Return-Path: <sentto-279987-1238-989980089-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 15 May 2001 19:29:07 -0700 (PDT) Received: (qmail 29729 invoked by uid 510); 16 May 2001 01:29:29 -0000 Received: from f19.egroups.com (64.211.240.234) by 204.181.12.215 with SMTP; 16 May 2001 01:29:29 -0000 X-eGroups-Return: sentto-279987-1238-989980089-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by f19.egroups.com with NNFMP; 16 May 2001 02:28:10 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 16 May 2001 02:28:09 -0000 Received: (qmail 22703 invoked from network); 16 May 2001 02:27:54 -0000 Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 16 May 2001 02:27:54 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 16 May 2001 02:27:54 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id TAA04175 for iwar@onelist.com; Tue, 15 May 2001 19:27:54 -0700 Message-Id: <200105160227.TAA04175@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 15 May 2001 19:27:54 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Fake virus warning carries worm Computer worms have tried all sorts of ploys for tricking users into activating them, but the latest is particularly sneaky --it masquerades as a virus warning from Symantec, a well-known anti-virus firm. Symantec has confirmed the existence of the worm, known as VBS.Hard.A@mm, VBS/Hard-A, or VBS/Hard@mm, and created software to detect it. So far, the virus has a low geographical distribution and has infected a small number of sites, according to a Symantec report published earlier this week. The worm distributes itself--like several in the past, including Love Letter Homepage--as an attachment to an e-mail message. The message is called "FW: Symantec Anti-Virus Warning," and claims to contain a description of a non-existent worm in an attached file. http://www.zdnet.com/zdnn/stories/news/0,4586,2760467,00.html http://news.cnet.com/news/0-1003-200-5933461.html http://www.infoworld.com/articles/hn/xml/01/05/15/010515hnnewworm.xml Feds still need to define role in tackling cyberterror The massive Y2K efforts exerted to prevent a crash of the nation's critical infrastructure may have moved the nation into the new millennium with a few battle scars, a panel of experts said Monday, but officials should heed the lessons learned from that experience when looking toward protecting the nation's technological backbone in the future. Cyberterrorism "has no deadline like the 31st of December. It's going to go on forever," Utah Republican Sen. Robert Bennett said at an Armed Forces Communications and Electronics Association (AFCEA) conference on Monday. "We have this kind of vulnerability now that we never had before." http://www.govexec.com/dailyfed/0501/051501td.htm U.S. senator: Cyberattacks could 'devastate' nation While President Bush pushes for a strong defense against a missile attack, a U.S. senator who led the Y2k effort in Congress warned today that a cyberattack by a hostile nation could be as disruptive as a nuclear missile exploding over a U.S. city. Sen. Robert Bennett (R-Utah), a leading congressional evangelist on critical infrastructure protection issues, also called on U.S. civilian agencies to adopt the "red team/blue team" models usedby the defense agencies to test their information security defenses. In this model, red teams are the attacking force, while blue teams defend. http://www.computerworld.com/cwi/story/0,1199,NAV47_STO60566,00.html.html Bush considers cybersecurity board The White House is leaning toward creating a coordination board to supplement the sole National Security Council official overseeing federal cybersecurity efforts, a senior administration official said. When President Clinton signed Presidential Decision Directive 63 in May 1998, requiring agencies to secure the systems that support the nation's critical infrastructure, the directive also created several organizations and established a national coordinator for security, infrastructure protection and counterterrorism at the NSC. President Bush said last month that he would re-examine the organization of and potential overlap among the agencies with critical infrastructure protection responsibilities, and the administration announced last week that recommendations would be issued shortly. http://www.fcw.com/fcw/articles/2001/0514/web-cip-05-15-01.asp ------------------------ Yahoo! Groups Sponsor ---------------------~-~> SearchSecurity.com is your free resource that aggregates the best security news and resources from around the Internet daily. So you have a partner that does all of the research that you don't have time to do - from the most comprehensive daily news, to the largest collection of security links and interactive community features anywhere. http://us.click.yahoo.com/PnDLcC/uGiCAA/EGNFAA/kzAVlB/TM ---------------------------------------------------------------------_-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT