Return-Path: <sentto-279987-1258-991098788-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 28 May 2001 18:14:08 -0700 (PDT) Received: (qmail 21808 invoked by uid 510); 29 May 2001 00:14:07 -0000 Received: from b05.egroups.com (208.50.144.96) by 204.181.12.215 with SMTP; 29 May 2001 00:14:07 -0000 X-eGroups-Return: sentto-279987-1258-991098788-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by b05.egroups.com with NNFMP; 29 May 2001 01:13:08 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 29 May 2001 01:13:07 -0000 Received: (qmail 19188 invoked from network); 29 May 2001 01:13:07 -0000 Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 29 May 2001 01:13:07 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta1 with SMTP; 29 May 2001 01:13:06 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA06769 for iwar@onelist.com; Mon, 28 May 2001 18:13:06 -0700 Message-Id: <200105290113.SAA06769@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 28 May 2001 18:13:06 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news2 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit DoS attacks cripple White House Web site The White House Web site was hit by its third denial-of-service attack this month, rendering the site inaccessible for more than six hours Tuesday. The hacker attempt on the Whitehouse.gov address, which crashed the site, lasted from 11 a.m. until after 5 p.m. PDT Tuesday. The White House confirmed that the barrage of page requests created through the attack was "heavy enough to block most legitimate users." On May 4, the Whitehouse.gov site was down for more than three hours because of a similar attack, purported to be linked to a string of Web site hacks and defacements organized by Chinese and pro-Chinese Internet vandals during the first week of May. http://www.zdnet.com/zdnn/stories/news/0,4586,5083523,00.html CERT hit by service denial attack The CERT Coordination Center at Carnegie Mellon University's Software Engineering Institute is under fire from a distributed denial-of-service attack that has taken its Web site offline for several days. The attack, apparently from numerous computers working together, began Tuesday. The site, www.cert.org, remained unavailable this morning. The center, originally called the Computer Emergency Response Team, is the national clearinghouse for information about cyberthreats, vulnerabilities and fixes. Ironically, its victimization says more about the difficulty of protecting against a service denial attack than about the site's security. http://www.gcn.com/vol1_no1/news/4299-1.html http://www.guardianunlimited.co.uk/internetnews/story/0,7369,496368,00.html Health site exposed customer info Government substance-abuse prevention page flawed. A government health information Web site exposed information about thousands of people who asked for pamphlets and brochures about drug and alcohol addiction. Because of a software flaw, consumers who visited the site and requested titles such as "Moving Forward With Your Life, Leaving Alcohol and Other Drugs Behind" had their names, e-mails and addresses revealed on an Internet page. The site, Health.org, is maintained by a private subcontractor for a Department of Health and Human Services agency. http://www.msnbc.com/news/578476.asp Cyberattacks Prompt Computer Disaster Drills The network is down, computer screens are blank and important client data are lost in cyberspace. But relax - this is only a test. Computer disaster drills are growing in popularity as hacker and virus attacks mount, the threat of power outages in California continue and companies store more data on computer networks that are accessed by more people, increasing their vulnerability. A study released this week by the University of California at San Diego said one common type of hacker attack, called denial of service, occurs worldwide about 4,000 times a week. http://www.newsbytes.com/news/01/166117.html Echelon not for industrial espionage A draft study by the European Parliament shows that the European Union believes that the "Echelon" global surveillance/spying system exists, but that it is not used for industrial espionage. The study, which still is awaiting further information based on a recent European Parliament delegation visit to Washington, D.C., said that many media reports have said that Echelon is used "for purposes of industrial espionage by spying on foreign businesses with the aim of securing a competitive advantage for firms in the home country... but no such case has been substantiated." http://www.computeruser.com/news/01/05/25/news9.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT