[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Sun, 27 Aug 2000 07:46:08 -0700 (PDT)


fc  Sun Aug 27 07:47:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Sun, 27 Aug 2000 07:47:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Sun Aug 27 14:47:14 2000)
X-From_: sentto-279987-513-967387570-fc=all.net@returns.onelist.com  Sun Aug 27 09:46:50 2000
Received: from hi.egroups.com (hi.egroups.com [208.50.99.211]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id JAA02131 for ; Sun, 27 Aug 2000 09:46:50 -0500
X-eGroups-Return: sentto-279987-513-967387570-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by hi.egroups.com with NNFMP; 27 Aug 2000 14:46:11 -0000
Received: (qmail 11108 invoked from network); 27 Aug 2000 14:46:09 -0000
Received: from unknown (10.1.10.26) by m2.onelist.org with QMQP; 27 Aug 2000 14:46:09 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 27 Aug 2000 14:46:08 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id HAA24415 for iwar@onelist.com; Sun, 27 Aug 2000 07:46:08 -0700
Message-Id: <200008271446.HAA24415@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Sun, 27 Aug 2000 07:46:08 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

August 25, 2000

Canada probing alleged computer spying
Canadian police said Friday they were investigating allegations
that unknown agents had used rigged computer software to hack
into Canada's top secret intelligence files and thereby endanger
national security. The Toronto Star said police were probing
whether Israeli and U.S. spies were making use of a so-called
software ``trap door'' allowing them to access files used by
the Mounties and Canada's spy service to co-ordinate secret
investigations. Police spokesman Sergeant Mike Gaudet confirmed
that a probe was underway but gave few details. ``We are
conducting an investigation. To date we have no indications
that national security has been breached. Our investigation is
continuing,'' he told Reuters.
http://www.mercurycenter.com/svtech/news/breaking/merc/docs/047743.htm

Egg hackers were disorganised crime
More details have emerged about the so-called "Great Internet Robbery"
at online bank Egg.com. This was not the Great Hack that everyone
thought it was yesterday, just a set of fraudulent applications for
loans and bank accounts with free overdrafts. In fact, the reason
these guys got caught is that Egg had software in place capable of
tracing fraudulent account activity by checking up on multiple
applications from a single IP address.
http://www.theregister.co.uk/content/6/12822.html

Hoax cuts Emulex shares in half
Emulex Corp. shares plunged as much as 62 percent after
publication of a fictitious press release that said the
company reversed its fiscal fourth-quarter profit to a
loss and was being investigated by the Securities and
Exchange Commission. Shares of the data-storage equipment
maker fell $48.06 to $65 after the phony release was
issued on Internet Wire at about 9:30 a.m. East Coast time.
The shares fell as low as $43. Trading was halted on the
Nasdaq Stock Market about an hour later. CNBC reported that
the FBI's computer fraud unit was investigating the phony
release.
http://news.cnet.com/news/0-1004-200-2610117.html

Dial E for Eavesdropping
Heard a strange click on your cell phone? It just might have
been someone listening in. Ever seen an unknown number on your
phone bill? Someone may have cloned your phone. The devices
are out there. They're contraband. It's illegal to possess
them, to use them, and illegal to use any of the information
gained from using them. From pens used to eavesdrop on
conversations to "magic boxes" for cloning cell phones, the
US Secret Service has confiscated a wide array of eavesdropping
gadgets. These high tech tools have been used in the latest
round of scams, schemes, and underhanded shenanigans.
http://www.zdtv.com/zdtv/cybercrime/privacy/story/0,9955,2123709,00.html

Online Child Porn Hits the 'Wall'
A California man constructs a virtual barrier to stop online
sexual exploitation of children. File-sharing systems such as
Gnutella and Freenet let users freely swap images, movies and
music online. But such data-sharing systems also make it easier
-- and less risky -- to access and trade child pornography.
Georgia Hilgeman, executive director of the Vanished Children's
Alliance, said that although the images are virtual, the damage
done to the young victims is real.
http://www.zdtv.com/zdtv/cybercrime/viceonline/story/0,9955,7763,00.html

Britain delays business email legislation
The British government confirmed Friday it had briefly delayed
attempts to push through controversial new rules about how
freely employers can monitor employees' emails. The Department
of Trade and Industry said it would give business an extra three
weeks to come forward with any reservations about the rules,
which would now not come into force until October 24.
http://www.mercurycenter.com/svtech/news/breaking/internet/docs/342622l.htm

Hacking could cost Spanish Big Brother $4m
The Spanish version of Big Brother could be fined up to $4m after
a hacker broke into its server and posted personal details of
applicants on a fanclub Web site. The details were meant to remain
undisclosed and included the contestants' credit rating, IQ and
medical history. Organisers of the show could face a $4m fine for
breaching European laws governing privacy, in addition to a flood
of lawsuits from up to 1,700 applicants. "Any organisation that
collects and inadvertently makes available personal information on
the Internet is likely to be in breach of the Data Protection Act,
making them liable to compensation claims and also reputational risk,"
says Phil Jones, assistant commissioner to the Data Protection
Commissioner.
http://www.zdnet.co.uk/news/2000/33/ns-17519.html

So Africa - ISPs Easy Targets For Child Porn Prosecution
Legislation of the Internet in South Africa is under review and
local Internet service providers (ISPs) are concerned that the new
legislation will prejudice them. Speaking at the Internet Service
Providers Association (ISPA) in Johannesburg Thursday, Myron Zlotnick,
executive head of regulatory affairs at Internet service provider
M-Web, said the wording of new legislation may place the onus of
responsibility on service providers in matters of child pornography,
hate speech and copyright infringements.
http://www.newsbytes.com/pubNews/00/154250.html

Lawmaker To Grade Agencies On Computer Security
Rep. Stephen Horn, R-Calif., who made a name for himself by
grading government agencies on their Y2K computer readiness
in the months leading up to last year's millennial date rollover,
is at it again, gearing up to release a report card on government
computer security. Some time in September, Horn will release the
first in a series of report cards grading the computer security
readiness of 52 government agencies, Horn staffer Mary Ellen Grant
said today. The report cards, which will be geared toward pointing
out strengths and vulnerabilities in the federal government's
enormous network of computer systems, will be "very similar to
what we did with Y2K," Grant said.
http://www.newsbytes.com/pubNews/00/154258.html

Expiration of RSA patents opens up Net security
A unique moment in the history of high tech will occur next
month when RSA Security Inc.'s key patents, which are
fundamental to most Internet security, expire. What happens
after that will be nothing short of a watershed for the
security industry. Observers predict two major trends: the
development of security tool kits engineered for performance
and for specific markets, such as wireless, and the availability
of many more security products in the United States.
http://www.zdnet.com/eweek/stories/general/0,11011,2620278,00.html

Yahoo to offer encrypted email option
Yahoo plans to let its email account holders use data scrambling
to protect the privacy of their messages, marking a potentially
significant advance for the mainstream use of encryption. The Web
portal and ZixIt, an encryption company based in Dallas, confirmed
that they have inked an agreement to provide encryption to Yahoo
Mail users but declined to comment further.
http://news.cnet.com/news/0-1005-200-2605437.html

Whose Intellectual Property Is It, Anyway? The Open Source War
There's a war going on. It isn't between ethnic groups, provinces,
religions or nations. It is between nimble people who want to think
for themselves and big dinosaurs of corporations that want to keep
the upstarts penned up and docile. This is the war of Open Source,
and it is being fought in conference rooms, law offices, hacker
redoubts and university dormitory rooms and in the hearts of
millions of people surfing the Web.
http://www.nytimes.com/library/tech/00/08/circuits/articles/24free.html

Forensic Computer Analysis: An Introduction
This is the first in a series of articles on forensic computer
analysis. Our prime goal is to illustrate the reconstruction of past
events with as little distortion or bias as possible. We won't be
discussing real crimes here, however (other than a few technical
homicides inflicted on code by vendors); indeed, we will only rarely
be discussing computer crimes at all. If we were choosing titles for
this discussion, "virtual archeology," "time traveling," or "digital
detective work" could all be used fairly interchangeably.
http://www.ddj.com/articles/2000/0009/0009f/0009f.htm

Security Experts Discuss Hacking Trends
When it comes to the underground computer scene, there's a lot
more to be worried about than "script kiddies." Experts suggest
a new wave of hackers is forming on the horizon, and its goal
will be more than malicious mischief. "There may be a whole new
realm of the underground, and it may not be a group of kids,"
said G. Mark Hardy, managing director at Guardent, a Waltham,
Mass., security services firm. "It may be sponsored by national
elements with intents hostile to our country. The neighborhood
is changing."
http://www.techweb.com/wire/story/TWB20000824S0009

Picking Up the Pieces: Market Survey of Computer Security
Introduction While computer security is now regularly featured in
news and print media, and, dare I say it, is even sexy enough to be
discussed at soir=E9es and parties, the same cannot be said for disaster
recovery. Disaster recovery (DR) is perhaps to computer security what
manufacturing is to the world of fashion. It has to be attended to
and put in place, but no one wants to own up as being in charge of it.
http://www.westcoast.com/securecomputing/2000_08/survey/survey.html

Richard Thieme: 'Make the Distinction'
This security consultant tells us why there's no clear-cut way
to secure the Internet. When you hear the phrase "The Internet,"
do you think of it in terms of computers or communities?
Security consultant Richard Thieme says distinguishing between
the two is important, because the Internet is made up of people.
Thus, when dealing with online security, it's vital to keep the
human element in mind.
http://www.zdtv.com/zdtv/cybercrime/chaostheory/story/0,9955,7489,00.html

Are Open Source Operating Systems Unsafe?
Recently I have noticed a rash of uninformed articles being posted
about the inherent faults of Open Source programs specifically, the
risks that a business runs when they decide to run an Open Source
or GPLed operating system on their production systems. The gist of
these arguments stem from questions like: "If anyone can read the
source code, then what stops someone from modifying the source in
a malicious fashion?" and "When modifications are made, how can we
possibly guarantee that they will not adversely affect the existing
environments?"
http://securityportal.com/topnews/opensourcesafe20000825.html

-------------------------- eGroups Sponsor -------------------------~-~>
Start Saving On Long Distance Calls Today! CLICK FOR MORE!
http://click.egroups.com/1/6654/14/_/595019/_/967387570/
---------------------------------------------------------------------_->

------------------
http://all.net/