[iwar] news


From: Fred Cohen
To: Information Warfare Mailing List
From: fc@all.net
To: iwar@onelist.com

Tue, 20 Mar 2001 18:34:12 -0800 (PST)


fc  Tue Mar 20 18:35:08 2001
Return-Path: 
Delivered-To: fc@all.net
Received: from 204.181.12.215
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 20 Mar 2001 18:35:08 -0800 (PST)
Received: (qmail 31590 invoked by uid 510); 21 Mar 2001 02:35:08 -0000
Received: from mo.egroups.com (208.50.144.78)
  by 204.181.12.215 with SMTP; 21 Mar 2001 02:35:08 -0000
X-eGroups-Return: sentto-279987-1047-985142054-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by mo.egroups.com with NNFMP; 21 Mar 2001 02:34:14 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_0_4); 21 Mar 2001 02:34:13 -0000
Received: (qmail 86805 invoked from network); 21 Mar 2001 02:34:12 -0000
Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 21 Mar 2001 02:34:12 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 21 Mar 2001 02:34:12 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA05848 for iwar@onelist.com; Tue, 20 Mar 2001 18:34:12 -0800
Message-Id: <200103210234.SAA05848@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen 
MIME-Version: 1.0
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 20 Mar 2001 18:34:12 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Computer virus packs political theme
The Arab-Israeli conflict has now crossed over
into the computer virus realm. A relatively
polite e-mail virus with a pro-Palestinian
resistance message infected computers at a
few large corporations Monday. Called Staple
by the antivirus industry, the virus author
makes clear he intended only a political
demonstration through a message in the bug:
Do not worry. This is a harmless virus. It
will not do any thing to your system. STAPLE
SPREADS IN THE FAMILIAR fashion, sending copies
of itself to 50 people in the victim's address
book. It arrives with the subject line RE:
Injustice. The message body includes a bit of
a trick: It's addressed to the recipient and
includes the text, Did you send the attached
message, I was not expecting this from you!
http://www.msnbc.com/news/546769.asp

Virus Spreads Message of 'Hacktivism'
http://www.pcworld.com/news/article/0,aid,45022,00.asp
'Palestinian' computer virus warning issued
http://www.ananova.com/news/story/sm_248747.html?menuAnti-Virus
Firms Warn Over Political Worm
http://www.newsbytes.com/news/01/163374.html

FBI: Terrorists lurk online
Terrorist organizations are increasingly lurking
on the Internet, looking for ways to penetrate
government and private networks and using the
Web to pass information, the government's top
cybercrime sleuth said Tuesday. "We know for
certain that terrorist organizations are using
the Internet for, at the very least,
communications," said Ronald Dick, director of
the National Infrastructure Protection Center,
the FBI's cybercrime arm. Dick said terrorist
groups rely primarily on traditional channels
of communication to reach members, but that is
changing and many are making greater use of
technology to support their activities. Groups
and even some countries' agencies are using the
Internet to exchange information, seek ways to
penetrate infrastructure networks and disrupt
services, Dick said. He would not name either
the groups or the nations.
http://www.usatoday.com/life/cyber/tech/2001-03-20-fbi-online-terrorism.htm
http://www.washingtonpost.com/wp-dyn/articles/A31203-2001Mar20.html

Virus attacks pick up pace
Following the recent and highly destructive Naked
Wife virus outbreak, IT managers are being warned
that further, similarly dangerous viruses could
appear soon. "Virus writers are getting smarter
and, based on history, I think IT managers globally
should prepare themselves and their staff for
another major hit," said Vinny Gullotto, head of
the antivirus emergency response team for viral
security experts McAfee. Gullotto added that
viruses are getting more complex. Naked Wife
inserts the name of the previous recipient into
the body of infectious emails, making the messages
appear authentic. Peer-to-peer environments could
be particularly vulnerable owing to the massive
amount of file exchanging that can occur.
http://www.zdnet.com/zdnn/stories/news/0,4586,2698615,00.html

Freenet: Will It Smash Copyright Law?
This is an age, Ian Clarke says, when copyright
laws and freedom of speech cannot coexist. One
of them has to go. And, if he has anything to
say about it, freedom of speech won't be the
one. By day, Clarke is the chief technology
officer for the Santa Monica, Calif.-based
Uprizer, which Clarke describes as a
non-controversial software maker. It's his
hobby, he says, that is his true calling.
It's also what's making him famous. Clarke
is the founder and project director for Freenet,
an open-source content exchange project that
many are calling the next Napster, or even the
indestructible Napster, because of its ability
to function as a place to swap MP3 music files
undetected.
http://www.newsbytes.com/news/01/163395.html

Hackers Are Taking Over Mexico.
A study carried out by the internet consultants
Dreitech and Intermarket, revealed that one out
of every ten Mexican companies has DNS configuration
errors (Domain Name System). Project DNS, as the
study was called, refers to the international
directory that translates the names of domains
used by the surfers and the values, in numbers
that are used by the computers to communicate
through the Internet. The objective of this work
is to alert people about the dangers that hang
around the companies that are on the web, as
well as the individuals that work in it and
could cause it damage .
http://63.108.181.201/2001/03/20/eng-qbueno/eng-qbueno_083859_47_8258300409652.html

Using Security White Papers Effectively
Documenting what we know remains a challenge in the
computer security profession. Various resources exist:
the Internet, web pages on intranets, articles, email,
and technical white papers. White papers are probably
the most formal method, and they have the advantage of
wide dissemination. These documents usually speak to a
specific issue in depth. The range varies though with
respect to the quality of coverage.
http://securityportal.com/articles/whitepapers20010320.html

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Make good on the promise you made at graduation to keep
in touch. Classmates.com has over 14 million registered
high school alumni--chances are you'll find your friends!
http://us.click.yahoo.com/n4HqaC/DMUCAA/4ihDAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/