[iwar] news2

From: Fred Cohen (fc@all.net)
Date: 2001-05-28 18:13:06

Return-Path: <sentto-279987-1258-991098788-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 28 May 2001 18:14:08 -0700 (PDT)
Received: (qmail 21808 invoked by uid 510); 29 May 2001 00:14:07 -0000
Received: from b05.egroups.com ( by with SMTP; 29 May 2001 00:14:07 -0000
X-eGroups-Return: sentto-279987-1258-991098788-fc=all.net@returns.onelist.com
Received: from [] by b05.egroups.com with NNFMP; 29 May 2001 01:13:08 -0000
X-Sender: fc@all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_1_3); 29 May 2001 01:13:07 -0000
Received: (qmail 19188 invoked from network); 29 May 2001 01:13:07 -0000
Received: from unknown ( by l9.egroups.com with QMQP; 29 May 2001 01:13:07 -0000
Received: from unknown (HELO all.net) ( by mta1 with SMTP; 29 May 2001 01:13:06 -0000
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA06769 for iwar@onelist.com; Mon, 28 May 2001 18:13:06 -0700
Message-Id: <200105290113.SAA06769@all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 28 May 2001 18:13:06 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news2
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

DoS attacks cripple White House Web site The White House Web site was
hit by its third denial-of-service attack this month, rendering the site
inaccessible for more than six hours Tuesday.  The hacker attempt on the
Whitehouse.gov address, which crashed the site, lasted from 11 a.m. 
until after 5 p.m.  PDT Tuesday.  The White House confirmed that the
barrage of page requests created through the attack was "heavy enough to
block most legitimate users." On May 4, the Whitehouse.gov site was down
for more than three hours because of a similar attack, purported to be
linked to a string of Web site hacks and defacements organized by
Chinese and pro-Chinese Internet vandals during the first week of May. 

CERT hit by service denial attack The CERT Coordination Center at
Carnegie Mellon University's Software Engineering Institute is under
fire from a distributed denial-of-service attack that has taken its Web
site offline for several days.  The attack, apparently from numerous
computers working together, began Tuesday.  The site, www.cert.org,
remained unavailable this morning.  The center, originally called the
Computer Emergency Response Team, is the national clearinghouse for
information about cyberthreats, vulnerabilities and fixes.  Ironically,
its victimization says more about the difficulty of protecting against a
service denial attack than about the site's security. 

Health site exposed customer info Government substance-abuse prevention
page flawed.  A government health information Web site exposed
information about thousands of people who asked for pamphlets and
brochures about drug and alcohol addiction.  Because of a software flaw,
consumers who visited the site and requested titles such as "Moving
Forward With Your Life, Leaving Alcohol and Other Drugs Behind" had
their names, e-mails and addresses revealed on an Internet page.  The
site, Health.org, is maintained by a private subcontractor for a
Department of Health and Human Services agency. 

Cyberattacks Prompt Computer Disaster Drills The network is down,
computer screens are blank and important client data are lost in
cyberspace.  But relax - this is only a test.  Computer disaster drills
are growing in popularity as hacker and virus attacks mount, the threat
of power outages in California continue and companies store more data on
computer networks that are accessed by more people, increasing their
vulnerability.  A study released this week by the University of
California at San Diego said one common type of hacker attack, called
denial of service, occurs worldwide about 4,000 times a week. 

Echelon not for industrial espionage A draft study by the European
Parliament shows that the European Union believes that the "Echelon"
global surveillance/spying system exists, but that it is not used for
industrial espionage.  The study, which still is awaiting further
information based on a recent European Parliament delegation visit to
Washington, D.C., said that many media reports have said that Echelon is
used "for purposes of industrial espionage by spying on foreign
businesses with the aim of securing a competitive advantage for firms in
the home country...  but no such case has been substantiated."


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT