Return-Path: <sentto-279987-2472-1001702680-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Fri, 28 Sep 2001 11:46:08 -0700 (PDT) Received: (qmail 1431 invoked by uid 510); 28 Sep 2001 18:44:55 -0000 Received: from n3.groups.yahoo.com (216.115.96.53) by 204.181.12.215 with SMTP; 28 Sep 2001 18:44:55 -0000 X-eGroups-Return: sentto-279987-2472-1001702680-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by hj.egroups.com with NNFMP; 28 Sep 2001 18:44:40 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 28 Sep 2001 18:44:40 -0000 Received: (qmail 70445 invoked from network); 28 Sep 2001 18:44:39 -0000 Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 28 Sep 2001 18:44:39 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 28 Sep 2001 18:44:38 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id LAA11739 for iwar@onelist.com; Fri, 28 Sep 2001 11:44:38 -0700 Message-Id: <200109281844.LAA11739@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 28 Sep 2001 11:44:38 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 09/26/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit September 26, 2001 Accused Of Backing Bin Laden, Chicagoans File Suit A "poison pen" e-mail that accused two local businessmen of being supporters of suspected terrorist Osama Bin Laden is cutting a wide swath through a Chicago-area community. On Monday, Irshad Khan and his uncle, Jafar Khan, filed a defamation lawsuit, saying an e-mail being forwarded among area residents earlier this month inaccurately alleged that the two kept a poster of Bin Laden on the wall of the Mobil gas station they own in Naperville, Ill. http://www.newsbytes.com/news/01/170540.html Nimda needs harsh disinfectant Cleaning up after last week's fast-spreading Nimda worm could prove to be harder and more time-consuming for users than it has been after other malicious software attacks. Companies that aren't careful could be reinfected and leave back doors open for future exploitation, users and analysts said. http://www.cnn.com/2001/TECH/internet/09/26/nimda.clean.up.idg/index.html Nimda Called Most Serious Internet Attack on Business The Nimda computer worm won't go away. The worm, which surfaced in the U.S. last week, has wiggled into more than 1 million computers in the USA, Europe and Asia, clogging Internet traffic and resulting in computer shutdowns for some firms. "It's the most serious Internet attack on the business community," says Jack Danahy, vice president of server security at WatchGuard Technologies. http://www.usatoday.com/life/cyber/tech/2001/09/26/nimda-serious-net-threat.htm Claranet faces action over 'unlicensed' software The Business Software Alliance is taking legal action against Claranet and four other UK companies. Internet service provider Claranet is among five UK companies facing legal action from the Business Software Alliance over alleged use of unlicensed software. The Alliance said it has settled similar claims against another five organisations for more than =A3125,000. http://news.zdnet.co.uk/story/0,,t269-s2096129,00.html China delays Internet dissidents trial The trial of four Chinese intellectuals accused of subversion for their links to a pro-democracy forum active on the Internet has been delayed until Friday, a lawyer for one of the accused said. http://www.siliconvalley.com/docs/news/reuters_wire/1518128l.htm A TV Plea to Patriot Hackers A new TV public service announcement targets U.S. computer hacktivists with a blunt message: Uncle Sam wants you to help fight the war on terrorism. But the spot, which organizers hope to begin airing nationwide next week on major networks, will warn that misguided patriotic efforts from software experts can hurt the cause. http://www.wired.com/news/conflict/0,2100,47099,00.html Expert predicts terrorism-related cyber attacks The threat of a cyber attack on the Internet and on critical infrastructures such as the electricity or transportation sectors that depend on the Internet has heightened following this month's terrorist attacks on the United States, a security expert acknowledged Wednesday. http://www.govexec.com/dailyfed/0901/092601td1.htm Lawmaker Sounds Computer Security Warning Note The recent terrorist attacks on the World Trade Center and the Pentagon presage the potential of severe cyber-sorties on the nation's and government's critical IT infrastructures, and now is not the time for Congress to delay in doing their part to fabricate a strong online defense, an influential House subcommittee chairman today said. http://www.newsbytes.com/news/01/170534.html U.K. E-Commerce Minister Calls For Tighter Internet Security Douglas Alexander, the U.K. e-commerce minister, spoke today of the need for a heightened awareness of Internet security, following the terrorist attacks in America two weeks ago. http://www.newsbytes.com/news/01/170538.html Latest Net rumor whips up a new kind of virus scare The latest e-mail fraud making the rounds warns that after the attacks on New York and Washington, there's now a bio-terror threat in the mail. The Internet rumor mill has been in hyper-drive ever since the Sept. 11 terror attacks, filling e-mail in-boxes around the country with tales of supposed threats or sinister plots. http://www.siliconvalley.com/docs/hottopics/attack/hoax092601.htm E-mail rumor trackers are busier than ever http://www.usatoday.com/life/cyber/tech/2001/09/25/ebrief.htm Hoax Watch Don't be fooled by phony donation sites. Rumors spread fast in the digital age, and it's important to check your sources before believing the online hype. Here are some useful, constantly updated sites that dispel Web myths both serious and silly. http://www.techtv.com/cybercrime/features/story/0,23008,3349803,00.html Wiretap Bill Gets Third Degree President Bush's proposal to permit Internet surveillance without a court order drew sharp questions from senators on Tuesday. Members of the Senate Judiciary committee appeared divided over whether the Mobilization Against Terrorism Act (MATA), which the Justice Department sent to Congress this week, was a vital anti-terrorism measure or an infringement of privacy. http://www.wired.com/news/conflict/0,2100,47111,00.html Congress Slows Surveillance Changes http://www.fcw.com/fcw/articles/2001/0924/web-wire-09-26-01.asp Bush administration proposes sweeping antiterrorism laws John Ashcroft has asked Congress to approve a sweeping series of new laws intended, in part, to make it easier for law enforcement agencies to track communications over telephone and computer networks. http://www.cnn.com/2001/TECH/industry/09/26/bush.laws.idg/index.html Bush admin to make hacking a terrorist offence US Attorney General John Ashcroft went to Capitol Hill Monday afternoon to sell the Bush Administration's new slew of anti-terror laws to the House Judiciary Committee. http://www.theregister.co.uk/content/6/21854.html http://www.antionline.com/showthread.php?threadid=3D114569 EFF - Hackers, Spammers Could Face Life Under Terrorism Law http://www.newsbytes.com/news/01/170523.html Proposal to limit crypto draws heat A new call for limits on encryption technology is finding weak political support in the United States, despite a looming clandestine war against terrorism that will most likely hinge on the effectiveness of police and military intelligence. http://www.zdnet.com/zdnn/stories/news/0,4586,5097498,00.html Experts: Don't hand out 'key' to the Net Lawmakers may be asked to give the FBI a "software key" to encryption technology that would allow the agency to unlock secret Internet messages but experts warn the measure would impair commerce and violate privacy right without deterring terrorism. http://www.zdnet.com/zdnn/stories/news/0,4586,2814833,00.html http://www.siliconvalley.com/docs/news/tech/050272.htm http://www.usatoday.com/life/cyber/tech/2001/09/26/attacks-rekindle-encryption-debate.htm Terrorism fears risk sapping EU privacy rules America's war against global terrorism risks jeopardising hard-won European laws on protecting personal data if governments go for tougher action by law enforcement authorities, civil liberties groups say. http://www.siliconvalley.com/docs/news/tech/083797.htm German Data Privacy Advocates Fear Softened Laws http://www.newsbytes.com/news/01/170520.html Navy warns of Web=92s hazards for employees=92 kids The Navy=92s Safekids program is using the Internet to help educate the service=92s employees about the risks that the Web poses to their children. Most parents would not leave their children in a strange neighborhood by themselves or knowingly allow them to mingle with adult strangers. But leaving a child alone at a computer often equates to the same thing, said an agent with the Naval Criminal Investigative Service. http://www.gcn.com/vol1_no1/daily-updates/17194-1.html Publishers trounce Universal in license fight Music publishers on Wednesday won an important legal ruling against the world's largest record label in a case that could set rules for streaming copyrighted songs over the Internet. http://news.cnet.com/news/0-1005-200-7312624.html Hanson Sues Music Locker Service Over Copyright Add boy band Hanson to the list of songsters turning to the courts to make MP3.com pay up for tunes it once copied to create the online music locker service known as My.MP3.com. http://www.newsbytes.com/news/01/170530.html Net identity plan unveiled Sun Micro, others line up to offer secure network identity services. Firing a shot across Microsoft's bow, a group of companies from the information technology industry as well as others unveiled an alliance Wednesday for managing the "digital identities" of computer network users. http://cnnfn.cnn.com/2001/09/26/technology/identity/ http://www.wired.com/news/business/0,1367,47139,00.html http://www.theregister.co.uk/content/5/21894.html Airport Privacy vs. Airport Security Is it necessary for X-ray machines to look underneath everyone's clothing to increase security? In the current rush for safer airports, one technology has already caused controversy. Full-body X-ray beats a 'pat down'. A full-body X-ray machine can examine every person who comes through an airport checkpoint as an alternative to a pat down. http://www.techtv.com/cybercrime/privacy/story/0,23008,3349475,00.html Faking It Thousands of teenagers look to a website to buy fake identification. But what happens when the website never delivers the goods? It's September and millions of college kids are returning to campus, dorm rooms, and classes. They're also returning to the local bars. http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3345509,00.html Secret codes 'not hidden in Web images' Following reports that bin Laden hides messages in images on the Web, a study has found no evidence that steganography has caught on. A study of more than two million images downloaded from eBay auctions appears to show little evidence that terrorists -- or indeed anybody else -- is using the images to hide encoded messages. http://news.zdnet.co.uk/story/0,,t269-s2096060,00.html http://www.msnbc.com/news/634313.asp Internet Security: We're all responsible Government and business should team up to improve Internet security, ecommerce minister Douglas Alexander said today. Opening the Information security Solution Europe conference in London today, Alexander advised delegates to exercise greater awareness of Internet security, in light of the America terror attacks. http://www.theregister.co.uk/content/55/21887.html Expert: Net security's a losing battle The complexity of the Internet is increasing more rapidly than our ability to secure it, according to Internet security expert Bruce Schneier. At the opening of the annual Information Security Solutions Europe (ISSE) conference in London on Wednesday, Schneier, who is chief technology officer of Counterpane Internet Security, claimed that the problem of Internet security will never be resolved. http://www.zdnet.com/zdnn/stories/news/0,4586,2814883,00.html http://news.zdnet.co.uk/story/0,,t269-s2096121,00.html http://www.theregister.co.uk/content/5/21894.html Clear Sailing Ahead For Internet & IT Security - Experts It may have been a rough year in the Internet and IT security industry, but the word on the show floor in London this morning was positive. Exhibitors at the Information Security Solutions Europe event reported that the shakedown in the industry - which has seen several Internet and IT security firms disappear or simply merge with their competitors - may now be almost over. http://www.newsbytes.com/news/01/170539.html Introduction to Security Policies, Part Two: Creating a Supportive Environment As we concluded the first article of this series, we pointed out that policies in themselves are ineffective; their effectiveness is directly proportional to the support they receive from the organization. Thus it is crucial that the organization be aware of the importance of security policies and create an environment in which security is given a high priority. http://www.securityfocus.com/cgi-bin/infocus.pl?id=3D1473 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:51 PDT