Return-Path: <sentto-279987-1256-990884547-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 26 May 2001 06:43:08 -0700 (PDT) Received: (qmail 10053 invoked by uid 510); 26 May 2001 12:43:30 -0000 Received: from fl.egroups.com (64.211.240.233) by 204.181.12.215 with SMTP; 26 May 2001 12:43:30 -0000 X-eGroups-Return: sentto-279987-1256-990884547-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by fl.egroups.com with NNFMP; 26 May 2001 13:42:27 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 26 May 2001 13:42:26 -0000 Received: (qmail 64602 invoked from network); 26 May 2001 13:42:26 -0000 Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 26 May 2001 13:42:26 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 26 May 2001 13:42:26 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id GAA15967 for iwar@onelist.com; Sat, 26 May 2001 06:42:26 -0700 Message-Id: <200105261342.GAA15967@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 26 May 2001 06:42:26 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit White House Confirms Denial Of Service Attack Whitehouse.gov was hit Tuesday by a denial of service attack that rendered the site inaccessible for more than six hours, White House spokesperson Jimmy Orr confirmed today. The attack, which lasted from roughly 2:00 p.m. EDT until after 8:00 p.m. EDT, created traffic that was "heavy enough to block most legitimate users," Orr said. The denial of service attack was the third this month directed against Whitehouse.gov, which on May 4 was rendered inaccessible for more than three hours by a similar strike. http://www.newsbytes.com/news/01/166071.html Internet warning system attacked Unknown attackers inundated the Computer Emergency Response Team Coordination Center with data Tuesday and Wednesday, cutting off the public's access to the organization largely responsible for warning others on the Internet about computer-security threats. The attack began around 9 a.m. PDT Tuesday and continued to stall traffic to the organization's Web site Wednesday. Access to the site was sporadic early Wednesday, with the Carnegie Mellon University-based center reportedly accessible from the eastern United States but inaccessible to many other site users. "Our connection to the Internet has been largely saturated by this activity," Ian Finlay, an Internet security analyst for the CERT Coordination Center, said in a recorded statement. "The www.cert.org Web site may be unavailable until the attack begins to subside." By midday Wednesday, the site was once again fully accessible. http://news.cnet.com/news/0-1003-200-6016900.html Tuna 'virus' puts five in hospital Five workers at a German internet company caught food poisoning after ignoring a warning about what they thought was a computer virus. The management of an Italian restaurant in Berlin emailed their customers with the warning "Watch out for the tuna fish", after discovering that it was infected. But the customers dismissed the message as a warning about a computer virus. In reality, it turned out that a local caterer had supplied tuna salad with a dressing made from old eggs and the management team had badly worded the warning. Five members of the team were hospitalised before staff worked out the misunderstanding. http://www.vnunet.com/News/1121926 http://www.ananova.com/news/story/sm_302631.html U.S. Wooing Student Hackers - Pt. 2 The United States knows full well where the best computer hackers are and they're out to get them. With money. The U.S. government will provide $8.6 million in scholarship money to 200 students who agree to work for the government as computer security professionals after they earn their degree. The National Science Foundation's (NSF) Scholarship for Service program was established to encourage students to enter the information security field and help government security efforts. http://www.wired.com/news/school/0,1383,44021,00.html Spy agency taps into undersea cable For decades, the National Security Agency did most of its spying by plucking information out of thin air. With a global network of listening stations and satellites, the NSA eavesdropped on phone conversations in Saddam Hussein's bunker, snatched Soviet missile-launch secrets and once caught Brezhnev in his limousine chatting about his mistress.The NSA's task was relatively simple then because most international phone-and-data traffic moved via satellites or microwave towers. The agency sucked up those signals and sorted through them with supercomputers. Few of its eavesdroppers risked life or limb, and those they spied upon were often none the wiser. http://www.zdnet.com/zdnn/stories/news/0,4586,2764372,00.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT