[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Mon, 20 Nov 2000 16:40:40 -0800 (PST)


fc  Mon Nov 20 16:41:15 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Mon, 20 Nov 2000 16:41:15 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Nov 21 00:41:08 2000)
X-From_: fc@all.net  Mon Nov 20 18:40:42 2000
Received: from c3.egroups.com (c3.egroups.com [208.50.99.225]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id SAA29316 for ; Mon, 20 Nov 2000 18:40:38 -0600
X-eGroups-Return: sentto-279987-769-974767242-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by c3.egroups.com with NNFMP; 21 Nov 2000 00:40:43 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-6_2_1); 21 Nov 2000 00:40:41 -0000
Received: (qmail 86863 invoked from network); 21 Nov 2000 00:40:41 -0000
Received: from unknown (10.1.10.142) by l7.egroups.com with QMQP; 21 Nov 2000 00:40:41 -0000
Received: from unknown (HELO all.net) (65.0.156.76) by mta3 with SMTP; 21 Nov 2000 01:41:46 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id QAA21568 for iwar@onelist.com; Mon, 20 Nov 2000 16:40:40 -0800
Message-Id: <200011210040.QAA21568@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, 20 Nov 2000 16:40:40 -0800 (PST)
Reply-To: iwar@egroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Morocco's government Internet site attacked by hacker
A hacker broke into Morocco's Finance Ministry's
Web site for the first time at the weekend but
caused no damage, an official said Monday. Web
surfers or potential investors visiting the site
at www.mfie.gov.ma found a message in bad French
saying the cover page had been hacked by
``NetOperat.''
http://www0.mercurycenter.com/svtech/news/breaking/internet/docs/654819l.htm

Hackers Worldwide Fan Flames In Middle East Conflict
As tensions in the Middle East continue to simmer,
more than a hundred Web sites have been defaced or
shut down by pro-Palestinian and pro-Israeli hackers,
often with the assistance of activist hackers from
several countries not actively involved in the
conflict, according to security experts. Ben Venzke,
director of intelligence production at iDefense,
a Web security firm that has been monitoring the
Middle East conflict as it plays out online, said
hackers from as far away as South America to the
US are expanding the conflict by contributing their
skills to whichever side has their sympathies.
http://www.newsbytes.com/news/00/158423.html

Russia's hackers: notorious or desperate?
While the International Space Station brings new
renown to Russia, the nation is gaining a darker
sort of notice from other explorers -- the hackers
who launch into cyberspace. Russia's reputation as
home to some of the world's most gifted and devious
hackers was underscored last month when Microsoft
Corp. disclosed that passwords used to access its
coveted source code had been sent from the company
network to an e-mail address in St. Petersburg.
It is by no means clear whether a Russian was behind
the break-in -- that e-mail account could have been
managed remotely. But that doesn't stop Russian
hackers -- "khakeri," or "vzlomshchiki (house-breakers)"
-- from puffing out their chests at such exploits.
http://www.cnn.com/2000/TECH/computing/11/20/russia.hackers.ap/index.html

Hacking With a Conscience Is a New Trend
In the "old days" of the early '90s, the only message
a hacker was likely to leave on a Web page was "I
was here" or "Hackers rule." But now, more and more
hackers are using their tricks to spread socially
conscious messages, security experts say. The trend
-- dubbed "hacktivism" -- has shown up in a number
of recent incidents.
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/11/20/BU121645.DTL

French court orders Yahoo! to block French users
In a landmark ruling, a French court on Monday
ordered Yahoo! to block French Web users from
its auction sites selling Nazi memorabilia. The
decision closed a seven-month court battle
started by several anti-racism groups that
accused the Santa Clara, Calif.-based Internet
giant of trivializing the Holocaust.
http://www0.mercurycenter.com/svtech/news/breaking/merc/docs/015848.htm

Spam? Not us, says 24/7
A US District Court in Denver has issued a
temporary restraining order on behalf of online
marketing gurus, 24/7, against the Mail Abuse
Prevention System (MAPS). 24/7 Media went to the
court after MAPS included its subsidiary, 24/7
Exactis, in the spammers blacklist the Real Time
Blackhole List. The list is used by many ISPs to
determine whether or not to block mail coming from
a particular address. 24/7 said that it should not
have been included in the list. Cindy Brown, the
company's senior vice president said: "We don't
believe any serious observer could contend that
we are spammers."
http://www.theregister.co.uk/content/1/14829.html

The latest security fad: Partnering
Security vendors, still scrambling for the right
combination of software, hardware and services to
offer the enterprise, have another new idea: When
in doubt, partner. This week, firewall and
intrusion detection maker Zone Labs Inc., of San
Francisco, and Tokyo-based anti-virus software
developer Trend Micro Inc. will announce a close
relationship, capping a furious week of partnering
and punctuating a year of failed security solutions.
No fewer than five partnerships were announced last
week, but many observers say the moves have less to
do with making enterprise users' lives better and
more to do with vendors' inability to reverse what
has become a predictable course of failure for them.
http://www.zdnet.com/eweek/stories/general/0,11011,2655640,00.html

INFOSEC, Quality Assurance, and Extortion
I was having a chat with a student at the latest
Common Body of Knowledge (CBK) review course in
Washington, DC this week. The eight-day CBK
course is from the (ISC)2, the body that controls
the CISSP designation (Certified Information
Systems Security Professional). For more
information about the (ISC)2 and the CISSP, visit
http://www.isc2.org.
http://securityportal.com/cover/coverstory20001120.html

The Latest Version Of Kevin Mitnick
Kevin Mitnick, cult hero and hacker icon, is
apologetic. Repentant, even. After spending five
years in jail, he says he is eager to get on with
his life. But he stops short of being truly contrite.
He qualifies each mea culpa with an afterthought.
"I do want to make a public apology," he said
recently to 300 software designers at a Washington,
D.C., conference. "My past actions have invaded their
privacy by getting into (companies') machines and
getting into their code, and I do regret doing that
stuff because it's wrong to do. But I was a kid
having fun. I can't change the past, but ...hopefully
I can be forgiven."
http://www.newsbytes.com/news/00/158412.html

-------------------------- eGroups Sponsor -------------------------~-~>
Create your business web site your way now at Bigstep.com.
It's the fast, easy way to get online, to promote your business,
and to sell your products and services. Try Bigstep.com now.
http://click.egroups.com/1/9183/5/_/595019/_/974767242/
---------------------------------------------------------------------_->

------------------
http://all.net/