[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-05-15 19:27:54

Return-Path: <sentto-279987-1238-989980089-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 15 May 2001 19:29:07 -0700 (PDT)
Received: (qmail 29729 invoked by uid 510); 16 May 2001 01:29:29 -0000
Received: from f19.egroups.com ( by with SMTP; 16 May 2001 01:29:29 -0000
X-eGroups-Return: sentto-279987-1238-989980089-fc=all.net@returns.onelist.com
Received: from [] by f19.egroups.com with NNFMP; 16 May 2001 02:28:10 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 16 May 2001 02:28:09 -0000
Received: (qmail 22703 invoked from network); 16 May 2001 02:27:54 -0000
Received: from unknown ( by l10.egroups.com with QMQP; 16 May 2001 02:27:54 -0000
Received: from unknown (HELO all.net) ( by mta3 with SMTP; 16 May 2001 02:27:54 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id TAA04175 for iwar@onelist.com; Tue, 15 May 2001 19:27:54 -0700
Message-Id: <200105160227.TAA04175@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 15 May 2001 19:27:54 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Fake virus warning carries worm Computer worms have tried all sorts of
ploys for tricking users into activating them, but the latest is
particularly sneaky --it masquerades as a virus warning from Symantec, a
well-known anti-virus firm.  Symantec has confirmed the existence of the
worm, known as VBS.Hard.A@mm, VBS/Hard-A, or VBS/Hard@mm, and created
software to detect it.  So far, the virus has a low geographical
distribution and has infected a small number of sites, according to a
Symantec report published earlier this week.  The worm distributes
itself--like several in the past, including Love Letter Homepage--as an
attachment to an e-mail message.  The message is called "FW: Symantec
Anti-Virus Warning," and claims to contain a description of a
non-existent worm in an attached file. 

Feds still need to define role in tackling cyberterror The massive Y2K
efforts exerted to prevent a crash of the nation's critical
infrastructure may have moved the nation into the new millennium with a
few battle scars, a panel of experts said Monday, but officials should
heed the lessons learned from that experience when looking toward
protecting the nation's technological backbone in the future. 
Cyberterrorism "has no deadline like the 31st of December.  It's going
to go on forever," Utah Republican Sen.  Robert Bennett said at an Armed
Forces Communications and Electronics Association (AFCEA) conference on
Monday.  "We have this kind of vulnerability now that we never had
before." http://www.govexec.com/dailyfed/0501/051501td.htm

U.S.  senator: Cyberattacks could 'devastate' nation While President
Bush pushes for a strong defense against a missile attack, a U.S. 
senator who led the Y2k effort in Congress warned today that a
cyberattack by a hostile nation could be as disruptive as a nuclear
missile exploding over a U.S.  city.  Sen.  Robert Bennett (R-Utah), a
leading congressional evangelist on critical infrastructure protection
issues, also called on U.S.  civilian agencies to adopt the "red
team/blue team" models usedby the defense agencies to test their
information security defenses.  In this model, red teams are the
attacking force, while blue teams defend. 

Bush considers cybersecurity board The White House is leaning toward
creating a coordination board to supplement the sole National Security
Council official overseeing federal cybersecurity efforts, a senior
administration official said.  When President Clinton signed
Presidential Decision Directive 63 in May 1998, requiring agencies to
secure the systems that support the nation's critical infrastructure,
the directive also created several organizations and established a
national coordinator for security, infrastructure protection and
counterterrorism at the NSC.  President Bush said last month that he
would re-examine the organization of and potential overlap among the
agencies with critical infrastructure protection responsibilities, and
the administration announced last week that recommendations would be
issued shortly. 

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
SearchSecurity.com is your free resource that
aggregates the best security news and resources from
around the Internet daily. So you have a partner that
does all of the research that you don't have time to
do - from the most comprehensive daily news, to the
largest collection of security links and interactive
community features anywhere.


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT