3 Aug 2000 13:37:12 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA04174 for iwar@onelist.com; Thu, 3 Aug 2000 06:37:12 -0700
Message-Id: <200008031337.GAA04174@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 3 Aug 2000 06:37:12 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Judge sets emergency hearing on FBI email scanner
A federal judge ordered an emergency hearing today
on a privacy rights group's request for the immediate
release of details on "Carnivore," the Federal Bureau
of Investigation's email surveillance tool. The
Electronic Privacy Information Center (EPIC), in its
application to the judge, accused the FBI and the
Justice Department of breaching the law by failing
to act on a request for fast-track processing of a
Freedom of Information Act (FOIA) query about the
snooping system.
http://news.cnet.com/news/0-1005-200-2417091.html

FBI yields on Carnivore code
A federal judge on Wednesday ordered the FBI to set a
timetable for responding to a privacy group's request
for details about its Carnivore e-mail surveillance
tool. U.S. District Judge James Robertson gave the FBI
10 working days to say when it would start rolling out
records under "expedited" Freedom of Information Act
(FOIA) processing. David Sobel, general counsel of the
Electronic Privacy Information Center, or EPIC, hailed
the order as a "very good result." He said it indicated
the court planned to supervise the FBI's production of
documents.
http://www.zdnet.com/zdnn/stories/news/0,4586,2611192,00.html

250 computer servers hacked
Around 250 computer servers installed in companies,
colleges, and government offices were hacked into by
one foreign hacker. It was revealed that Internet Data
Center (IDC), a company that manages computer servers,
allowed 34 of the over 60 servers that they manage to
be penetrated, leading people to point to the need for
urgent countermeasures and increases in computer security.
What most shocked the public was that the companies and
offices did not notice the hacker searching their databases.
http://www.zdnetasia.com/news/dailynews/0,2000009073,20058982-1,00.htm

Barclays in second security gaffe this week
Troubled online bank Barclays admitted to another security
blunder Wednesday that again led to Internet accounts being
compromised. The "clerical error" was uncovered Tuesday,
just days after a technical fault with the bank's overhauled
online service compromised the security of numerous customer
accounts. This second security problem arose after two Barclays
customers were accidentally allotted the same account within
the bank's online system and were able to view each other's
information online.
http://www.zdnet.co.uk/news/2000/30/ns-17040.html

Cops: Kids Counterfeited in Class
Students made counterfeit money on a computer in their high
school drafting class and passed hundreds of dollars in fake
bills around town, police said Tuesday. Four Haralson County
High School students and an adult friend have been charged
with felony forgery in the alleged counterfeit scheme. Police
Chief David Godfrey said the suspects made about 200 bills -
in $1, $5, $10 and $20 denominations - on the final days of
the school year and distributed about 50 bills at businesses.
http://dailynews.yahoo.com/h/ap/20000801/us/school_counterfeiting_2.html

Apple sues over alleged leak of trade secrets
Apple today filed suit against an "unknown individual"
for allegedly leaking its trade secrets on the Internet.
According to the lawsuit, filed in Santa Clara County
Superior Court in California, the unknown party posted
digital images of Apple's dual-processor PowerMac and
its new mouse to a publicly accessible site on the
Internet, beginning "in or about" February. In addition,
Apple said the individual, alone or in concert with others,
has posted trade secret information about other Apple
products that the company has not announced.
http://news.cnet.com/news/0-1006-200-2416345.html

Hackers pick security holes
Feds heard warnings from hackers last weekend in Las Vegas
during Def Con 8, which featured workshops on exploitable
vulnerabilities, defense strategies and the latest tools
for the security community. One of Def Con's most
anticipated events was the annual presentation by the Cult
of the Dead Cow. The group released the Back Orifice hacking
tool at Def Con in 1998 and announced an updated version of
the Trojan horse program that targets Microsoft Corp. Windows
NT systems at last year's conference. The group's tools could
be used to attack or defend networks.
http://www.fcw.com/fcw/articles/2000/0731/web-defcon-08-02-00.asp

Hackers Breach Firewall-1
An audience of several hundred network security professionals
watched with rapt attention last week as a trio of hackers
repeatedly penetrated one of the industry's most trusted and
popular firewall products -- Checkpoint Software's Firewall-1.
The demonstration, presented at the "Black Hat" security
conference in Las Vegas, challenged the widely accepted notion
that firewalls are largely immune to direct attack.
http://www.zdnet.com/zdnn/stories/news/0,4586,2610719,00.html

A spy in the office
Foreign intelligence agencies busy in our businesses, CSIS
warns. Attention, high-tech managers: Do you have an employee
or a colleague who is really eager to work overtime or come
in during weekends? Before rewarding such zeal, check with
your security department: such an employee could be working
for one of the 25 foreign intelligence agencies spying on
Canadian companies.
http://www.montrealgazette.com/news/pages/000723/4497311.html

GOP 's computer security reality
THE SECRET SERVICE won't be the only high-profile security
group in Philadelphia at the Republican National Convention.
A computer security organization will sound the alarm over
the increasing vulnerability  of America's network-based
society on Wednesday. Pittsburgh-based Carnegie Mellon's
Computer Emergency Response Team (CERT) will brief a group
of political and corporate heavyweights who are gathered
just across the state to usher Texas Gov. George W. Bush
officially onto the Republican ticket.
http://www.infoworld.com/cgi-bin/deleteframe.pl?story=/articles/hn/xml/00/08 
/01/000801hncertgop.xml

Script Viruses Dominate In Sophos July Virus Charts
The latest monthly virus reports chart from Sophos,
published this morning, suggests that script viruses
are now the most popular "in the wild," although the
IT security firm says that new viruses are still
arriving on a regular basis. Not unexpectedly, the
Stages virus was the most popular during July with
7.9 percent, followed by Kakworm with 5.7 percent
report penetration. Equal third slots were taken,
by LoveLetter (ILOVEYOU) and Marker, both with
5.0 percent.
http://www.newsbytes.com/pubNews/00/153087.html

IETF faces new wiretap flap
Just days after the British Parliament passed a
controversial Internet wiretapping law, the
international organization that develops Internet
standards is considering a proposal to move a meeting
scheduled to be held in London next summer to a new
location in protest of the law. The leadership of the
Internet Engineering Task Force will meet Wednesday
morning to discuss whether Britain's new Regulation
of Investigatory Powers (RIP) law poses an unacceptable
privacy risk to their members. The issue also will be
considered at an open meeting on Wednesday night, with
more than 1,000 IETF members expected to attend.
http://www.nwfusion.com/news/2000/0802rip.html

Spam is worse than ever
Have you noticed how junk e-mail -- or spam -- has crept
into our lives to the extent that the complaining about
it is waning? This is a bad thing. It means we are beginning
to let spam become part of the societal and Web fabric.
There has to be a way to eliminate spam without resorting
to manual e-mail filtering.
http://www.zdnet.com/zdnn/stories/comment/0,5859,2610051,00.html

RSA unveils Web user authentication bundle
RSA Security Tuesday announced the release of a bundle
of its Web-focused user authentication products and
services designed to add security to 'Net-based
business-to-business and business-to-consumer
applications. The products and services should help
companies identify whom they are dealing with online,
RSA said. Known as SecurID Web Portfolio, the family of
products and services is aimed at new users, according
to the Bedford, Mass., firm. Existing users of RSA
products may already be running some of the software
contained in the bundle.
http://www.nwfusion.com/news/2000/0802rsabundle.html

---------------------------------------------------------------------

------------------
http://all.net/