Return-Path: <sentto-279987-1252-990622702-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 23 May 2001 06:00:08 -0700 (PDT) Received: (qmail 16443 invoked by uid 510); 23 May 2001 12:01:08 -0000 Received: from ej.egroups.com (64.211.240.230) by 204.181.12.215 with SMTP; 23 May 2001 12:01:08 -0000 X-eGroups-Return: sentto-279987-1252-990622702-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by ej.egroups.com with NNFMP; 23 May 2001 12:58:22 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 23 May 2001 12:58:22 -0000 Received: (qmail 46446 invoked from network); 23 May 2001 12:58:21 -0000 Received: from unknown (10.1.10.26) by l10.egroups.com with QMQP; 23 May 2001 12:58:21 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 23 May 2001 12:58:20 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA19663 for iwar@onelist.com; Wed, 23 May 2001 05:58:20 -0700 Message-Id: <200105231258.FAA19663@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 23 May 2001 05:58:19 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Woe Unto White House Site It's no secret that the First Homepage is second rate. For the last four months, critics have been savaging whitehouse.gov by calling it state-of-the-art -- five years ago. Then, just as the Bush administration was finalizing plans to relaunch the site, malicious hackers appear to have defaced the executive branch homepage on Tuesday. In addition, a denial-of-service attack left whitehouse.gov unreachable from, according to a Web monitor, around 2:30 p.m. EDT to 8:20 p.m. Around 3:45 p.m., a Wired News reporter spotted a black page with three items -- two dead links to news articles and a link to a mirror of a previous hack -- on the whitehouse.gov home page. A White House spokesman confirmed a denial-of-service attack took place but said, "I'm not aware of a hack at this time." http://www.wired.com/news/politics/0,1283,43993,00.html Chinese hackers may be rallying forces Chinese hackers are preparing a new wave of attacks that could move beyond the relatively benign defacements seen earlier this month to include computer viruses and worms, a foreign affairs newsletter reported Monday. The story, appearing in "The International Reports: Early Warning," said attacks against U.S. computer systems are being planned for May and June. "According to the "stationmaster" of a computer hackers organization in the People's Republic of China called the Honker Union of China (also known as the Red Hackers), further rounds of attacks on the U.S. Web sites are being prepared for this month and in June," the newsletter stated. http://www.vny.com/cf/News/upidetail.cfm?QID=3D187706 Researchers shed light on DoS attacks Online vandals intent on lashing out at companies and rivals stage denial-of-service attacks more than 4,000 times every week, researchers from the University of California at San Diego said Tuesday. Among the common targets are some names that come as no surprise: Amazon.com, America Online and Microsoft's Hotmail. However, a large number of individual users and small businesses were targeted by attacks as well, the researchers found. "We believe our research provides the only publicly available data quantifying denial-of-service activity in the Internet," said David Moore, senior researcher with the San Diego Supercomputer Center's Cooperative Association for Internet Data Analysis and the primary author of the paper. http://www.zdnet.com/zdnn/stories/news/0,4586,5083326,00.html http://news.cnet.com/news/0-1003-200-6006924.html http://www.msnbc.com/news/577081.asp Staffing shortages hamper anti-cyberterrorism unit Staff shortages and vacancies in key positions kept a government anti-computer crime unit from alerting the public of dangerous computer viruses until the damage was already done, Congress was told Tuesday. ``While some warnings were issued in time to avert damage, most of the warnings, especially those related to viruses, pertained to attacks underway,'' the General Accounting Office said in an audit of the National Infrastructure Protection Center. The investigative arm of Congress blamed a lack of a system to share information government-wide and a shortage of skilled staff for the delays. http://www.siliconvalley.com/docs/news/tech/021152.htm http://www.wired.com/news/politics/0,1283,44002,00.html http://www.newsbytes.com/news/01/165991.html http://www.msnbc.com/news/576811.asp http://www.cnn.com/2001/TECH/internet/05/22/cyber.crime.02/index.html http://www.usatoday.com/life/cyber/tech/2001-05-22-cybercrime-staffing.htm FBI early-virus warning stinks A Federal Bureau of Investigation unit created to protect businesses and government from hackers and terrorists usually fails to issue warnings in time about imminent electronic attacks, a congressional report says. The report, expected to be released Tuesday by the General Accounting Office, the investigative arm of Congress, says that while some of the center's more than 80 warnings about computer attacks since 1998 were issued in time to avert damage, most, especially those related to viruses, came when the attacks were already under way. The GAO report echoes similar criticism by security experts and industry groups of the FBI's $27-million a-year National Infrastructure Protection Center, the government's centerpiece in its cyber-protection efforts. It comes amid a string of recent embarrassments for the bureau, including disclosures about an alleged spy for Russia within its ranks and failures to turn over documents in the death-penalty trial of convicted bomber Timothy McVeigh. http://www.zdnet.com/zdnn/stories/news/0,4586,2763767,00.html Cyber-Security Help Wanted The administration's top security coordinator Richard Clarke once warned that the United States could face an "electronic Pearl Harbor" if the nation's electronic defenses were not strengthened. He painted an equally gloomy picture today. The increasing sophistication of electronic attackers, coupled with growing US reliance on Web-based systems has created a very dangerous environment, Clarke said at the Global Internet Project, a gathering of high-tech executives. Clarke is the Bush Administration's national coordinator for security, infrastructure protection and counter-terrorism. "The malicious actors we are looking at today are nation-states," Clarke said. Sophisticated enemy attackers pose a far more dire threat to US systems than do the "14-year-old" hackers who deface Web sites, Clarke said. http://www.newsbytes.com/news/01/166017.html U.S. provides $8.6 million for ``cyber corps'' The U.S. government said Tuesday that it will provide $8.6 million in scholarships for a ''cyber corps'' of 200 computer- security students who would agree to take government jobs upon graduating. The National Science Foundation said it had selected six universities to participate in the program, which aims to ease a shortage of computer-security experts in the federal government. Participating students would earn graduate or undergraduate degrees in information security or a related field, and would have two years of their tuition paid for by the government. http://www.siliconvalley.com/docs/news/tech/080748.htm http://news.cnet.com/news/0-1003-200-6008345.html KGB vet helps put new light on Web security The one-time head of KGB overseas code scrambling and an ex-director of the CIA released Monday what they called a revolutionary way of hiding Internet communications from prying eyes and would-be intruders. The new system can change the IP addresses on a network faster than once a second, cloaking them from all but authorized parties, said Victor Sheymov, chief executive of Invicta Networks." http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2763770%2C00.html http://www.techtv.com/news/hackingandsecurity/story/0,24195,3328808,00.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT