Return-Path: <sentto-279987-2976-1003192166-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 15 Oct 2001 17:30:08 -0700 (PDT) Received: (qmail 1593 invoked by uid 510); 16 Oct 2001 00:29:09 -0000 Received: from n16.groups.yahoo.com (216.115.96.66) by 204.181.12.215 with SMTP; 16 Oct 2001 00:29:09 -0000 X-eGroups-Return: sentto-279987-2976-1003192166-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by n16.groups.yahoo.com with NNFMP; 16 Oct 2001 00:29:25 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 16 Oct 2001 00:29:26 -0000 Received: (qmail 83684 invoked from network); 16 Oct 2001 00:29:22 -0000 Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 16 Oct 2001 00:29:22 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 16 Oct 2001 00:29:22 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id RAA12566 for iwar@onelist.com; Mon, 15 Oct 2001 17:29:22 -0700 Message-Id: <200110160029.RAA12566@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 15 Oct 2001 17:29:22 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Security.Attacks.Set.To.Double.In.2001.-.CERT] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Security Attacks Set To Double In 2001 - CERT By Brian McWilliams, Newsbytes, 10/15/2001 <a href="http://www.newsbytes.com/news/01/171126.html">http://www.newsbytes.com/news/01/171126.html> Attacks on Internet computers are on pace to easily double the number reported last year, according to a government-funded security information clearinghouse, Computer Emergency Response Team (CERT). With three months still remaining in 2001, the number of security incidents reported to the coordination center of the Computer Emergency Response Team in 2001 has already soared past the totals for 2000, according to statistics released by CERT today. So far this year, 34,754 attacks have been reported to CERT, a 60 percent increase over the 21,756 incidents logged by the organization in all of 2000. If the incident reports continue at the current pace, this year could see over 46,000 reported security attacks, more than twice the number of such breaches reported in 2000. CERT defines an incident as "attempts, either failed or successful, to gain unauthorized access to a system or its data." The security center's report did not include analysis of the possible causes of the rise in reported incidents. Besides an increase in the number of attacks, the totals could also be affected by an increase in the number of sites participating in CERT's incident reporting system. CERT officials were not immediately available for comment. Internet security this year has been threatened by several self-propagating worms that targeted Internet servers and spread widely, including Sadmind, multiple versions of Code Red, and Nimda. In its annual report last year, CERT listed denial of service attacks, BIND domain name system software vulnerabilities, and the LoveLetter worm among the "most serious intruder activities" reported to CERT in 2000. CERT's latest statistics also reveal a sharp rise in the number of software vulnerabilities reported to the Internet security center. So far this year, 1,820 security vulnerabilities were logged by CERT, a 66 percent rise over the total for 2000 of 1,090. Both years show a marked increase over previous annual vulnerability report totals. From 1995 through 1999, an average of 300 security bugs were reported each year. The latest CERT statistics are online at <a href="http://www.cert.org/stats/cert_stats.html">http://www.cert.org/stats/cert_stats.html> . ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST