[iwar] News


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Tue, 11 Jul 2000 06:27:08 -0700 (PDT)


fc  Tue Jul 11 06:28:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 11 Jul 2000 06:28:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Jul 11 13:28:07 2000)
X-From_: sentto-279987-448-963322029-fc=all.net@returns.onelist.com  Tue Jul 11 08:27:07 2000
Received: from fk.egroups.com (fk.egroups.com [208.50.144.73]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id IAA22049 for ; Tue, 11 Jul 2000 08:27:07 -0500
X-eGroups-Return: sentto-279987-448-963322029-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by fk.egroups.com with NNFMP; 11 Jul 2000 13:27:11 -0000
Received: (qmail 29450 invoked from network); 11 Jul 2000 13:27:08 -0000
Received: from unknown (10.1.10.142) by m2.onelist.org with QMQP; 11 Jul 2000 13:27:08 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 11 Jul 2000 13:27:08 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA11827 for iwar@onelist.com; Tue, 11 Jul 2000 06:27:08 -0700
Message-Id: <200007111327.GAA11827@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 11 Jul 2000 06:27:08 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] News
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

FBI probes attacks by hacker on Qualcomm
The FBI is conducting a criminal investigation into a
series of illegal hacker attacks on computer systems at
Qualcomm, according to documents filed in San Diego
federal court. The electronic intrusions, which apparently
penetrated Qualcomm's fire wall and other network defenses
last fall, compromised several high-end "server"  computers
used to store proprietary information.
http://www.signonsandiego.com/news/uniontrib/fri/business/news_1b7qualcomm.html
http://news.cnet.com/news/0-1005-200-2216979.html

Scanning the World
A mysterious California company is sweeping the net for live
hosts, and touching off alarms around the world. A secretive
Silicon Valley startup is probing the Internet, tickling
firewalls and intrusion detection systems across the globe
and raising the ire of network administrators increasingly
sensitized to potential harbingers of hack attacks.
http://www.securityfocus.com/news/56

Early warning center for cyber attacks in trouble
The government's own computer systems may be derailing an
effort between public agencies and private companies to
create an early warning system for cyber attacks, the
government's chief cyber-security man believes. Since 1998,
a skittish private industry and the federal government have
been working together to create a gigantic database of every
hacking or computer hijacking incident, from the Love Bug
viruses to small incidents that the public rarely hears
about. By 2003, they hoped a constantly updated tool to
combat, fight and forecast cyber attacks would emerge.
http://www.upside.com/News/3964c7eb0.html

Lawsuit Says You Can't Escape Netscape
America Online is the target of a class action that accuses
its Netscape subsidiary of violating federal privacy laws.
The lawsuit, filed in U.S. District Court for the Southern
District of New York by Abbey, Gardy & Squitieri on behalf
of Christopher Specht, alleges that AOL is illegally tracking
Web surfers, in violation of the Electronic Communications
Privacy Act and the Computer Fraud and Abuse Act. According
to the complaint, Netscape's SmartDownload software program,
which is distributed to users of Netscape's Communicator
software package, secretly monitors downloads of .exe and
.zip files from Web sites. The lawsuit, filed last Friday,
alleges that Netscape transmits information about the files
back to itself, along with an identifying software cookie
lodged in each copy of Netscape's Navigator Web browser.
http://www.thestandard.com/article/display/0%2C1151%2C16622%2C00.html

"Rent a hacker": Swedish firm hunts down the cyber bandits
It takes less than three minutes, and "Tom" has already
cracked the code. Numbers and commands flash by him dizzyingly
on the screen, followed by the word "success." Tom is a hacker,
and he has just infiltrated yet another corporate computer. For
Tom, it's all part of a day's work. But unlike the "bad" hackers,
Tom works for the Swedish company Defcom Securities. Businesses
hire Defcom hackers to try to break into their computers, with
just one goal in mind: to test how well their computer security
systems work.
http://www.antionline.org/2000/07/09/eca/0008-0474-dpa-SPECIAL-Computers.html

Information Security: The Global Picture
What do Americans, the British, and Asians have in common?
Certainly not the same language! Unless, of course, you're
talking about the language of security. There are some striking
similarities in the approaches taken by businesses in each of
these places to secure their valuable data--not that there's
complete agreement on every count.
http://www.informationweek.com/bizint/biz794/security.htm

------------------------------------------------------------------------
e-Business Quality Management- Your Site's Success Depends on It.
Register today for an eye opening experience.
http://click.egroups.com/1/5934/14/_/595019/_/963322029/
------------------------------------------------------------------------

------------------
http://all.net/