[iwar] [NewsBits] NewsBits - 11/06/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-11-07 06:45:08


Return-Path: <sentto-279987-3804-1005144305-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 07 Nov 2001 06:46:07 -0800 (PST)
Received: (qmail 26118 invoked by uid 510); 7 Nov 2001 14:44:07 -0000
Received: from n21.groups.yahoo.com (216.115.96.71) by 204.181.12.215 with SMTP; 7 Nov 2001 14:44:07 -0000
X-eGroups-Return: sentto-279987-3804-1005144305-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.1.222] by n21.groups.yahoo.com with NNFMP; 07 Nov 2001 14:42:56 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 7 Nov 2001 14:45:04 -0000
Received: (qmail 19665 invoked from network); 7 Nov 2001 14:45:04 -0000
Received: from unknown (216.115.97.172) by m4.grp.snv.yahoo.com with QMQP; 7 Nov 2001 14:45:04 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2.grp.snv.yahoo.com with SMTP; 7 Nov 2001 14:45:03 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA7Ej8c31031 for iwar@onelist.com; Wed, 7 Nov 2001 06:45:08 -0800
Message-Id: <200111071445.fA7Ej8c31031@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 7 Nov 2001 06:45:08 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 11/06/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

[FC - reminder - I extract what I feel is the relevant content from the
excellent newsbytes forum.  The original collector - Det.  Levine -
deserves a lot of credit for his ongoing effort - and I periodically
make note of it as I do here and now.]

November 6, 2001

Bin Laden hackers denounce founder Leet German script k1dd13 and
would-be investment guru Kim Schmitz aka Kimble, who recently promoted
his YIHAT (Young Intelligent Hackers Against Terror- ism) Ninja force
with loose claims to have hacked a Sudanese bank with /bin/laden
accounts, has been denounced by two people claiming to be members of his
organization.  http://www.theregister.co.uk/content/55/22681.html

'White Hat' Hackers Threaten Information Anarchy Responding to an effort
by Microsoft to squelch the full disclosure of software vulnerabilities,
a group of "white hat" hackers is putting out a call to other experts,
asking them to deluge software vendors with bug reports. 
http://www.newsbytes.com/news/01/171900.html

From threats to war, cybersecurity enters new era The Internet's
greatest asset -- its open, ubiquitous nature -- is turning out to be
its greatest liability.  With 500 million people logged on to the global
computer network, it is now clear that a system originally set up to
facilitate communication between university professors and defense
contractors may not offer much in the way of protection against
malicious attacks. 
http://www.siliconvalley.com/docs/news/tech/019656.htm

Cybersecurity concerns take center stage
http://www.usatoday.com/life/cyber/tech/2001/11/06/cybersecurity.htm
Researcher scans the security scene
http://www.usatoday.com/life/cyber/tech/2001/11/06/ebrief.htm

DOS Attacks Possible Via Printer Networks - CERT Certain printer
networks could be used to trigger denial of service (DOS) attacks
through vulner- abilities in the systems' line printer daemon (LPD)
implementations, warns the Computer Emergency Response Team (CERT). 
http://www.newsbytes.com/news/01/171899.html

House To Vote On Uniting Financial Fraud Databases The U.S.  House of
Representatives is poised to vote today whether to link more than 250
state and federal financial-fraud databases in a single network.  The
House is expected to vote on H.R.  1408, the "Financial Services
Antifraud Network Act," a bill that would allow state and federal
financial fraud investigators to share their fraud databanks over the
Internet.
http://www.newsbytes.com/news/01/171897.html

Bill To Give Tax Break For Security Gear In Congress A bill introduced
in the House in late September that would offer companies tax breaks for
buying biometrics and other cyber-security devices has been holding fast
at the committee level since its unveiling.  Introduced by Rep.  Jerry
Weller, R-Ill., the Securing America Investment Act of 2001, H.R.  2970,
allows businesses to write off "qualifying" security devices for the
fiscal year that the devices are actually put into service. 
http://www.newsbytes.com/news/01/171912.html

Welcome to the era of drive-by hacking BBC News Online has been shown
just how lax security is on wireless networks used in London's financial
centre.  On one short trip, two-thirds of the networks we discovered
using a laptop and free software tools were found to be wide open.  Any
maliciously minded hacker could easily join these networks and piggy
back on their fast net links, steal documents or subvert other machines
on the systems to do their bidding. 
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1639000/1639661.stm

Spam floods i-mode network DoCoMo is to invest in blocking unwanted
emails on its Internet mobile phone service.  NTT DoCoMo, Japan's
dominant mobile phone operator, said on Tuesday it would spend 1bn yen
($8.22m) to build systems to block unwanted emails, or spam, sent over
its 'i-mode' Internet mobile phone service. 
http://news.zdnet.co.uk/story/0,,t269-s2098697,00.html

Survey: Forty percent accidentally get 'net porn Some 40 percent of
Internet users in Britain say they have accidentally come across
pornography while surfing, according to a survey by the Consumers'
Association.  It said parents among 7,000 people surveyed reported being
shocked to come across pornographic Web sites, sometimes when browsing
with their children. 
http://www.siliconvalley.com/docs/news/reuters_wire/1629603l.htm

Microsoft: No relief from security attacks Microsoft's security response
center must be feeling a little punch-drunk these days.  After the
one-two combination of the Code Red and Nimda worms that targeted the
company's server and PC software this past summer, the titan announced
an initiative in early October to promote security-savvy administration
among its partners. 
http://www.zdnet.com/zdnn/stories/news/0,4586,5099246,00.html

Microsoft tries to cage security gremlins
http://news.zdnet.co.uk/story/0,,t269-s2098676,00.html
Microsoft, researchers tussle over security issues
http://www.siliconvalley.com/docs/news/tech/050585.htm

Privacy Groups Petition House Subcommittee On Microsoft XP Two
consumer-oriented privacy groups Monday asked a House subcommittee to
question Federal Trade Commission Chairman Timothy Muris on his agency's
role in protecting consumers from privacy and security risks they say
are inherent in Microsoft's new XP operating system and its Passport
program.
http://www.newsbytes.com/news/01/171909.html

Reverse firewall dams DoS flood In a bid to fight the growing menace
from computer and router-based denial of service (DoS) attacks, security
firm have developed a technique to dam the DoS data flood at source. 
Using funding from the Defence Advanced Research Projects Agency
(DARPA), security technology firm Cs3 is looking a the concept of
reverse firewalling, or keeping the flood of data from a DoS attack
dammed up at the source.
http://www.vnunet.com/News/1126617

Sensor-on-a-chip passes fingerprint test A new fingerprint scanning
technology has been unveiled by Florida company AuthenTec.  The
Entr=E9Pad sensor is low power and robust, and the company says it is
suitable for cellphone and PDA use as well as fixed installations. 
Integrated into one chip, the device is less than a centimetre square
and uses under ten milliwatts when imaging.  The finger under test is
applied to the top surface of the chip, which has an especially hardened
coating, and identification takes place in under a second. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2822770,00.html
http://news.zdnet.co.uk/story/0,,t269-s2098703,00.html

Security Beyond Your Borders One month after the federal government
warned that the nation's IT infrastructure could become a target of
terrorist attacks meant to disrupt or disable businesses, many companies
say it's become practically a patriotic duty to review internal IT
security procedures and take steps to bolster these operations. 
http://www.informationweek.com/story/IWK20011102S0005

E-security: Not just a bit player in information age The devastating
effects of the World Trade Center disaster have rippled far beyond the
New York City financial district and affected industries ranging from
airlines to retail to manufacturing.  Clearly we are in a different
business environment, as corporations face a new reality filled with
previously unimaginable threats. 
http://sanjose.bcentral.com/sanjose/stories/2001/11/05/editorial3.html

Network security tightens up after attacks Businesses throughout the
Tampa Bay area wage their own wars against cyberterrorism.  Ed Martin,
security manager at Sykes Enterprises Inc.  in Tampa, makes data and
physical security decisions for the e-commerce and customer relationship
management call center company which includes international financial
firms among its customers. 
http://tampabay.bcentral.com/tampabay/stories/2001/11/05/focus1.html

Young warriors of the Web hack away at the enemy's financial roots "What
I am doing here is very risky," explains 27-year old German computer
hacker-turned-businessman Kim Schmitz.  "I'm not only risking my
freedom, but also my life.  I've had threats from several sources.  If
one fanatic thinks he would do a favour to somebody who doesn't like me
in the Islamic world, it's the easiest thing just to come by and give me
a bullet.''
http://www.smh.com.au/news/0111/03/world/world20.html

On why hacking victms shouldn't fight shy of the cops WHY IS it that
though so much hacking is taking place, we do not see that many
registrations of hacking cases? Is it because they are not reported or
because there are no cases being registered at all? Rajnath Singh,
Gurgaon It is true that there's a lot of hacking happening in our
country, especially for commercial benefit.  Most of them are directed
at corporate websites, networks and databases. 
http://www.economictimes.com/today/04know02.htm

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Universal Inkjet Refill Kit $29.95
Refill any ink cartridge for less!
Includes black and color ink.
http://us.click.yahoo.com/E11sED/MkNDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST