[iwar] [NewsBits] NewsBits - 08/07/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-08-08 20:34:16


Return-Path: <sentto-279987-1566-997328058-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 08 Aug 2001 20:37:11 -0700 (PDT)
Received: (qmail 5561 invoked by uid 510); 9 Aug 2001 02:36:26 -0000
Received: from n31.groups.yahoo.com (216.115.96.81) by 204.181.12.215 with SMTP; 9 Aug 2001 02:36:26 -0000
X-eGroups-Return: sentto-279987-1566-997328058-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by hp.egroups.com with NNFMP; 09 Aug 2001 03:34:18 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_1); 9 Aug 2001 03:34:18 -0000
Received: (qmail 33535 invoked from network); 9 Aug 2001 03:34:17 -0000
Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 9 Aug 2001 03:34:17 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 9 Aug 2001 03:34:17 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10632 for iwar@onelist.com; Wed, 8 Aug 2001 20:34:16 -0700
Message-Id: <200108090334.UAA10632@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 8 Aug 2001 20:34:16 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 08/07/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

August 7, 2001

Meaner Code Red II worm appears in Asia A meaner version of the Code Red
Internet worm has made its first appearance in Asia, infesting dozens of
computers in China, security experts said on Tuesday.  South Korea was
trying to determine whether it was this pernicious worm which had
attacked government computers and Hong Kong also reported at least one
confirmed infection. 
http://www.siliconvalley.com/docs/news/reuters_wire/1393232l.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,2802155,00.html

Damage from Code Red worms continuing to add up
http://www.siliconvalley.com/docs/news/tech/077811.htm Code Red
Continues To Eat Away At Qwest DSL
http://www.newsbytes.com/news/01/168777.html 'Code Red II' slows parts
of the Net
http://www.cnn.com/2001/TECH/internet/08/07/code.red.two/index.html

Gov't says national security at risk if keystroke logger is detailed The
Justice Department claims that revealing details about how it bugged the
computer of an accused bookie could threaten national security. 
Disclosing material about the ``key logger system'' the FBI installed on
the computer of Nicodemo S.  Scarfo Jr.  would hurt ongoing
investigations of foreign intelligence agents and endanger the lives of
U.S.  agents, according to court documents filed by the government.  The
Justice Department claims the system must remain secret to keep hostile
intelligence officers from employing ``counter- surveillance tactics to
thwart law enforcement.''
http://www.siliconvalley.com/docs/news/tech/012145.htm

Judge says FBI must reveal computer snooping technique
http://www.siliconvalley.com/docs/news/tech/031040.htm
http://www.usatoday.com/life/cyber/tech/2001-08-07-fbi-surveillance-trial.htm

Feds: Spy Tool Is a Secret
http://www.wired.com/news/politics/0,1283,45851,00.html

Schoolboy's book on ethical hacking an online hit The Unofficial Guide
to Ethical Hacking has achieved pre-publication orders of 5,000 copies
on the Internet.  A book on ethical computer hacking written by a 16-
year-old Indian schoolboy has sold 5,000 copies online, before it
reached the shelves of bookshops around the world.  The author, Ankit
Fadia, wrote the book at the tender age of 14, and is the youngest
author for Macmillan publishers in the company's 110 years of history. 
The Unofficial Guide to Ethical Hacking runs into 620 pages, and gives
an in-depth look into hacking techniques, endorsing ethical hacking as a
"vaccination" for "fighting evil with evil". 
http://news.zdnet.co.uk/story/0,,t269-s2092686,00.html

Study backs CIA experiment with tech firm The CIA's experiment with
In-Q-Tel, a venture capital firm it started in 1999 to develop
private-sector technologies for use in the intelligence world, ''makes
good business sense'' and should continue, a congressionally mandated
study said Tuesday.  But the Central Intelligence Agency needs to
streamline its bureaucratic process for approving new technologies for
its classified computer system to make it quicker and easier to get them
in the door at the spy agency, the report said. 
http://www.siliconvalley.com/docs/news/tech/030429.htm


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Small business owners...
Tell us what you think!
http://us.click.yahoo.com/vO1FAB/txzCAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT