[iwar] [NewsBits] NewsBits - 08/08/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-08-08 20:38:18


Return-Path: <sentto-279987-1567-997328300-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 08 Aug 2001 20:39:19 -0700 (PDT)
Received: (qmail 5653 invoked by uid 510); 9 Aug 2001 02:40:28 -0000
Received: from n31.groups.yahoo.com (216.115.96.81) by 204.181.12.215 with SMTP; 9 Aug 2001 02:40:28 -0000
X-eGroups-Return: sentto-279987-1567-997328300-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by hp.egroups.com with NNFMP; 09 Aug 2001 03:38:20 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_1); 9 Aug 2001 03:38:19 -0000
Received: (qmail 60182 invoked from network); 9 Aug 2001 03:38:19 -0000
Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 9 Aug 2001 03:38:19 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 9 Aug 2001 03:38:18 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10695 for iwar@onelist.com; Wed, 8 Aug 2001 20:38:18 -0700
Message-Id: <200108090338.UAA10695@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 8 Aug 2001 20:38:18 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 08/08/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

August 8, 2001

Five arrested in $28 million Net fraud case in China Police arrested
five people in what could be China's biggest yet Internet get-rich-quick
scam, involving $28.25 million, the official Xinhua news agency said
Wednesday.  Lin Jiexiong and Zhang Guiling were trying to withdraw money
from a bank in Guangzhou and were carrying $43,000 on July 5 when police
took them into custody, where they remain, Xinhua said.  Three others
were arrested on the same day.  Through a front company called Shenlong
Shuma, or ``Digital Dragon,'' the group told people they could earn
money by clicking on advertisements on the company's website if they
first bought a membership card for 380 yuan ($46), Xinhua said. 
http://www.siliconvalley.com/docs/news/tech/010498.htm

"Mad Wing" cyber girl gang arrested Police on Tuesday arrested five
teenage girls who are members of a virtual motorcycle gang formed via
the Internet, on suspicion of assaulting a member in June who tried to
leave the group.  Those who were arrested are the 16-year-old gang
leader living in Aichi Prefecture, central Japan, and four girls aged 16
to 18 living in Tokyo and neighboring Chiba and Kanagawa prefectures,
the police said.  Their names are being withheld under the Juvenile Law. 
http://www.japantoday.com/e/?content=3Dnews&cat=3D2&id=3D51700

Code Red II worm may have hit in Japan At least 200 computer servers in
Japan may have been infected by the Code Red II worm, including some
police computers, Kyodo news agency reported Wednesday.  The National
Police Agency (NPA) was quoted by Kyodo as saying that there were signs
in its server of the worm, which has caused havoc around the world but
has not previously been reported in Japan. 
http://www.siliconvalley.com/docs/news/tech/025380.htm

Code Red II worms its way deeper into Internet
http://www.siliconvalley.com/docs/news/tech/077811.htm
http://www.cnn.com/2001/TECH/internet/08/08/code.red.II/index.html

PDF files may carry Peachy virus Adobe's popular PDF file format--known
to anyone who's ever called up a tax form on the IRS Web site--has
generally been considered immune to viruses.  But a new virus carried by
programs embedded in PDF files raises concerns that the format itself
could become susceptible.  On Tuesday morning, Network Associates'
McAfee antivirus division became aware of the first virus--known as
"Peachy" --that uses PDF to spread, said Vincent Gullotto, senior
director of McAfee's Avert group.  Fortunately, those who are simply
viewing a PDF, or Portable Document Format, file aren't vulnerable. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5095366,00.html
http://www.newsbytes.com/news/01/168802.html
http://www.theregister.co.uk/content/56/20883.html

Federal judges protest computer monitoring from Washington Some federal
judges are protesting the monitoring of their computers by Washington
managers concerned about personal Internet use.  The judges of the 9th
U.S.  Circuit Court of Appeals in San Francisco claim the practice is
illegal.  They are pressing to get it stopped, and the Supreme Court
chief justice and other judges will consider the request next month.  To
demonstrate their discontent, judges of the 9th Circuit ordered staff to
disable monitoring software in May.  The weeklong shutdown affected
10,000 court employees in the Circuit, which covers nine states and two
territories, and two other court districts. 
http://www.siliconvalley.com/docs/news/tech/029545.htm
http://www.wired.com/news/politics/0,1283,45936,00.html

FBI chief Mueller lied to Senate about key-logging New FBI chief Robert
Mueller's testimony before the US Senate during his confirmation hearing
last week, to the effect that he had no understanding of key-logging
technology, sounded very wrong to us.  We were hoping that he was just
exhibiting naivet=E9 when, under questioning from US Senator Maria
Cantwell (Democrat,Washington State) about the FBI's prosecution of
mobster Nicodemo Scarfo, Jr.  by means of a black-bag job involving a
key logger, Mueller claimed that he's "not familiar with that new
technology, and [had] not had occasion to use it in [his] district."
http://www.theregister.co.uk/content/6/20894.html

FBI Under Fire for Key Logger System
http://www.techtv.com/news/politicsandlaw/story/0,24195,3341242,00.html

Hacking course heads to Australia Australian e-commerce security company
eSec has partnered with U.S.-based security-software developer and
trainer Foundstone to bring Foundstone's Ultimate Hacking: Hands On
course Down Under.  "It's not an issue of demand, it's an issue of
supply," said Foundstone Chief Technical Officer Stuart McClure. 
Asia-Pacific may be 18 months behind the United States in terms of
security training and education abilities, but demand in the region for
such skills has already caught up, according to McClure.  "We can't keep
up with the demand...We get two or three legitimate requests out of
Asia-Pacific every week."
http://news.cnet.com/news/0-1003-200-6815561.html

McAfee files patents for security as a service McAfee has filed a patent
for delivering security software as a service over the Web - a move that
is almost certain to stir up controversy in the anti-virus biz.  The
patent, described as a "method and system for securing, managing or
optimising a personal computer", covers the firm's "software-
as-a-service" technology and subscription-based business model. 
http://www.theregister.co.uk/content/56/20872.html

Wireless security is even flakier than we thought Security researchers
have published details of the weaknesses in encryption techniques widely
used to secure wireless networks.  The root cause of the gaping security
holes derive from flaws in the key- scheduling algorithm used by the
Wired Equivalent Privacy (WEP) protocol, which is part of the 802.11
wireless networking standard.  Wireless security vulnerabilities have
been widely publicised before but the difference with this flaw is that
it might be far easier to exploit.  EE Times reports that a passive
ciphertext attack, based on the theoretical groundwork laid by the
researchers, would allow someone with a wireless LAN connection to
retrieve a security key in less than 15 minutes. 
http://www.theregister.co.uk/content/55/20877.html

Are 'white hat' hackers under seige? COMMENTARY--As I write this, Dmitry
Sklyarov is free on bail.  Theoretically, the Russian programmer's July
16 arrest at Def Con in Las Vegas should have been a slam-dunk by the
Justice Department.  After all, Sklyarov was speaking at the convention,
promoting a tool that could break the copyright protection in Adobe's
eBook software and allow pirated manuscripts to become available on the
Internet.  But there's much more to it.  That's why I agree with Adobe
and the Electronic Freedom Foundation: Sklyarov should be allowed to go
home to Russia. 
http://www.zdnet.com/zdnn/stories/comment/0,5859,2802434,00.html

Dmitry Sklyarov Speaks
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3341116,00.html

I-Bomb The rapidly approaching ubiquity of technology and its inevitable
but rarely discussed terroristic use demand for immediate exploration
and development of technology disruption devices.  In the ensuing world
dominated by technology and information, the true culmination of power
will rest not with the institution controlling the information but the
organization, group, or individual capable of disabling, altering, or
destroying the underlying support structure of information: electricity,
telecommunications, and computers. 
http://www.eiu.org/experiments/i-bomb/info.html
http://www.eiu.org/experiments/i-bomb/tech_killed.html


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Small business owners...
Tell us what you think!
http://us.click.yahoo.com/vO1FAB/txzCAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT