[iwar] [NewsBits] NewsBits - 09/28/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-10-01 22:21:01


Return-Path: <sentto-279987-2579-1002000062-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 01 Oct 2001 22:23:11 -0700 (PDT)
Received: (qmail 14882 invoked by uid 510); 2 Oct 2001 05:21:10 -0000
Received: from n7.groups.yahoo.com (216.115.96.57) by 204.181.12.215 with SMTP; 2 Oct 2001 05:21:10 -0000
X-eGroups-Return: sentto-279987-2579-1002000062-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by n7.groups.yahoo.com with NNFMP; 02 Oct 2001 05:21:02 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 2 Oct 2001 05:21:02 -0000
Received: (qmail 44470 invoked from network); 2 Oct 2001 05:21:01 -0000
Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 2 Oct 2001 05:21:01 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 2 Oct 2001 05:21:01 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA31818 for iwar@onelist.com; Mon, 1 Oct 2001 22:21:01 -0700
Message-Id: <200110020521.WAA31818@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 1 Oct 2001 22:21:01 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 09/28/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

September 28, 2001

Nimda Returns File-destroying worm starts spreading again.  Nimda, the
fast-spreading, file-destroying worm that first surfaced September 18,
was programmed to start flooding email inboxes again starting Friday
moring.  According to the federally funded Computer Emergency Response
Team (CERT) Coordination enter at Carnegie Mellon University, the Nimda
worm contains code that will cause an infected host to send infected
email messages every 10 days. 
http://www.techtv.com/news/story/0,24195,3350470,00.html

News Focus: Nimda worm attacks the Web
http://news.zdnet.co.uk/story/0,,t269-s2095594,00.html
Nimda resurgence falls flat
http://news.cnet.com/news/0-1003-200-7340137.html
Nimda appears quiet after 10-day 'sleep'
http://www.cnn.com/2001/TECH/internet/09/28/nimda.regeneration.idg/index.html

Vote Worm Resurfaces As Anti_TeRRoRisM.exe Several antivirus software
vendors issued overnight warnings about a rework of the Vote virus that
appeared earlier this week, but early indications are that the new
version - known as Vote.B or the Anti_TeRRoRisM.exe worm - is spreading
on a limited scale.  http://www.newsbytes.com/news/01/170619.html

Odigo Clarifies Attack Messages An official at Odigo today made a more
substantial comment on warnings the instant messaging firm received
prior to the Sept.  11 terrorist attacks.  The company's vice president
of sales and marketing acknowledged that messages warning of attacks
were received but would not comment on the contents of the messages. 
http://www.newsbytes.com/news/01/170653.html

Hackers urged not to deface Middle East Web sites Cyberangels, an
offshoot of the Guardian Angels groups that patrol city neighborhoods to
prevent crime, has launched an effort to protect the Internet from
hackers angry at Saudi-born militant Osama bin Laden, the prime suspect
in the Sept.  11 attacks on New York and Washington. 
http://www.siliconvalley.com/docs/news/tech/013045.htm
http://www.usatoday.com/life/cyber/tech/2001/09/28/cyberangels-against-hacki
ng.htm

Regulators find no sign of irregular trading before attack.  After
almost two weeks of investigation, financial regulators around the world
have found no hard evidence that people with advance knowledge of the
terrorist attacks in New York and Washington used that information to
profit in the international securities markets. 
http://www.siliconvalley.com/docs/news/tech/025121.htm

Trial of China Web dissidents opens The trial of four Chinese
intellectuals accused of subversion for their links to a pro-democracy
forum active on the Internet began in Beijing on Friday, a defense
lawyer said. 
http://www.siliconvalley.com/docs/news/reuters_wire/1523775l.htm

Senate Considers a Computer Army for Crisis Local computer buffs are
saying the Sept.  11 World Trade Center attacks showed how desperately
unprepared the city was from an information technology standpoint - and
Washington is set to do something about it. 
http://www.nypost.com/business/33118.htm

Home Office backs seven-year data retention laws The government appears
to have abandoned its opposition to calls for communications data to be
held for up to seven years.  The Home Office is planning to introduce
new surveillance laws that would allow communications traffic data to be
stored for up to seven years. 
http://news.zdnet.co.uk/story/0,,t269-s2096285,00.html

Beware the Pulsing Zombies Distributed denial of service attacks, one of
the most difficult security risks to guard against, could become even
harder to detect with the development of tools that turn agents on and
off during an attack.  So called 'pulsing zombies' which sounds like
something from the Night of the Living Dead) will be difficult to detect
as they will not be always active, making the isolation and removal of
malware from infected machines even harder. 
http://www.theregister.co.uk/content/55/21930.html

Federal Agencies Unprepared For New E-Govt.  Law Many federal agencies
are at risk of missing an October 2003 deadline for complying with a new
law designed to facilitate e-government, according to a General
Accounting Office (GAO) report issued today. 
http://www.newsbytes.com/news/01/170662.html

.Net may lead to fewer viruses Antivirus vendors will have to
significantly redesign their products in order to address risks of
malicious code arising from the release of Microsoft's .Net platform. 
The change of computing model to Web services that comes with .Net will
almost undoubtedly create fresh infection mechanisms for virus writers
to exploit.  http://www.theregister.co.uk/content/56/21929.html

Experts to study security of Internet naming system The Internet's top
standards-setting body plans to focus on the security of the online
addressing system at its annual meeting in November, pushing aside other
issues such as new domain names. 
http://www.siliconvalley.com/docs/news/reuters_wire/1525426l.htm

ICANN - Internet Community Supports Meeting Refocus
http://www.newsbytes.com/news/01/170644.html

Crypto doesn't kill--people do In June 1991, Phil Zimmerman sent the
first release of Pretty Good Privacy, an e-mail encryption program he
developed, to a couple of buddies who uploaded the code to the Internet. 
Within a very short time, PGP had been ported to nearly every computer
platform out there in many different foreign languages as people latched
onto something that would help them maintain their electronic privacy in
an ever-more-connected world. 
http://news.cnet.com/news/0-1272-210-7320099-1.html

Computer Security Is Like Military Intelligence A Contradiction.  As
banks of all sizes push their on-line treasury management systems
farther down the corporate food chain, their risk of being hacked rises,
because the systems of smaller companies are typically less well-
protected than bank systems. 
http://www.antionline.com/showthread.php?threadid=115118


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST