Return-Path: <sentto-279987-1233-989723081-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 12 May 2001 20:05:08 -0700 (PDT) Received: (qmail 25003 invoked by uid 510); 13 May 2001 02:06:08 -0000 Received: from ho.egroups.com (64.211.240.236) by 204.181.12.215 with SMTP; 13 May 2001 02:06:08 -0000 X-eGroups-Return: sentto-279987-1233-989723081-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by ho.egroups.com with NNFMP; 13 May 2001 03:04:41 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 13 May 2001 03:04:40 -0000 Received: (qmail 29794 invoked from network); 13 May 2001 03:04:24 -0000 Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 13 May 2001 03:04:24 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 13 May 2001 03:04:24 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id UAA05154 for iwar@onelist.com; Sat, 12 May 2001 20:04:24 -0700 Message-Id: <200105130304.UAA05154@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 12 May 2001 20:04:24 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Gateway drops its punter's pants in public A security gaffe by Gateway 2000 has resulted in the exposure of sensitive customer information on the PC vendor's web site. Up until late this afternoon searching for 'delivery cost'(hardly the strangest request) on Gateway's UK site returned two copies of an Excel spreadsheet containing order details, customer contacts and phone numbers. The spreadsheet didn't contain credit card details but had enough information, including the phone number of customer's banks, for con men to pose as Gateway reps or any number of frauds. The Excel file contained the details of 449 Gateway customers almost all of which seemed to be from The Netherlands. http://www.theregister.co.uk/content/8/18867.html Disney hit by Homepage virus SOURCES SAID that the Disney network was infected by the Homepage email virus, with practically every machine at the Orlando location down for two days. The virus hit the theme parks, the hotels and the cruise ship. That, said one wag, meant that the cruise ship "was totally dead in the water". A guest staying at the Disney Hotel said the machines were still affected by the virus, with IT staff racing to fix the damage. http://www.theinquirer.net/10050102.htm White House Prepares Cyber-Security Plan The White House today said it is kicking into high gear a new version of the National Plan for Cyberspace Security and Critical Infrastructure Protection, which it said will be ready for action later this year. The White House in a statement released today said that the Commerce Department's Critical Infrastructure Assurance Office now is coordinating several other federal departments and agencies on the plan, and that it has already held meetings with the banking and finance, electric power, rail transportation, oil and gas, state and local law enforcement, information technology and telecommunications industries. http://www.newsbytes.com/news/01/165519.html Arizona Governor Vetoes Cyber-Security Bill Arizona Gov. Jane Hull, R, Tuesday vetoed legislation approved by the state legislature that would have established a critical infrastructure protection plan for the state. Although the legislature approved the bill, a veto appeared all but certain once state Chief Information Officer Rick Zelznak signaled his opposition last week. Despite its good intentions, the legislation "sets up a command and control structure," that could cause more problems than it solves, Zelznak said in a recent interview with Newsbytes. http://www.newsbytes.com/news/01/165522.html House committee makes bid to derail anti-spam bill A bill designed to reduce unsolicited commercial e-mail ran into trouble in a House committee Thursday, as business leaders and lawmakers declared their opposition to the legislation. Almost every legislator and witness present for the House Judiciary Committee hearing said they had problems with the bill, which previously passed the House Energy and Commerce Committee. At Thursday's hearing, Rep. Bob Barr, R-Ga., urged the business leaders to work harder against the bill. ``I would suggest a full-court press,'' Barr said, calling the legislation ``broad and heavy-handed.'' http://www.siliconvalley.com/docs/news/tech/014194.htm http://www.usatoday.com/life/cyber/tech/2001-05-10-anti-spam-opposition.htm http://www.siliconvalley.com/docs/news/reuters_wire/1180706l.htm Europeans Leave U.S. In Huff Over Spy Network Two prominent European Parliament officials are canceling the rest of their trip to Washington, D.C., and returning to Europe after the State and Commerce Departments, as well as the CIA and National Security Agency, rebuffed their efforts to learn more about the Echelon spy system. U.S. input will be lacking, therefore, in an upcoming report the European Parliament intends to release later this month regarding Echelon. The controversial intelligence network is capable of intercepting telephone and e-mail traffic across the world. http://www.newsbytes.com/news/01/165569.html Hacker tool lets freedom ping 'Peekabooty' set to circumvent state-sponsored censorship. Mix a rabid love of freedom with an intense dislike of corporate or state- sponsored censorship, fold in the wacky collective brilliance of a group of rogue coders, and what do you get? Tyranny's worst nightmare: an untraceable, globally distributed digital information network called Peekabooty. The denizens of the digital underground know it only as Project X, a closely held secret software application set to be unleashed on the world this July at an annual hacker blowout in Las Vegas known as DefCon by an equally infamous group known as the Cult of the Dead Cow, cDc for short. http://www.msnbc.com/news/571103.asp Threat management comes to the fore Touting a new way to look at enterprise security that involves intrusion detection and response technology, Recourse Technologies is preparing updates to its "threat management" products. The Redwood City, Calif., company is planning to release by the end of June an upgrade to its ManHunt software, which combines detection, analysis and response to numerous types of network attack strategies for enterprise networks, managed security providers and Internet service providers. http://www.zdnet.com/eweek/stories/general/0,11011,2717058,00.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:12 PDT