[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-05-23 05:58:19


Return-Path: <sentto-279987-1252-990622702-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 23 May 2001 06:00:08 -0700 (PDT)
Received: (qmail 16443 invoked by uid 510); 23 May 2001 12:01:08 -0000
Received: from ej.egroups.com (64.211.240.230) by 204.181.12.215 with SMTP; 23 May 2001 12:01:08 -0000
X-eGroups-Return: sentto-279987-1252-990622702-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by ej.egroups.com with NNFMP; 23 May 2001 12:58:22 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 23 May 2001 12:58:22 -0000
Received: (qmail 46446 invoked from network); 23 May 2001 12:58:21 -0000
Received: from unknown (10.1.10.26) by l10.egroups.com with QMQP; 23 May 2001 12:58:21 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 23 May 2001 12:58:20 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA19663 for iwar@onelist.com; Wed, 23 May 2001 05:58:20 -0700
Message-Id: <200105231258.FAA19663@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 23 May 2001 05:58:19 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Woe Unto White House Site It's no secret that the First Homepage is
second rate.  For the last four months, critics have been savaging
whitehouse.gov by calling it state-of-the-art -- five years ago.  Then,
just as the Bush administration was finalizing plans to relaunch the
site, malicious hackers appear to have defaced the executive branch
homepage on Tuesday.  In addition, a denial-of-service attack left
whitehouse.gov unreachable from, according to a Web monitor, around 2:30
p.m.  EDT to 8:20 p.m.  Around 3:45 p.m., a Wired News reporter spotted
a black page with three items -- two dead links to news articles and a
link to a mirror of a previous hack -- on the whitehouse.gov home page. 
A White House spokesman confirmed a denial-of-service attack took place
but said, "I'm not aware of a hack at this time."
http://www.wired.com/news/politics/0,1283,43993,00.html

Chinese hackers may be rallying forces Chinese hackers are preparing a
new wave of attacks that could move beyond the relatively benign
defacements seen earlier this month to include computer viruses and
worms, a foreign affairs newsletter reported Monday.  The story,
appearing in "The International Reports: Early Warning," said attacks
against U.S.  computer systems are being planned for May and June. 
"According to the "stationmaster" of a computer hackers organization in
the People's Republic of China called the Honker Union of China (also
known as the Red Hackers), further rounds of attacks on the U.S.  Web
sites are being prepared for this month and in June," the newsletter
stated.
http://www.vny.com/cf/News/upidetail.cfm?QID=3D187706

Researchers shed light on DoS attacks Online vandals intent on lashing
out at companies and rivals stage denial-of-service attacks more than
4,000 times every week, researchers from the University of California at
San Diego said Tuesday.  Among the common targets are some names that
come as no surprise: Amazon.com, America Online and Microsoft's Hotmail. 
However, a large number of individual users and small businesses were
targeted by attacks as well, the researchers found.  "We believe our
research provides the only publicly available data quantifying
denial-of-service activity in the Internet," said David Moore, senior
researcher with the San Diego Supercomputer Center's Cooperative
Association for Internet Data Analysis and the primary author of the
paper.
http://www.zdnet.com/zdnn/stories/news/0,4586,5083326,00.html
http://news.cnet.com/news/0-1003-200-6006924.html
http://www.msnbc.com/news/577081.asp

Staffing shortages hamper anti-cyberterrorism unit Staff shortages and
vacancies in key positions kept a government anti-computer crime unit
from alerting the public of dangerous computer viruses until the damage
was already done, Congress was told Tuesday.  ``While some warnings were
issued in time to avert damage, most of the warnings, especially those
related to viruses, pertained to attacks underway,'' the General
Accounting Office said in an audit of the National Infrastructure
Protection Center.  The investigative arm of Congress blamed a lack of a
system to share information government-wide and a shortage of skilled
staff for the delays. 
http://www.siliconvalley.com/docs/news/tech/021152.htm
http://www.wired.com/news/politics/0,1283,44002,00.html
http://www.newsbytes.com/news/01/165991.html
http://www.msnbc.com/news/576811.asp
http://www.cnn.com/2001/TECH/internet/05/22/cyber.crime.02/index.html
http://www.usatoday.com/life/cyber/tech/2001-05-22-cybercrime-staffing.htm

FBI early-virus warning stinks A Federal Bureau of Investigation unit
created to protect businesses and government from hackers and terrorists
usually fails to issue warnings in time about imminent electronic
attacks, a congressional report says.  The report, expected to be
released Tuesday by the General Accounting Office, the investigative arm
of Congress, says that while some of the center's more than 80 warnings
about computer attacks since 1998 were issued in time to avert damage,
most, especially those related to viruses, came when the attacks were
already under way.  The GAO report echoes similar criticism by security
experts and industry groups of the FBI's $27-million a-year National
Infrastructure Protection Center, the government's centerpiece in its
cyber-protection efforts.  It comes amid a string of recent
embarrassments for the bureau, including disclosures about an alleged
spy for Russia within its ranks and failures to turn over documents in
the death-penalty trial of convicted bomber Timothy McVeigh. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2763767,00.html

Cyber-Security Help Wanted The administration's top security coordinator
Richard Clarke once warned that the United States could face an
"electronic Pearl Harbor" if the nation's electronic defenses were not
strengthened.  He painted an equally gloomy picture today.  The
increasing sophistication of electronic attackers, coupled with growing
US reliance on Web-based systems has created a very dangerous
environment, Clarke said at the Global Internet Project, a gathering of
high-tech executives.  Clarke is the Bush Administration's national
coordinator for security, infrastructure protection and
counter-terrorism.  "The malicious actors we are looking at today are
nation-states," Clarke said.  Sophisticated enemy attackers pose a far
more dire threat to US systems than do the "14-year-old" hackers who
deface Web sites, Clarke said. 
http://www.newsbytes.com/news/01/166017.html

U.S.  provides $8.6 million for ``cyber corps'' The U.S.  government
said Tuesday that it will provide $8.6 million in scholarships for a
''cyber corps'' of 200 computer- security students who would agree to
take government jobs upon graduating.  The National Science Foundation
said it had selected six universities to participate in the program,
which aims to ease a shortage of computer-security experts in the
federal government.  Participating students would earn graduate or
undergraduate degrees in information security or a related field, and
would have two years of their tuition paid for by the government. 
http://www.siliconvalley.com/docs/news/tech/080748.htm
http://news.cnet.com/news/0-1003-200-6008345.html

KGB vet helps put new light on Web security The one-time head of KGB
overseas code scrambling and an ex-director of the CIA released Monday
what they called a revolutionary way of hiding Internet communications
from prying eyes and would-be intruders.  The new system can change the
IP addresses on a network faster than once a second, cloaking them from
all but authorized parties, said Victor Sheymov, chief executive of
Invicta Networks."
http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2763770%2C00.html
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3328808,00.html

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT