[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-05-26 06:42:26


Return-Path: <sentto-279987-1256-990884547-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 26 May 2001 06:43:08 -0700 (PDT)
Received: (qmail 10053 invoked by uid 510); 26 May 2001 12:43:30 -0000
Received: from fl.egroups.com (64.211.240.233) by 204.181.12.215 with SMTP; 26 May 2001 12:43:30 -0000
X-eGroups-Return: sentto-279987-1256-990884547-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by fl.egroups.com with NNFMP; 26 May 2001 13:42:27 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 26 May 2001 13:42:26 -0000
Received: (qmail 64602 invoked from network); 26 May 2001 13:42:26 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 26 May 2001 13:42:26 -0000
Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 26 May 2001 13:42:26 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA15967 for iwar@onelist.com; Sat, 26 May 2001 06:42:26 -0700
Message-Id: <200105261342.GAA15967@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 26 May 2001 06:42:26 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

White House Confirms Denial Of Service Attack Whitehouse.gov was hit
Tuesday by a denial of service attack that rendered the site
inaccessible for more than six hours, White House spokesperson Jimmy Orr
confirmed today.  The attack, which lasted from roughly 2:00 p.m.  EDT
until after 8:00 p.m.  EDT, created traffic that was "heavy enough to
block most legitimate users," Orr said.  The denial of service attack
was the third this month directed against Whitehouse.gov, which on May 4
was rendered inaccessible for more than three hours by a similar strike. 
http://www.newsbytes.com/news/01/166071.html

Internet warning system attacked Unknown attackers inundated the
Computer Emergency Response Team Coordination Center with data Tuesday
and Wednesday, cutting off the public's access to the organization
largely responsible for warning others on the Internet about
computer-security threats.  The attack began around 9 a.m.  PDT Tuesday
and continued to stall traffic to the organization's Web site Wednesday. 
Access to the site was sporadic early Wednesday, with the Carnegie
Mellon University-based center reportedly accessible from the eastern
United States but inaccessible to many other site users.  "Our
connection to the Internet has been largely saturated by this activity,"
Ian Finlay, an Internet security analyst for the CERT Coordination
Center, said in a recorded statement.  "The www.cert.org Web site may be
unavailable until the attack begins to subside." By midday Wednesday,
the site was once again fully accessible. 
http://news.cnet.com/news/0-1003-200-6016900.html

Tuna 'virus' puts five in hospital Five workers at a German internet
company caught food poisoning after ignoring a warning about what they
thought was a computer virus.  The management of an Italian restaurant
in Berlin emailed their customers with the warning "Watch out for the
tuna fish", after discovering that it was infected.  But the customers
dismissed the message as a warning about a computer virus.  In reality,
it turned out that a local caterer had supplied tuna salad with a
dressing made from old eggs and the management team had badly worded the
warning.  Five members of the team were hospitalised before staff worked
out the misunderstanding.  http://www.vnunet.com/News/1121926
http://www.ananova.com/news/story/sm_302631.html

U.S.  Wooing Student Hackers - Pt.  2 The United States knows full well
where the best computer hackers are and they're out to get them.  With
money.  The U.S.  government will provide $8.6 million in scholarship
money to 200 students who agree to work for the government as computer
security professionals after they earn their degree.  The National
Science Foundation's (NSF) Scholarship for Service program was
established to encourage students to enter the information security
field and help government security efforts. 
http://www.wired.com/news/school/0,1383,44021,00.html

Spy agency taps into undersea cable For decades, the National Security
Agency did most of its spying by plucking information out of thin air. 
With a global network of listening stations and satellites, the NSA
eavesdropped on phone conversations in Saddam Hussein's bunker, snatched
Soviet missile-launch secrets and once caught Brezhnev in his limousine
chatting about his mistress.The NSA's task was relatively simple then
because most international phone-and-data traffic moved via satellites
or microwave towers.  The agency sucked up those signals and sorted
through them with supercomputers.  Few of its eavesdroppers risked life
or limb, and those they spied upon were often none the wiser. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2764372,00.html

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT