Return-Path: <sentto-279987-2581-1002000181-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 01 Oct 2001 22:27:10 -0700 (PDT) Received: (qmail 15153 invoked by uid 510); 2 Oct 2001 05:25:00 -0000 Received: from n29.groups.yahoo.com (216.115.96.79) by 204.181.12.215 with SMTP; 2 Oct 2001 05:25:00 -0000 X-eGroups-Return: sentto-279987-2581-1002000181-fc=all.net@returns.onelist.com Received: from [10.1.1.221] by n29.groups.yahoo.com with NNFMP; 02 Oct 2001 05:24:52 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 2 Oct 2001 05:23:01 -0000 Received: (qmail 83565 invoked from network); 2 Oct 2001 05:23:01 -0000 Received: from unknown (10.1.10.27) by 10.1.1.221 with QMQP; 2 Oct 2001 05:23:01 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 2 Oct 2001 05:24:51 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA31880 for iwar@onelist.com; Mon, 1 Oct 2001 22:24:50 -0700 Message-Id: <200110020524.WAA31880@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 1 Oct 2001 22:24:50 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 10/01/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit October 1, 2001 FTC shuts thousands of deceptive Web sites A U.S. court has shut down thousands of Web sites that diverted Web surfers from intended destinations and bombarded them with ads for pornography and gambling, the U.S. government said on Monday. http://www.siliconvalley.com/docs/news/reuters_wire/1531722l.htm http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,5097645,00.html http://news.cnet.com/news/0-1005-200-7371736.html http://www.newsbytes.com/news/01/170695.html http://www.msnbc.com/news/636443.asp http://www.cnn.com/2001/TECH/internet/10/01/internet.scams.reut/index.html http://www.usatoday.com/life/cyber/tech/2001/10/1/ftc-sites.htm Identity Thief Gets 2 Years in Fraud A Webbers Falls woman was sentenced Friday to two years in prison for a bank fraud conviction connected to an identity theft scheme that the defense claimed was the product of her mental illness. Rebecca Zoe Brown, 35, was also ordered by U.S. District Judge Sven Erik Holmes to pay $71,021.13 in restitution to various banks and credit card companies. http://www.antionline.com/showthread.php?threadid=115384 Another Thing to Fear: ID Theft It's the largest police investigation in history, with a few thousand sleuths hot on the trail of just 19 suspected hijackers, and about 500 people already in jail. But the FBI said in a statement on Thursday that "attempts to confirm the true identities of these individuals are still under way." http://www.wired.com/news/conflict/0,2100,47201,00.html We've cracked into bin Laden's bank - UK hackers A group of British hackers has claimed to have broken into the systems of banks in the Sudan, and extracted information on accounts related to Osama's bin Laden terrorist network. Young Intelligent Hackers Against Terror (Yihat) claims to have obtained data on accounts held by members of Al Qaeda, including bin Laden, held at the AlShamal Islamic Bank. http://www.theregister.co.uk/content/55/21966.html Hijackers' e-mails sifted for clues Federal authorities believe that some of the 19 hijackers involved in the Sept. 11 terrorist attacks were using computers in all-night Kinko's stores and cybercafes in South Florida to coordinate their activities in the weeks before the assaults. Investigators have amassed what they described as a "substantial" amount of e-mail traffic among the hijackers. Some of the messages were exchanged in a mix of English and Arabic. http://www.usatoday.com/life/cyber/tech/2001/10/1/hijackers-e-mails-sifted.htm FBI Releases List of Top 20 Computer Risks The FBI on Monday released a list of the top 20 computer security vulnerabilities most likely to leave the Internet vulnerable to attacks from hackers. The items on the list include general vulnerabilities and known security holes in the Windows and UNIX operating systems that are most often exploited by malicious coders, according to the System Administration, Networking, and Security Institute (SANS), a non-profit organization that helped the FBI compile the list. http://www.techtv.com/news/hackingandsecurity/story/0,24195,3350889,00.html http://www.msnbc.com/news/636411.asp http://www.cnn.com/2001/TECH/internet/10/01/computer.security.ap/index.html Security Firm Warns Of Bogus Nimda 'Fix' - Update Computer security company SecurityFocus is telling network administrators that it has nothing to do with an e- mail and file attachment that claims to be a fix for the recent Nimda worm. Instead, the attachment appears to be repackaged version of a older Trojan program designed to spy on those who run the software, says the San Mateo, Calif., clearinghouse for information on such security threats.. http://www.newsbytes.com/news/01/170691.html Nimda comeback thwarted A resurgence of the Nimda worm failed to materialize Friday, leaving unfulfilled warnings that several security companies made this week. The e-mail component of the worm, which sends