[iwar] news

From: Fred Cohen (fc@all.net)
Date: 2001-07-10 22:18:14


Return-Path: <sentto-279987-1415-994828696-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 10 Jul 2001 22:20:08 -0700 (PDT)
Received: (qmail 307 invoked by uid 510); 11 Jul 2001 04:20:37 -0000
Received: from fg.egroups.com (208.50.144.70) by 204.181.12.215 with SMTP; 11 Jul 2001 04:20:37 -0000
X-eGroups-Return: sentto-279987-1415-994828696-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by fg.egroups.com with NNFMP; 11 Jul 2001 05:18:16 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_2_0); 11 Jul 2001 05:18:15 -0000
Received: (qmail 43511 invoked from network); 11 Jul 2001 05:18:15 -0000
Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 11 Jul 2001 05:18:15 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 11 Jul 2001 05:18:15 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA10137 for iwar@onelist.com; Tue, 10 Jul 2001 22:18:14 -0700
Message-Id: <200107110518.WAA10137@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 10 Jul 2001 22:18:14 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Mass attack on Chinese government sites The number of Chinese government
sites defaced by various hacking groups has skyrocketed over the past
week.  Some attacks were aggressive, blatantly seeking to provoke a
reaction from Chinese hackers.  These incidents do not appear to have
any ties to recent events, and are more likely the result of bored
script kiddies on summer break.  Of course, some of the big names are
still involved, for example PoizonBOx. 
http://www.securitywatch.com/newsforward/default.asp?AID=3D8529

Banks meet match in hacker group Brazilian hacking crew, Perfect.br, has
defaced itself an insane number of site in the past couple of days, most
of which belong to banks worldwide.  Two countries -- Germany and Greece
-- sustained the brunt of the damage.  A few of Perfect.br's victims
include:
www.firstnationalbanknh.com (First National Bank of New Holland
	-- hosted on Microsoft-IIS/5.0)
www.digisafe.com.sq
www.konzernstrukturdatenbank.de
www.gatewaynationalbank.com
www.metallbank.de www.bank1stnational.com
http://www.securitywatch.com/newsforward/default.asp?AID=3D8528

Government payroll system open to hackers, report says A government
payroll computer center in Denver is fraught with security problems,
raising the possibility of criminals stealing or altering records,
congressional investigators said Tuesday.  The General Accounting
Office, the investigative arm of Congress, faulted the National Business
Center for not adequately securing its computer network, not
investigating suspicious access patterns and having lax physical
security.
http://www.siliconvalley.com/docs/news/tech/076560.htm

Once hacked, Mumbai cyber police get set to bite hard CYBERCOPS of
Mumbai Police may have been taken in by the recent hacking of their
website.  But they are getting ready to take on cyber criminals in the
future.  Five policemen of the Cybercrime Cell are now undergoing an
intensive four-month internet training.  Every morning, five days a
week, the five inspectors attend computer classes of internet guru Vijay
Mukhi at Tardeo.  There is no banter in the classroom as the police sit
among other students to learn the intricacies of Java, C++, and the
TCP/IP protocol.  And they mean business. 
http://www.indian-express.com/ie20010710/nat2.shtml

Security concerns prompt Safe Harbor Web site changes Because of
security concerns, two features were removed last week from a U.S. 
government Web site designed to aid the flow of personal information and
commerce between the U.S.  and the European Union, according to a notice
posted on the Web site.  A self-certification form and the "Safe Harbor
list" were removed last Thursday from Safe Harbor, a Web site operated
by the U.S.  Department of Commerce, "in order to review the security of
the information submitted to the Department by U.S.  organizations,"
according to a posting on the site. 
http://www.itworld.com/Man/2688/IDG010709safeharbor/

WinXP Product Activation decoded and analysed German techies Fully
Licensed GmbH claim - convincingly - to have unravelled the Windows
Product Activation (WPA) system used in the latest versions of Microsoft
software, including Office XP and Windows XP.  The bottom line,
according to the company, is that WPA is not particularly intrusive,
does not invade anybody's privacy, and is a lot more forgiving of
hardware changes than has been speculated. 
http://www.theregister.co.uk/content/4/20282.html

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT