[iwar] news


From: Fred Cohen
From: fc@all.net
To: iwar@egroups.com

Sun, 17 Sep 2000 05:59:31 -0700 (PDT)


fc  Sun Sep 17 06:01:15 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Sun, 17 Sep 2000 06:01:15 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Sun Sep 17 12:56:47 2000)
X-From_: sentto-279987-525-969195613-fc=all.net@returns.onelist.com  Sun Sep 17 07:55:56 2000
Received: from ck.egroups.com (ck.egroups.com [208.50.144.69]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA01067 for ; Sun, 17 Sep 2000 07:55:56 -0500
X-eGroups-Return: sentto-279987-525-969195613-fc=all.net@returns.onelist.com
Received: from [10.1.10.35] by ck.egroups.com with NNFMP; 17 Sep 2000 13:00:19 -0000
Received: (qmail 19779 invoked from network); 17 Sep 2000 12:59:32 -0000
Received: from unknown (10.1.10.26) by m1.onelist.org with QMQP; 17 Sep 2000 12:59:32 -0000
Received: from unknown (HELO all.net) (24.1.84.100) by mta1 with SMTP; 17 Sep 2000 12:59:32 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA17623 for iwar@onelist.com; Sun, 17 Sep 2000 05:59:31 -0700
Message-Id: <200009171259.FAA17623@all.net>
To: iwar@egroups.com
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Sun, 17 Sep 2000 05:59:31 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

-------------------------- eGroups Sponsor -------------------------~-~>
Special Offer-Earn 300 Points from MyPoints.com for trying @Backup
Get automatic protection and access to your important computer files.
Install today:
http://click.egroups.com/1/6347/14/_/595019/_/969195613/
---------------------------------------------------------------------_->

UK Anti-Smoking Protester Hacks Over 100 Web Sites
Reports are coming in that Herbless, an anti-smoking
protester that hacked into several local government Web
sites in the UK during August, has restarted his campaign,
piggybacking on the current fuel crisis caused by the road
hauliers' campaign against the price of gas. Earlier this
week, Herbless is reported to have hacked into the Legoland
(http://www.legoland.co.uk ) Web site, exploiting a default
password loophole under Windows NT. Sources suggest that he
used the same SQL (structured query language) loophole on
Sept. 14 to access as many as a 168 corporate Web sites.
http://www.newsbytes.com/pubNews/00/155247.html

Computer-related crimes expected to plague Olympic Games
The Olympic Games provides an environment for crime to
flourish especially in the areas of credit card fraud
and counterfeit currency, the Australian Federal Police
(AFP) has warned. Outlining strategies to tackle Olympic
related crime Federal Agent Narelle Mitchell said
technology has increased opportunites for fraud. Agent
Mitchell said organised South-East Asian crime groups
involved in worldwide credit card fraud are likely to
take advantage of the surge in commercial activity and
volume of people in Australia during the Olympic Games.
She said credit card fraud takes various forms such as
counterfeiting complete cards or re-coding the magnetic
strip on lost and stolen cards to extracting valid credit
card numbers generated by computer from confidential
banking details.
http://www.computerworld.idg.com.au/CWT1997.nsf/cwtoday/E0924A65F01B8A124A25 
695B002208A8

Hackers amass new zombie army
The nation's government-funded computer security watchdog
issued a warning Friday that computer intruders have taken
control of hundreds of computers connected to the Internet.
The attackers are in a position to launch a serious attack,
according to the CERT Coordination Center, which said that
the situation "poses a significant threat to Internet sites
and the Internet infrastructure. "
http://www.msnbc.com/news/460824.asp

More US Agencies Expected To Flunk Privacy Test
The announcement Thursday by House Majority Leader
Dick Armey, R-Texas, that the Internal Revenue Service
(IRS) Web site is not adequately protecting privacy may
be the first of many such disclosures about federal agency
Web sites, a House leadership source told Newsbytes today.
After releasing a report earlier this week indicating that
only 3 percent of federal agency Web sites live up to
administration-proposed privacy standards, Armey and other
GOP members are considering options for publicizing the
names of other non-compliant agencies, said the source,
who asked to remain unnamed.
http://www.newsbytes.com/pubNews/00/155293.html

Recording Industry Asks Hackers for Help
Security firms and hackers don't always go hand in hand.
But the creators of SDMI, the Secure Digital Music
Initiative, are hoping they can work together starting
Friday. SDMI is offering $10,000 to hackers who can break
SDMI's encryption code. SDMI will then patch the holes
poked by the hackers, thus, presumably, making better
technology. The only problem is that the hackers don't
appear willing to help. The Secure Digital Music Initiative
is one of the recording industry's responses to the copyright
and payment challenges posed by digital music. Created in
early 1999, SDMI embeds a "watermark" in every digital music
file, designed to manage the copying of those files.
Watermarked music will play only on SDMI-compliant devices.
The SDMI standard, compliance with which is voluntary, has
so far failed to meet with much acceptance.
http://www.pcworld.com/pcwtoday/article/0,1510,18476,00.html

Hack alert: Where's the outrage?
If you're keeping score, here's the tally from this week:
three international Web sites hacked; two damning reports
regarding Internet privacy standards released; and one
shocking statistic published, claiming that nearly one-third
of e-businesses don't even use firewalls. Taken together,
these events paint a bleak picture of the state of Internet
privacy and security. And this time, experts are telling
IT managers that they have only themselves to blame because
the primary culprits are lax security practices and an
unwillingness to spend extra time and money upfront to
secure their companies' Web sites. In short, the rush to
"e" everything is catching up with companies in the form
of a growing security crisis.
http://www.zdnet.com/eweek/stories/general/0,11011,2628705,00.html

The Price of Secure Data
With the recent, very public outbreaks of crackers
disrupting businesses on the Net through massively
distributed denial of service attacks, many businesses
have been installing security software like never
before. The scary legalities that they may have to
face if their compromised systems are implicated in
an attack are usually more than enough of a reason
for the management to push through the purchase
requests and the overtime that the tech staff request.
But is all of this really necessary? Are we, in typical
North American fashion, overreacting to what we have
been led to perceive as a threat?
http://securityportal.com/topnews/price20000915.html

------------------
http://all.net/