infected messages to each entry in an infected computer's Outlook address book, reactivates 10 days after the original infection. http://www.zdnet.com/zdnn/stories/news/0,4586,5097617,00.html http://www.usatoday.com/life/cyber/zd/zd1.htm Nimda worms its way to top of September virus chart http://www.theregister.co.uk/content/56/21946.html Ban Outlook--now http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2814683,00.html Experts demolish MS anti-Apache FUD http://www.theregister.co.uk/content/35/21967.html Bush names Clarke to cyberterrorism team A holdover from the Clinton administration will oversee "cybersecurity" for President Bush, while a retired Army general will coordinate anti-terror efforts with military and intelligence counterparts. Richard Clarke, who currently heads the government's counter- terrorism team, will direct efforts to protect the nation's information infrastructure from attack, three administration officials said Sunday. http://www.cnn.com/2001/TECH/internet/10/01/clarke.appointment.ap/index.html U.S. Supreme Court To Hear Internet Porn Cases The U.S. Supreme Court takes up a pair of controversial laws designed to curb Internet pornography as it begins its October 2001 session today. The eldest of those cases is the Child Pornography Prevention Act of 1996, a law that would make it a federal crime to post online computer-generated child pornography. http://www.newsbytes.com/news/01/170674.html U.S. networks run big risk of cyber-strikes, experts assert. America's next Pearl Harbor, many experts predicted, would be a cyber- attack, a high-tech strike on the nation's critical computer systems, such as those controlling power grids or financial networks. http://www.siliconvalley.com/docs/news/depth/cyber100101.htm http://www.govexec.com/dailyfed/1001/100101j1.htm Cybersecurity called key to homeland defense http://www.fcw.com/fcw/articles/2001/1001/news-cyber-10-01-01.asp The new super sleuth Government seeking to loosen rules on using new high-tech tools. As President Bush and Attorney General John Ashcroft seek to loosen the legal restraints on domestic surveillance, law enforcement already possesses the electronic tools to eavesdrop on private phone conversations and e-mail exchanges and monitor the Web wanderings of everyday citizens. http://www.siliconvalley.com/docs/news/depth/snoop093001.htm http://www.newsbytes.com/news/01/170694.html http://www.usatoday.com/hlead.htm Cybersnooping for Sounds and Images, Not Suspects Benjamin Franklin, the first electric performance artist, wrote that those who "give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." As the debate over the balancing of personal freedom and public safety heats up, Alex Galloway has begun a computer-art project that provides food for thought. http://www.nytimes.com/2001/10/01/arts/design/01ARTS.html Straw slams civil liberties lobby Foreign secretary Jack Straw launched a scathing attack on the civil liberties lobby in an interview on Radio 4 on Friday. Mr Straw, who pushed through some pretty Draconian laws while home secretary, complained to the Today programme that he was held back by civil liberties groups and was forced to water down police and secret service surveillance powers (in the RIP and Terrorism Acts, to name two). http://www.theregister.co.uk/content/6/21960.html EU States Agree To Pass Anti-Spam Law The 15 member states of the European Union agreed today to pass a new law banning the use of unsolicited e-mail or "spam," in promoting financial services. http://www.newsbytes.com/news/01/170700.html PC Viruses--Latest Terrorism? One week to the minute after the tragedy of Sept. 11, the computer virus known as "Nimda" was released into cyberspace. Six days later came the "Vote" worm, which arrived in the form of an e-mail ostensibly asking for your opinion on whether the U.S. should go to war. The timing and nature of these viruses ring suspicious. Could we be looking at an assault on computers? http://netbusiness.netscape.com/fsb/features/sp_f_092801_1.psp There's an E-Scam Born Every Minute Thanks to a court ruling, however, the feds now have greater freedom to put online con artists out of business. On Sept. 13, while the world's attention was fixed on the aftermath of terrorist attacks on the U.S., a federal appeals court handed down a ruling that received scant attention but will have an immense impact on online investment frauds. http://businessweek.com/technology/content/sep2001/tc20010921_9214.htm We Hear You, We Hack You, We See You Many weapons will be deployed in America's new war on terrorism, but none may be more important than the technology that can track and eavesdrop on terrorists. Surveillance solutions from facial recognition camera networks that can search for wanted persons to hacking and data-mining software that can find and read their e-mail are already being called up. http://forbes.com/technology/futuretech/2001/09/25/0925fightbackindex.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST