[iwar] [fc:Security.Attacks.Set.To.Double.In.2001.-.CERT]

From: Fred Cohen (fc@all.net)
Date: 2001-10-15 17:29:22


Return-Path: <sentto-279987-2976-1003192166-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 15 Oct 2001 17:30:08 -0700 (PDT)
Received: (qmail 1593 invoked by uid 510); 16 Oct 2001 00:29:09 -0000
Received: from n16.groups.yahoo.com (216.115.96.66) by 204.181.12.215 with SMTP; 16 Oct 2001 00:29:09 -0000
X-eGroups-Return: sentto-279987-2976-1003192166-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by n16.groups.yahoo.com with NNFMP; 16 Oct 2001 00:29:25 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 16 Oct 2001 00:29:26 -0000
Received: (qmail 83684 invoked from network); 16 Oct 2001 00:29:22 -0000
Received: from unknown (10.1.10.27) by l9.egroups.com with QMQP; 16 Oct 2001 00:29:22 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 16 Oct 2001 00:29:22 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id RAA12566 for iwar@onelist.com; Mon, 15 Oct 2001 17:29:22 -0700
Message-Id: <200110160029.RAA12566@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 15 Oct 2001 17:29:22 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Security.Attacks.Set.To.Double.In.2001.-.CERT]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Security Attacks Set To Double In 2001 - CERT 
By Brian McWilliams, Newsbytes, 10/15/2001
<a href="http://www.newsbytes.com/news/01/171126.html">http://www.newsbytes.com/news/01/171126.html>

Attacks on Internet computers are on pace to easily double the number
reported last year, according to a government-funded security
information clearinghouse, Computer Emergency Response Team (CERT). 
With three months still remaining in 2001, the number of security
incidents reported to the coordination center of the Computer Emergency
Response Team in 2001 has already soared past the totals for 2000,
according to statistics released by CERT today. 
So far this year, 34,754 attacks have been reported to CERT, a 60
percent increase over the 21,756 incidents logged by the organization in
all of 2000. 
If the incident reports continue at the current pace, this year could
see over 46,000 reported security attacks, more than twice the number of
such breaches reported in 2000. 
CERT defines an incident as "attempts, either failed or successful, to
gain unauthorized access to a system or its data." 
The security center's report did not include analysis of the possible
causes of the rise in reported incidents. Besides an increase in the
number of attacks, the totals could also be affected by an increase in
the number of sites participating in CERT's incident reporting system. 
CERT officials were not immediately available for comment. 
Internet security this year has been threatened by several
self-propagating worms that targeted Internet servers and spread widely,
including Sadmind, multiple versions of Code Red, and Nimda. 
In its annual report last year, CERT listed denial of service attacks,
BIND domain name system software vulnerabilities, and the LoveLetter
worm among the "most serious intruder activities" reported to CERT in
2000. 
CERT's latest statistics also reveal a sharp rise in the number of
software vulnerabilities reported to the Internet security center. 
So far this year, 1,820 security vulnerabilities were logged by CERT, a
66 percent rise over the total for 2000 of 1,090. Both years show a
marked increase over previous annual vulnerability report totals. From
1995 through 1999, an average of 300 security bugs were reported each
year. 
The latest CERT statistics are online at
<a href="http://www.cert.org/stats/cert_stats.html">http://www.cert.org/stats/cert_stats.html> .

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more!
http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:55 PST