Return-Path: <sentto-279987-1273-991358203-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 31 May 2001 18:17:08 -0700 (PDT) Received: (qmail 4954 invoked by uid 510); 1 Jun 2001 00:17:37 -0000 Received: from ej.egroups.com (64.211.240.230) by 204.181.12.215 with SMTP; 1 Jun 2001 00:17:37 -0000 X-eGroups-Return: sentto-279987-1273-991358203-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by ej.egroups.com with NNFMP; 01 Jun 2001 01:16:44 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_3); 1 Jun 2001 01:16:43 -0000 Received: (qmail 48840 invoked from network); 1 Jun 2001 01:16:39 -0000 Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 1 Jun 2001 01:16:39 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta2 with SMTP; 1 Jun 2001 01:16:39 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id SAA04760 for iwar@onelist.com; Thu, 31 May 2001 18:16:39 -0700 Message-Id: <200106010116.SAA04760@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 31 May 2001 18:16:39 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Layoffs lead to revenge hacking When someone cracked Slip.net's computer system, altered customer accounts and deleted important databases, the Internet service provider didn't need to look far to find the attacker. It wasn't a criminal outfit seeking credit card numbers, and it wasn't a scrawny whiz-kid hacking away for a challenge in his dark bedroom. It was Nicholas Middleton, a former computer administrator for Slip.net, who had been unhappy at the San Francisco company and recently quit. Middleton fought the resulting criminal charges on a legal technicality but lost and got three years' probation. http://www.usatoday.com/life/cyber/tech/2001-05-31-revenge-hacking.htm Hacktivists multiply attacks against Japanese sites Japanese websites are coming increasingly under fire from Chinese and South Korean hackers, angry about Japan's version of historical events as written in a forthcoming textbook. According to Japanese Internet watchdog Everyday People, 63 Japanese websites were hacked in 2000, while during the first five months of 2001, crackers hit at least 650 domains. Even the total for May 2001 -- 250 defaced and hacked sites -- surpasses last year's count. This spring, South Korean hackers used a Denial-of-Service attack to crash the website representing Japan's Ministry of Education, Culture, Sports and Science and Technology. The attack prompted Japan to ask South Korea to crack down on the hackers. http://www.securitywatch.com/newsforward/default.asp?AID=7832 Gangs Finding New Turf Members are claiming corners in cyberspace, taking their rivalries online with Web sites. Anthony, a brawny Sacramento teenager who hangs with the Nortenos street gang, was casually surfing the Web one day and was stunned when he stumbled on a smattering of home pages posted by members of the Sureno gang, the Nortenos' sworn and sometimes bloody rival. It became a matter of pride for Anthony, an 18-year-old high school graduate, to learn enough about building a Web site to represent his gang online. "NORTENOS!" blares his SacTown Gangstas Web site, decorated with pictures of a modified United Farm Workers logo, a gleaming red Impala, an automatic pistol, two pit bull terriers and a cheery Web button inviting visitors to "e-mail me." http://www.latimes.com/business/cutting/20010531/t000045511.html Acting Defense CIO cautious about outsourcing In order to make outsourcing work, military organizations should ensure that they retain in-house expertise, and they should carefully scrutinize their vendors' security plans, the armed service's top information technology official said Wednesday. "We should make sure we don't just rush to outsource," because it's in vogue, said Linton Wells II, the Defense Department's acting chief information officer and assistant secretary of Defense for command, control, communications and intelligence (ASD/C3I). He spoke at the Army Small Computer Program Status Review conference in Baltimore. http://www.fcw.com/fcw/articles/2001/0528/web-dod-05-31-01.asp ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:14 PDT