Return-Path: <sentto-279987-3535-1004235604-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 27 Oct 2001 19:21:07 -0700 (PDT) Received: (qmail 12061 invoked by uid 510); 28 Oct 2001 02:19:26 -0000 Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 28 Oct 2001 02:19:26 -0000 X-eGroups-Return: sentto-279987-3535-1004235604-fc=all.net@returns.onelist.com Received: from [10.1.1.220] by n35.groups.yahoo.com with NNFMP; 28 Oct 2001 02:20:04 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 28 Oct 2001 02:20:03 -0000 Received: (qmail 41806 invoked from network); 28 Oct 2001 02:20:02 -0000 Received: from unknown (10.1.10.27) by 10.1.1.220 with QMQP; 28 Oct 2001 02:20:02 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2 with SMTP; 28 Oct 2001 02:20:02 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9S2KGo31159 for iwar@onelist.com; Sat, 27 Oct 2001 19:20:16 -0700 Message-Id: <200110280220.f9S2KGo31159@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 27 Oct 2001 19:20:16 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 10/26/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit October 26, 2001 Empowered by new anti-terror bill, Ashcroft to unleash sweeping offensive. When President Bush signs new anti-terror legislation into law today, the Justice Department and the FBI will immediately launch a law enforcement offensive as all-consuming as the one Robert F. Kennedy waged against organized crime 40 years ago, Attorney General John Ashcroft said Thursday. http://www.siliconvalley.com/docs/hottopics/attack/004761.htm http://news.cnet.com/news/0-1005-200-7667530.html http://www.fcw.com/fcw/articles/2001/1022/web-terror-10-26-01.asp Bush signs sweeping new laws to combat terrorism http://www.siliconvalley.com/docs/news/svfront/081235.htm http://www.newsbytes.com/news/01/171556.html Critics: Patriot Act puts privacy at risk http://www.zdnet.com/zdnn/stories/news/0,4586,5098862,00.html Terror Act Has Lasting Effects http://www.wired.com/news/conflict/0,2100,47901,00.html Pakistani hackers attack U.S. government site The U.S. government is investigating an attack on one of its Web sites in which a well-known Pakistani hacker group posted a message threatening to turn sensitive information over to the Al Qaeda organization unless the United States agreed to meet its terms. http://www.usatoday.com/life/cyber/tech/2001/10/26/hack-attack.htm Security Site Succumbs Again To Hackers Proving that hackers can sometimes be masters of irony, a popular security news site has been defaced for the second time this week. Visitors to SecurityNewsPortal.com (SNP) Thursday night were greeted by a statement apparently from Marquis Grove, the non-profit site's operator. http://www.newsbytes.com/news/01/171555.html N.J. pulling some Web sites for security reasons, such as list of hazardous chemical sites. New Jersey officials removed from the Internet some Web pages that officials fear could be useful to terrorists in planning attacks. The state Department of Environmental Protection recently removed a database listing the hazardous chemicals and substances used or stored at 33,000 businesses throughout the state. http://www.siliconvalley.com/docs/news/tech/035094.htm Trojan horse scanner pitch is a sneaky worm With more people all the time connected to the Internet, the danger of Trojan horses, malicious programs that communicate passwords and other private information to others on the Internet, is very real. Antset is a worm that arrives by e-mail and claims to be a Trojan horse scanner. It is not. http://www.zdnet.com/zdnn/stories/news/0,4586,2820285,00.html http://news.zdnet.co.uk/story/0,,t269-s2098081,00.html http://www.newsbytes.com/news/01/171548.html Experts warn of email hoax Red Cross donation A malicious computer program is quietly making the rounds, disguising itself as an e-mail donation form for the American Red Cross while attempting to steal credit card information, antivirus vendors said on Thursday. http://www.siliconvalley.com/docs/news/reuters_wire/1597996l.htm MI5 turns to the Web in hunt for terrorists The British security service is seeking help from fundamental Muslim Web sites in its search for information on terrorists. The British intelligence service has launched an Internet investigation to appeal for information about potential terrorist attacks. http://news.zdnet.co.uk/story/0,,t269-s2098107,00.html http://www.theregister.co.uk/content/57/22499.html Home Office admits data retention plans A voluntary code of practice governing how ISPs store data for law enforcement agencies could be replaced with sweeping powers for the Home Secretary. The Home Office has admitted that it plans to reserve extra powers to force ISPs to retain data about customers if its current "voluntary code of practice" proves inadequate to deal with terrorists. http://news.zdnet.co.uk/story/0,,t269-s2098159,00.html IT managers 'should be liable for harbouring cyberterrorists' The UK needs new laws like those proposed in the US to make IT managers and software suppliers directly responsible for DoS terrorist attacks. Negligent IT managers in the UK should be liable for harbouring information terrorists, a cyberwarfare expert at the Butler Group said on Thursday. http://news.zdnet.co.uk/story/0,,t269-s2098153,00.html Pentagon Seeks Help On Denial Of Service Attacks The U.S. Department of Defense is seeking information from technology vendors on how to defend against distributed denial of service attacks, according to a special notice published Thursday. http://www.newsbytes.com/news/01/171562.html Pentagon puts out call for anti-terrorism technology The Defense Department is asking industry for help in finding and developing new technologies for combating terrorism. On Oct. 23, the Pentagon issued an announcement asking "interested parties" for ideas to help in the war on terrorism. http://www.govexec.com/dailyfed/1001/102601g1.htm Cybercrime fighters team up IAAC and ICAF join up to increase understanding of computercrime and its prevention among UK companies. Two security organisations have announced they are working together to help companies fight computer crime and increase understanding of potential attacks and threats. http://news.zdnet.co.uk/story/0,,t269-s2098127,00.html SSP unveils Secure PC SSP Solutions Inc., a provider of secure access control solutions and services, this week announced the launch of Secure PC, an "out of the box" secure computer delivered as a working client to the user. Secure PC is a prepackaged solution incorporating basic systems from Dell Computer Corp. and other manufacturers and integrated with selected technology from the SSP Solution Suite of security products and services. http://www.fcw.com/fcw/articles/2001/1022/web-ssp-10-26-01.asp Army takes the lead with smart cards The U.S. military is spearheading a switch to ``smart'' identity cards that could open up a new growth market as the world becomes obsessed with security after last month's hijack attacks. The U.S. Defense Department has ordered chip-based ID cards for 4.3 million military personnel over the next 18 months to tighten security on access to buildings, including the Pentagon, and to computer networks, including access to encrypted e-mail and online transactions. http://www.zdnet.com/zdnn/stories/news/0%2C4586%2C2820502%2C00.html http://www.siliconvalley.com/docs/news/tech/052436.htm http://www.techtv.com/news/terrorism/story/0,24195,3356546,00.html http://news.cnet.com/news/0-1003-200-7665983.html Win-XP firewall defeats Gibson NanoProbes A reader recently told me that the default settings on his Win-XP Pro firewall made him invisible on the Net, at least according to Steve Gibson's ShieldsUp security diagnostic tool. But this isn't what Gibberson is worried about. As we know, he's terrified that Harry Homeowner users will be Trojanized six ways to Sunday by malicious teenagers bent on using their raw sockets to destroy the Internet. http://www.theregister.co.uk/content/55/22509.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST