[iwar] [NewsBits] NewsBits - 08/03/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-08-08 20:30:22


Return-Path: <sentto-279987-1564-997327823-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 08 Aug 2001 20:31:22 -0700 (PDT)
Received: (qmail 5447 invoked by uid 510); 9 Aug 2001 02:32:31 -0000
Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 9 Aug 2001 02:32:31 -0000
X-eGroups-Return: sentto-279987-1564-997327823-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by hh.egroups.com with NNFMP; 09 Aug 2001 03:30:23 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_1); 9 Aug 2001 03:30:23 -0000
Received: (qmail 98802 invoked from network); 9 Aug 2001 03:30:22 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 9 Aug 2001 03:30:22 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 9 Aug 2001 03:30:22 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10567 for iwar@onelist.com; Wed, 8 Aug 2001 20:30:22 -0700
Message-Id: <200108090330.UAA10567@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 8 Aug 2001 20:30:22 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 08/03/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

August 3, 2001

Code Red no longer worst of worms The dreaded Code Red worm was fading
from the spotlight Friday, as the pest found fewer Web servers to
infect.  After hogging headlines and fanning computer technicians' fears
for several days, the rate of infection from the fast-spreading worm had
plateaued and may be tapering off.  Experts who monitor the potential
impact of worms and viruses said Code Red has not slowed the overall
speed of the Internet at all, in contrast to initial worries it could
clog vast chunks of the Net.  Security think tank the SANS Institute
reported that servers responsible for 343,345 Web sites had been
infected by a second wave of Code Red between Wednesday and 5 a.m.  PDT
Friday.  But it had only infected about 20,000 servers in the most
recent few hours--a relatively pokey rate that puts Code Red on the back
burner for many security experts. 
http://news.cnet.com/news/0-1003-200-6772768.html

Code Red Computer Worm Infestation Seen Peaking The spread of the Code
Red computer worm showed signs of peaking on Friday, although security
experts warned the Information Technology community not to drop its
guard.  "Basically, it's reaching its peak now," Andre Post, a senior
research adviser for Dutch security software maker Symantec Corp, told
Reuters on Friday.  "I expect it to slow down a bit more." There still
have been no confirmed reports of Code Red infesting computers in
Europe. 
http://www.reuters.com/news_article.jhtml?type=3Dinternetnews&StoryID=3D145=
563

Code Red fails to impress jaded users While originally expected to at
least shut down the Internet, if not actually obliterate the planet
Earth, the Code Red worm laid pretty low this week -- doubtless waiting
for the media coverage to die down before sneakily launching a global
information meltdown.  Despite a few insignificant effects, such as
temporarily shutting down the Pentagon, the worm was regarded as pretty
much a damp squib. 
http://news.zdnet.co.uk/story/0,,t269-s2092573,00.html

Web worm gained information for future attacks The authors of the Code
Red worm have collected a master database of many of the computers the
worm infected, information that could be used for future virus or worm
attacks.  Even as federal authorities in Canada and the United States
said the spread of the worm had largely ceased, computer-security
experts were examining the code to determine who its authors might be
and what, if any, further uses those authors might have for the worm. 
http://rtnews.globetechnology.com/servlet/RTGAMArticleHTMLTemplate/D/200108=
0=20
3/gtvirrr?tf=3DRT/fullstory_Tech.html&cf=3Dglobetechnology/tech-config-neut=
ral&s=20 lug=3Dgtvirrr&date=3D20010803&archive=3DRTGAM&site=3DTechnology

New vulnerability in wireless networks Researchers have discovered a way
to quickly break through the security system that protects the leading
corporate wireless networking system, a trade group said Friday.  While
computer security experts had previously uncovered weaknesses in Wi-Fi,
a standard for wireless-data communication also known as 802.11b, the
latest discovery is being treated with more concern, because it is more
feasible and takes less time to carry out.  The new attack allows a
hacker to discover the "secret key" used to encrypt data before it goes
into the air.  The group that promotes the Wi-Fi standard, which briefed
reporters and analysts prior to the publication of a paper that details
the vulnerability, said it has long urged wireless network users to
supplement Wi-Fi's built-in security system with stronger encryption
tools.  http://news.cnet.com/news/0-1004-200-6773189.html

Ontrack to Investigate Alleged GOP ``War Room'' Computers Electronic
Discovery Specialists to Inspect Hard Drives Used During Presidential
Election Vote Recount.  A group of news organizations has retained
ONTRACK Data International, Inc.  to perform computer forensics work on
two hard drives used in what has been alleged to be the GOP "war-room"
during the time of the Florida recount of votes in the presidential
election last November.  Florida Secretary of State Katherine Harris
reversed her decision not to allow reporters to inspect the computer
records, and work performed by Ontrack will attempt to reveal the hard
drive contents to a group of more than 12 news organizations under what
is commonly known as Florida's "Government in the Sunshine" law.  Based
on a recommendation by the Florida Department of Law Enforcement, the
news organizations contracted with Ontrack(R) DataTrail(TM) electronic
discovery services to provide an impartial evaluation of the hard drives
in question.  Under the agreement, Ontrack DataTrail consultants will
capture and perform a full forensic analysis on the two mirror images of
the drives based on the specifications provided by the group of news
organizations.  Typical computer forensic activity includes determining
whether or not information has been deleted, as well as reviewing the
times and dates of file modifications for details about formatting
attempts. 
http://www.businesswire.com/cgi-bin/f_headline.cgi?bw.080101/212132395

6,000 attempted hacks a week gets home user a bit annoyed "Sh-tbox 2K"
was trying - without much success - to get inside Wolfgang
Mueller-Leydig's home computer.  It was 8.47am on July 21, about an hour
and a half since Leydig had logged the last hacking attempt on his PC. 
Although it made him angry, it wasn't a surprise.  He was used to it by
now.  Since installing personal firewall software on his home PC a few
years ago, he had watched the number of hacking attempts on his dial-up
OptusNet account soar past 2,000 a week.  Most visits appeared to be
from scanners - automated programs searching the Internet for
unprotected PCs. 
http://www.smh.com.au/news/0108/03/biztech/biztech19.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
The Nissan Sentra
Everything but compact
http://NissanDriven.com
http://us.click.yahoo.com/3vsIKC/txlCAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT