[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-05-12 20:04:24


Return-Path: <sentto-279987-1233-989723081-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 12 May 2001 20:05:08 -0700 (PDT)
Received: (qmail 25003 invoked by uid 510); 13 May 2001 02:06:08 -0000
Received: from ho.egroups.com (64.211.240.236) by 204.181.12.215 with SMTP; 13 May 2001 02:06:08 -0000
X-eGroups-Return: sentto-279987-1233-989723081-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by ho.egroups.com with NNFMP; 13 May 2001 03:04:41 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 13 May 2001 03:04:40 -0000
Received: (qmail 29794 invoked from network); 13 May 2001 03:04:24 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 13 May 2001 03:04:24 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 13 May 2001 03:04:24 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id UAA05154 for iwar@onelist.com; Sat, 12 May 2001 20:04:24 -0700
Message-Id: <200105130304.UAA05154@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 12 May 2001 20:04:24 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Gateway drops its punter's pants in public A security gaffe by Gateway
2000 has resulted in the exposure of sensitive customer information on
the PC vendor's web site.  Up until late this afternoon searching for
'delivery cost'(hardly the strangest request) on Gateway's UK site
returned two copies of an Excel spreadsheet containing order details,
customer contacts and phone numbers.  The spreadsheet didn't contain
credit card details but had enough information, including the phone
number of customer's banks, for con men to pose as Gateway reps or any
number of frauds.  The Excel file contained the details of 449 Gateway
customers almost all of which seemed to be from The Netherlands. 
http://www.theregister.co.uk/content/8/18867.html

Disney hit by Homepage virus SOURCES SAID that the Disney network was
infected by the Homepage email virus, with practically every machine at
the Orlando location down for two days.  The virus hit the theme parks,
the hotels and the cruise ship.  That, said one wag, meant that the
cruise ship "was totally dead in the water".  A guest staying at the
Disney Hotel said the machines were still affected by the virus, with IT
staff racing to fix the damage.  http://www.theinquirer.net/10050102.htm

White House Prepares Cyber-Security Plan The White House today said it
is kicking into high gear a new version of the National Plan for
Cyberspace Security and Critical Infrastructure Protection, which it
said will be ready for action later this year.  The White House in a
statement released today said that the Commerce Department's Critical
Infrastructure Assurance Office now is coordinating several other
federal departments and agencies on the plan, and that it has already
held meetings with the banking and finance, electric power, rail
transportation, oil and gas, state and local law enforcement,
information technology and telecommunications industries. 
http://www.newsbytes.com/news/01/165519.html

Arizona Governor Vetoes Cyber-Security Bill Arizona Gov.  Jane Hull, R,
Tuesday vetoed legislation approved by the state legislature that would
have established a critical infrastructure protection plan for the
state.  Although the legislature approved the bill, a veto appeared all
but certain once state Chief Information Officer Rick Zelznak signaled
his opposition last week.  Despite its good intentions, the legislation
"sets up a command and control structure," that could cause more
problems than it solves, Zelznak said in a recent interview with
Newsbytes.
http://www.newsbytes.com/news/01/165522.html

House committee makes bid to derail anti-spam bill A bill designed to
reduce unsolicited commercial e-mail ran into trouble in a House
committee Thursday, as business leaders and lawmakers declared their
opposition to the legislation.  Almost every legislator and witness
present for the House Judiciary Committee hearing said they had problems
with the bill, which previously passed the House Energy and Commerce
Committee.  At Thursday's hearing, Rep.  Bob Barr, R-Ga., urged the
business leaders to work harder against the bill.  ``I would suggest a
full-court press,'' Barr said, calling the legislation ``broad and
heavy-handed.''
http://www.siliconvalley.com/docs/news/tech/014194.htm
http://www.usatoday.com/life/cyber/tech/2001-05-10-anti-spam-opposition.htm
http://www.siliconvalley.com/docs/news/reuters_wire/1180706l.htm

Europeans Leave U.S.  In Huff Over Spy Network Two prominent European
Parliament officials are canceling the rest of their trip to Washington,
D.C., and returning to Europe after the State and Commerce Departments,
as well as the CIA and National Security Agency, rebuffed their efforts
to learn more about the Echelon spy system.  U.S.  input will be
lacking, therefore, in an upcoming report the European Parliament
intends to release later this month regarding Echelon.  The
controversial intelligence network is capable of intercepting telephone
and e-mail traffic across the world. 
http://www.newsbytes.com/news/01/165569.html

Hacker tool lets freedom ping 'Peekabooty' set to circumvent
state-sponsored censorship.  Mix a rabid love of freedom with an intense
dislike of corporate or state- sponsored censorship, fold in the wacky
collective brilliance of a group of rogue coders, and what do you get?
Tyranny's worst nightmare: an untraceable, globally distributed digital
information network called Peekabooty.  The denizens of the digital
underground know it only as Project X, a closely held secret software
application set to be unleashed on the world this July at an annual
hacker blowout in Las Vegas known as DefCon by an equally infamous group
known as the Cult of the Dead Cow, cDc for short. 
http://www.msnbc.com/news/571103.asp

Threat management comes to the fore Touting a new way to look at
enterprise security that involves intrusion detection and response
technology, Recourse Technologies is preparing updates to its "threat
management" products.  The Redwood City, Calif., company is planning to
release by the end of June an upgrade to its ManHunt software, which
combines detection, analysis and response to numerous types of network
attack strategies for enterprise networks, managed security providers
and Internet service providers. 
http://www.zdnet.com/eweek/stories/general/0,11011,2717058,00.html


------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:12 PDT