[iwar] [NewsBits] NewsBits - 10/01/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-10-01 22:24:50


Return-Path: <sentto-279987-2581-1002000181-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 01 Oct 2001 22:27:10 -0700 (PDT)
Received: (qmail 15153 invoked by uid 510); 2 Oct 2001 05:25:00 -0000
Received: from n29.groups.yahoo.com (216.115.96.79) by 204.181.12.215 with SMTP; 2 Oct 2001 05:25:00 -0000
X-eGroups-Return: sentto-279987-2581-1002000181-fc=all.net@returns.onelist.com
Received: from [10.1.1.221] by n29.groups.yahoo.com with NNFMP; 02 Oct 2001 05:24:52 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 2 Oct 2001 05:23:01 -0000
Received: (qmail 83565 invoked from network); 2 Oct 2001 05:23:01 -0000
Received: from unknown (10.1.10.27) by 10.1.1.221 with QMQP; 2 Oct 2001 05:23:01 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 2 Oct 2001 05:24:51 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA31880 for iwar@onelist.com; Mon, 1 Oct 2001 22:24:50 -0700
Message-Id: <200110020524.WAA31880@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 1 Oct 2001 22:24:50 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 10/01/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

October 1, 2001

FTC shuts thousands of deceptive Web sites A U.S.  court has shut down
thousands of Web sites that diverted Web surfers from intended
destinations and bombarded them with ads for pornography and gambling,
the U.S.  government said on Monday. 
http://www.siliconvalley.com/docs/news/reuters_wire/1531722l.htm
http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,5097645,00.html
http://news.cnet.com/news/0-1005-200-7371736.html
http://www.newsbytes.com/news/01/170695.html
http://www.msnbc.com/news/636443.asp
http://www.cnn.com/2001/TECH/internet/10/01/internet.scams.reut/index.html
http://www.usatoday.com/life/cyber/tech/2001/10/1/ftc-sites.htm

Identity Thief Gets 2 Years in Fraud A Webbers Falls woman was sentenced
Friday to two years in prison for a bank fraud conviction connected to
an identity theft scheme that the defense claimed was the product of her
mental illness.  Rebecca Zoe Brown, 35, was also ordered by U.S. 
District Judge Sven Erik Holmes to pay $71,021.13 in restitution to
various banks and credit card companies. 
http://www.antionline.com/showthread.php?threadid=115384

Another Thing to Fear: ID Theft It's the largest police investigation in
history, with a few thousand sleuths hot on the trail of just 19
suspected hijackers, and about 500 people already in jail.  But the FBI
said in a statement on Thursday that "attempts to confirm the true
identities of these individuals are still under way."
http://www.wired.com/news/conflict/0,2100,47201,00.html

We've cracked into bin Laden's bank - UK hackers A group of British
hackers has claimed to have broken into the systems of banks in the
Sudan, and extracted information on accounts related to Osama's bin
Laden terrorist network.  Young Intelligent Hackers Against Terror
(Yihat) claims to have obtained data on accounts held by members of Al
Qaeda, including bin Laden, held at the AlShamal Islamic Bank. 
http://www.theregister.co.uk/content/55/21966.html

Hijackers' e-mails sifted for clues Federal authorities believe that
some of the 19 hijackers involved in the Sept.  11 terrorist attacks
were using computers in all-night Kinko's stores and cybercafes in South
Florida to coordinate their activities in the weeks before the assaults. 
Investigators have amassed what they described as a "substantial" amount
of e-mail traffic among the hijackers.  Some of the messages were
exchanged in a mix of English and Arabic. 
http://www.usatoday.com/life/cyber/tech/2001/10/1/hijackers-e-mails-sifted.htm

FBI Releases List of Top 20 Computer Risks The FBI on Monday released a
list of the top 20 computer security vulnerabilities most likely to
leave the Internet vulnerable to attacks from hackers.  The items on the
list include general vulnerabilities and known security holes in the
Windows and UNIX operating systems that are most often exploited by
malicious coders, according to the System Administration, Networking,
and Security Institute (SANS), a non-profit organization that helped the
FBI compile the list. 
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3350889,00.html
http://www.msnbc.com/news/636411.asp
http://www.cnn.com/2001/TECH/internet/10/01/computer.security.ap/index.html

Security Firm Warns Of Bogus Nimda 'Fix' - Update Computer security
company SecurityFocus is telling network administrators that it has
nothing to do with an e- mail and file attachment that claims to be a
fix for the recent Nimda worm.  Instead, the attachment appears to be
repackaged version of a older Trojan program designed to spy on those
who run the software, says the San Mateo, Calif., clearinghouse for
information on such security threats.. 
http://www.newsbytes.com/news/01/170691.html

Nimda comeback thwarted A resurgence of the Nimda worm failed to
materialize Friday, leaving unfulfilled warnings that several security
companies made this week.  The e-mail component of the worm, which sends
infected messages to each entry in an infected computer's Outlook
address book, reactivates 10 days after the original infection. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5097617,00.html
http://www.usatoday.com/life/cyber/zd/zd1.htm

Nimda worms its way to top of September virus chart
http://www.theregister.co.uk/content/56/21946.html Ban Outlook--now
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2814683,00.html
Experts demolish MS anti-Apache FUD
http://www.theregister.co.uk/content/35/21967.html

Bush names Clarke to cyberterrorism team A holdover from the Clinton
administration will oversee "cybersecurity" for President Bush, while a
retired Army general will coordinate anti-terror efforts with military
and intelligence counterparts.  Richard Clarke, who currently heads the
government's counter- terrorism team, will direct efforts to protect the
nation's information infrastructure from attack, three administration
officials said Sunday. 
http://www.cnn.com/2001/TECH/internet/10/01/clarke.appointment.ap/index.html

U.S.  Supreme Court To Hear Internet Porn Cases The U.S.  Supreme Court
takes up a pair of controversial laws designed to curb Internet
pornography as it begins its October 2001 session today.  The eldest of
those cases is the Child Pornography Prevention Act of 1996, a law that
would make it a federal crime to post online computer-generated child
pornography.  http://www.newsbytes.com/news/01/170674.html

U.S.  networks run big risk of cyber-strikes, experts assert.  America's
next Pearl Harbor, many experts predicted, would be a cyber- attack, a
high-tech strike on the nation's critical computer systems, such as
those controlling power grids or financial networks. 
http://www.siliconvalley.com/docs/news/depth/cyber100101.htm
http://www.govexec.com/dailyfed/1001/100101j1.htm

Cybersecurity called key to homeland defense
http://www.fcw.com/fcw/articles/2001/1001/news-cyber-10-01-01.asp

The new super sleuth Government seeking to loosen rules on using new
high-tech tools.  As President Bush and Attorney General John Ashcroft
seek to loosen the legal restraints on domestic surveillance, law
enforcement already possesses the electronic tools to eavesdrop on
private phone conversations and e-mail exchanges and monitor the Web
wanderings of everyday citizens. 
http://www.siliconvalley.com/docs/news/depth/snoop093001.htm
http://www.newsbytes.com/news/01/170694.html
http://www.usatoday.com/hlead.htm

Cybersnooping for Sounds and Images, Not Suspects Benjamin Franklin, the
first electric performance artist, wrote that those who "give up
essential liberty to obtain a little temporary safety deserve neither
liberty nor safety." As the debate over the balancing of personal
freedom and public safety heats up, Alex Galloway has begun a
computer-art project that provides food for thought. 
http://www.nytimes.com/2001/10/01/arts/design/01ARTS.html

Straw slams civil liberties lobby Foreign secretary Jack Straw launched
a scathing attack on the civil liberties lobby in an interview on Radio
4 on Friday.  Mr Straw, who pushed through some pretty Draconian laws
while home secretary, complained to the Today programme that he was held
back by civil liberties groups and was forced to water down police and
secret service surveillance powers (in the RIP and Terrorism Acts, to
name two).  http://www.theregister.co.uk/content/6/21960.html

EU States Agree To Pass Anti-Spam Law The 15 member states of the
European Union agreed today to pass a new law banning the use of
unsolicited e-mail or "spam," in promoting financial services. 
http://www.newsbytes.com/news/01/170700.html

PC Viruses--Latest Terrorism? One week to the minute after the tragedy
of Sept.  11, the computer virus known as "Nimda" was released into
cyberspace.  Six days later came the "Vote" worm, which arrived in the
form of an e-mail ostensibly asking for your opinion on whether the U.S. 
should go to war.  The timing and nature of these viruses ring
suspicious.  Could we be looking at an assault on computers?
http://netbusiness.netscape.com/fsb/features/sp_f_092801_1.psp

There's an E-Scam Born Every Minute Thanks to a court ruling, however,
the feds now have greater freedom to put online con artists out of
business.  On Sept.  13, while the world's attention was fixed on the
aftermath of terrorist attacks on the U.S., a federal appeals court
handed down a ruling that received scant attention but will have an
immense impact on online investment frauds. 
http://businessweek.com/technology/content/sep2001/tc20010921_9214.htm

We Hear You, We Hack You, We See You Many weapons will be deployed in
America's new war on terrorism, but none may be more important than the
technology that can track and eavesdrop on terrorists.  Surveillance
solutions from facial recognition camera networks that can search for
wanted persons to hacking and data-mining software that can find and
read their e-mail are already being called up. 
http://forbes.com/technology/futuretech/2001/09/25/0925fightbackindex.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:53 PST