Return-Path: <sentto-279987-1567-997328300-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 08 Aug 2001 20:39:19 -0700 (PDT) Received: (qmail 5653 invoked by uid 510); 9 Aug 2001 02:40:28 -0000 Received: from n31.groups.yahoo.com (216.115.96.81) by 204.181.12.215 with SMTP; 9 Aug 2001 02:40:28 -0000 X-eGroups-Return: sentto-279987-1567-997328300-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by hp.egroups.com with NNFMP; 09 Aug 2001 03:38:20 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_1); 9 Aug 2001 03:38:19 -0000 Received: (qmail 60182 invoked from network); 9 Aug 2001 03:38:19 -0000 Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 9 Aug 2001 03:38:19 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 9 Aug 2001 03:38:18 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10695 for iwar@onelist.com; Wed, 8 Aug 2001 20:38:18 -0700 Message-Id: <200108090338.UAA10695@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 8 Aug 2001 20:38:18 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 08/08/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit August 8, 2001 Five arrested in $28 million Net fraud case in China Police arrested five people in what could be China's biggest yet Internet get-rich-quick scam, involving $28.25 million, the official Xinhua news agency said Wednesday. Lin Jiexiong and Zhang Guiling were trying to withdraw money from a bank in Guangzhou and were carrying $43,000 on July 5 when police took them into custody, where they remain, Xinhua said. Three others were arrested on the same day. Through a front company called Shenlong Shuma, or ``Digital Dragon,'' the group told people they could earn money by clicking on advertisements on the company's website if they first bought a membership card for 380 yuan ($46), Xinhua said. http://www.siliconvalley.com/docs/news/tech/010498.htm "Mad Wing" cyber girl gang arrested Police on Tuesday arrested five teenage girls who are members of a virtual motorcycle gang formed via the Internet, on suspicion of assaulting a member in June who tried to leave the group. Those who were arrested are the 16-year-old gang leader living in Aichi Prefecture, central Japan, and four girls aged 16 to 18 living in Tokyo and neighboring Chiba and Kanagawa prefectures, the police said. Their names are being withheld under the Juvenile Law. http://www.japantoday.com/e/?content=3Dnews&cat=3D2&id=3D51700 Code Red II worm may have hit in Japan At least 200 computer servers in Japan may have been infected by the Code Red II worm, including some police computers, Kyodo news agency reported Wednesday. The National Police Agency (NPA) was quoted by Kyodo as saying that there were signs in its server of the worm, which has caused havoc around the world but has not previously been reported in Japan. http://www.siliconvalley.com/docs/news/tech/025380.htm Code Red II worms its way deeper into Internet http://www.siliconvalley.com/docs/news/tech/077811.htm http://www.cnn.com/2001/TECH/internet/08/08/code.red.II/index.html PDF files may carry Peachy virus Adobe's popular PDF file format--known to anyone who's ever called up a tax form on the IRS Web site--has generally been considered immune to viruses. But a new virus carried by programs embedded in PDF files raises concerns that the format itself could become susceptible. On Tuesday morning, Network Associates' McAfee antivirus division became aware of the first virus--known as "Peachy" --that uses PDF to spread, said Vincent Gullotto, senior director of McAfee's Avert group. Fortunately, those who are simply viewing a PDF, or Portable Document Format, file aren't vulnerable. http://www.zdnet.com/zdnn/stories/news/0,4586,5095366,00.html http://www.newsbytes.com/news/01/168802.html http://www.theregister.co.uk/content/56/20883.html Federal judges protest computer monitoring from Washington Some federal judges are protesting the monitoring of their computers by Washington managers concerned about personal Internet use. The judges of the 9th U.S. Circuit Court of Appeals in San Francisco claim the practice is illegal. They are pressing to get it stopped, and the Supreme Court chief justice and other judges will consider the request next month. To demonstrate their discontent, judges of the 9th Circuit ordered staff to disable monitoring software in May. The weeklong shutdown affected 10,000 court employees in the Circuit, which covers nine states and two territories, and two other court districts. http://www.siliconvalley.com/docs/news/tech/029545.htm http://www.wired.com/news/politics/0,1283,45936,00.html FBI chief Mueller lied to Senate about key-logging New FBI chief Robert Mueller's testimony before the US Senate during his confirmation hearing last week, to the effect that he had no understanding of key-logging technology, sounded very wrong to us. We were hoping that he was just exhibiting naivet=E9 when, under questioning from US Senator Maria Cantwell (Democrat,Washington State) about the FBI's prosecution of mobster Nicodemo Scarfo, Jr. by means of a black-bag job involving a key logger, Mueller claimed that he's "not familiar with that new technology, and [had] not had occasion to use it in [his] district." http://www.theregister.co.uk/content/6/20894.html FBI Under Fire for Key Logger System http://www.techtv.com/news/politicsandlaw/story/0,24195,3341242,00.html Hacking course heads to Australia Australian e-commerce security company eSec has partnered with U.S.-based security-software developer and trainer Foundstone to bring Foundstone's Ultimate Hacking: Hands On course Down Under. "It's not an issue of demand, it's an issue of supply," said Foundstone Chief Technical Officer Stuart McClure. Asia-Pacific may be 18 months behind the United States in terms of security training and education abilities, but demand in the region for such skills has already caught up, according to McClure. "We can't keep up with the demand...We get two or three legitimate requests out of Asia-Pacific every week." http://news.cnet.com/news/0-1003-200-6815561.html McAfee files patents for security as a service McAfee has filed a patent for delivering security software as a service over the Web - a move that is almost certain to stir up controversy in the anti-virus biz. The patent, described as a "method and system for securing, managing or optimising a personal computer", covers the firm's "software- as-a-service" technology and subscription-based business model. http://www.theregister.co.uk/content/56/20872.html Wireless security is even flakier than we thought Security researchers have published details of the weaknesses in encryption techniques widely used to secure wireless networks. The root cause of the gaping security holes derive from flaws in the key- scheduling algorithm used by the Wired Equivalent Privacy (WEP) protocol, which is part of the 802.11 wireless networking standard. Wireless security vulnerabilities have been widely publicised before but the difference with this flaw is that it might be far easier to exploit. EE Times reports that a passive ciphertext attack, based on the theoretical groundwork laid by the researchers, would allow someone with a wireless LAN connection to retrieve a security key in less than 15 minutes. http://www.theregister.co.uk/content/55/20877.html Are 'white hat' hackers under seige? COMMENTARY--As I write this, Dmitry Sklyarov is free on bail. Theoretically, the Russian programmer's July 16 arrest at Def Con in Las Vegas should have been a slam-dunk by the Justice Department. After all, Sklyarov was speaking at the convention, promoting a tool that could break the copyright protection in Adobe's eBook software and allow pirated manuscripts to become available on the Internet. But there's much more to it. That's why I agree with Adobe and the Electronic Freedom Foundation: Sklyarov should be allowed to go home to Russia. http://www.zdnet.com/zdnn/stories/comment/0,5859,2802434,00.html Dmitry Sklyarov Speaks http://www.techtv.com/news/hackingandsecurity/story/0,24195,3341116,00.html I-Bomb The rapidly approaching ubiquity of technology and its inevitable but rarely discussed terroristic use demand for immediate exploration and development of technology disruption devices. In the ensuing world dominated by technology and information, the true culmination of power will rest not with the institution controlling the information but the organization, group, or individual capable of disabling, altering, or destroying the underlying support structure of information: electricity, telecommunications, and computers. http://www.eiu.org/experiments/i-bomb/info.html http://www.eiu.org/experiments/i-bomb/tech_killed.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Small business owners... Tell us what you think! http://us.click.yahoo.com/vO1FAB/txzCAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT