Return-Path: <sentto-279987-2905-1002992394-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Sat, 13 Oct 2001 10:01:06 -0700 (PDT) Received: (qmail 809 invoked by uid 510); 13 Oct 2001 16:59:41 -0000 Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 13 Oct 2001 16:59:41 -0000 X-eGroups-Return: sentto-279987-2905-1002992394-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by n1.groups.yahoo.com with NNFMP; 13 Oct 2001 16:59:54 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 13 Oct 2001 16:59:54 -0000 Received: (qmail 72563 invoked from network); 13 Oct 2001 16:59:53 -0000 Received: from unknown (10.1.10.142) by l9.egroups.com with QMQP; 13 Oct 2001 16:59:53 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 13 Oct 2001 16:59:52 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id JAA05424 for iwar@onelist.com; Sat, 13 Oct 2001 09:59:52 -0700 Message-Id: <200110131659.JAA05424@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 13 Oct 2001 09:59:52 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 10/11/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit October 11, 2001 Hoax e-mail warns of mall attack At a time when Americans are plagued by a generalized fear of an invisible enemy, the latest urban legend from the Internet warns specifically of a terrorist attack on a mall on Halloween. The e-mail message, which began circulating Oct. 5, describes a story the author heard from a ``friend of a friend'' whose Afghan boyfriend stood her up on a date Sept. 6. On Sept. 10, the e-mail message says, she received a letter begging her not to get on any commercial airlines the next day and not to go to any malls on Halloween. http://www.siliconvalley.com/docs/news/tech/045342.htm FBI Warns of 'Skyfall' Attack In a brief but dramatic statement, the FBI warned Thursday that Americans should expect additional terrorist attacks. A two-sentence press release on FBI.gov said there "may be additional terrorist attacks within the United States and against U.S. interests overseas over the next several days." http://www.wired.com/news/conflict/0,2100,47510,00.html Authorities Find Clues to Terror Finances Officials in France and the Philippines release info on funds controlled by bin Laden network. International officials say they have made strides in tracking down the sources of financing for the al Qaeda network run by Osama bin Laden, considered the mastermind behind the September 11 attacks. http://www.techtv.com/news/politicsandlaw/story/0,24195,3353149,00.html Anti-Terror Hackers Claim Arab National Bank Breach Vigilante hackers apparently penetrated the security of a Saudi bank Wednesday, even as the hackers' own Web site was defaced by a notorious computer prankster, Fluffi Bunni. In an effort to locate financial information about terrorists, a member of a group called Yihat claims to have breached the defenses of an Internet-connected server operated by Arab National Bank. http://www.newsbytes.com/news/01/171035.html http://www.theregister.co.uk/content/55/22183.html Fighting Evil Hackers With Bucks Worried about the threat of terrorists-turned- hackers, members of a House panel spent Wednesday puzzling over how Congress could improve computer security. "What legislative and other steps are needed to increase the focus on computer security?" Rep. Sherwood Boehlert (R-New York), chairman of the House Science committee, asked at a "cybersecurity" hearing. Boehlert added: "We want to focus on real, concrete problems and develop specific solutions." http://www.wired.com/news/politics/0,1283,47479,00.html More tech businesses cooperate with FBI. As thousands of leads poured into the FBI after last month's terrorist attacks, the bureau converted its Internet Fraud Complaint Center into a repository for tips received by e-mail. http://www.siliconvalley.com/docs/news/tech/064893.htm Secrecy foe joins U.S. move to scrub data on Web Qualms about publishing data that could be used to plot terror attacks have prompted a leading official-secrecy foe to scrub its Web site joining a trend well under way among U.S. government agencies. The Federation of American Scientists, a staunch advocate of government openness, said Thursday it had yanked about 200 of its estimated half-million Web pages since Sept. 11 terror attacks killed some 5,500 people in the United States. http://www.siliconvalley.com/docs/news/tech/041555.htm http://www.msnbc.com/news/641578.asp Security updates deliver a problem A group of German hackers have exposed a new vulnerability in Symantec's LiveUpdate 1.4, which could be used to download and run hostile code from an unauthorized server. Symantec, which makes antivirus and security software, has confirmed that older versions of its virus definition software will allow the deployment of malware such as trojan application viruses, and the remote penetration of systems running LiveUpdate. http://www.zdnet.com/zdnn/stories/news/0,4586,2817368,00.html Congress Wrestles With Surveillance Bills Although civil liberties advocates have applauded the efforts of lawmakers to temper a pair of sweeping anti-terrorism bills making their way quickly through both houses of Congress, many fear that - no matter what passes - they will have suffered a major loss. http://www.newsbytes.com/news/01/171052.html On Capitol Hill: An issue of data sharing There's an effort in the United States Congress to approve legislation that would encourage companies to share security data with each other and with the government. "We have a blind spot in this situation, a major national blind spot," says Sen. Robert Bennett, Republican of Utah, about the bill he's co-sponsoring with fellow Republican Sen. John Kyle of Arizona. It would protect from public disclosure security data that's shared with the government by a private company. http://www.cnn.com/2001/TECH/industry/10/11/congress.data.sharing.idg/index= .=20 html A Senator's Lonely Privacy Fight http://www.wired.com/news/conflict/0,2100,47490,00.html Advocates lament halting of access to criminal filings. A few weeks ago, online access to federal criminal filings suddenly stopped. Though court records remain publicly available on paper at courthouses, they were deemed too public when it came to the Internet. http://www.siliconvalley.com/docs/news/tech/013895.htm US Cyber-Czar makes a sound suggestion The man who repeatedly disgraced the memory of thousands of US Sailors who died horribly in a Japanese aerial bombing with trite blather about an "electronic Pearl Harbor" has come around with a fairly sound idea for inter- governmental secure communications. http://www.theregister.co.uk/content/55/22156.html Should the government get its own Net? The Bush administration has apparently decided that the Internet isn't secure enough for its needs and has proposed a new network be created to communicate critical government information. The new network, dubbed Govnet, is the brainchild of Richard Clarke, the newly appointed presidential adviser for cyberspace security, and is intended to carry data, voice-over-IP and possibly video. http://www.zdnet.com/zdnn/stories/news/0,4586,5098134,00.html http://www.techtv.com/news/internet/story/0,24195,3353271,00.html http://www.gcn.com/vol1_no1/daily-updates/17274-1.html http://www.usatoday.com/life/cyber/tech/2001/10/10/cybersecurity-supercompu= t=20 er.htm Security experts leery of government Net Network-security professionals supported the Bush Administration's idea of a separate government Internet but stressed that security on such a network will be elusive. Actions as simple as a government employee connecting a nonsecured computer to the network or loading data from a diskette could compromise the entire system, experts said. http://www.zdnet.com/zdnn/stories/news/0,4586,5098169,00.html http://news.cnet.com/news/0-1003-200-7493027.html More cybersecurity study 'crucial' New research funds=97and possibly a new way of thinking=97are necessary to meet an urgent need to secure computer networks supporting the nation's critical infrastructure, said academic, industry and government panelists at a congressional hearing Oct. 10. The number of academic researchers examining computer security is dangerously low, and the federal government needs to provide more money and focused support to change that, panelists told members of the House Science Committee. http://www.fcw.com/fcw/articles/2001/1008/web-cip-10-11-01.asp Who Owns the Law? When Texas retiree Peter Veeck posted some local regulations on his website, he had no idea he was sparking a major legal battle over who actually owns the law. Napster, Mp3.com, the RIAA, and Metallica. DeCSS, DMCA, SDMI, and DVD. Encryption, fair use, proprietary software, and e-books. If you've been following the glut of legal battles raging over copyright infringement since the popularization of the Internet, then you probably recognize most of these names and terms. http://www.techtv.com/cybercrime/digitaldisputes/story/0,23008,3344180,00.h= tml ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST