[iwar] [NewsBits] NewsBits - 11/09/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-11-10 08:16:22


Return-Path: <sentto-279987-3835-1005408961-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 10 Nov 2001 08:17:06 -0800 (PST)
Received: (qmail 15428 invoked by uid 510); 10 Nov 2001 16:14:57 -0000
Received: from n20.groups.yahoo.com (216.115.96.70) by all.net with SMTP; 10 Nov 2001 16:14:57 -0000
X-eGroups-Return: sentto-279987-3835-1005408961-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.1.220] by n20.groups.yahoo.com with NNFMP; 10 Nov 2001 16:13:49 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 10 Nov 2001 16:16:00 -0000
Received: (qmail 23701 invoked from network); 10 Nov 2001 16:16:00 -0000
Received: from unknown (216.115.97.167) by m2.grp.snv.yahoo.com with QMQP; 10 Nov 2001 16:16:00 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 10 Nov 2001 16:16:00 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAAGGMJ12900 for iwar@onelist.com; Sat, 10 Nov 2001 08:16:22 -0800
Message-Id: <200111101616.fAAGGMJ12900@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sat, 10 Nov 2001 08:16:22 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 11/09/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

November 9, 2001

Cambridge Students Find Way to Hack Into Banks Two graduate students
have found a way to hack into security systems that protect many banking
and e-commerce transactions, Cambridge University said on Thursday. 
Michael Bond and Richard Clayton, computer science Ph.D.  students,
developed programs allowing them to hack into an IBM security computer
that was previously thought to be impregnable, it said. 
http://dailynews.yahoo.com/h/nm/20011108/tc/tech_britain_hackers_dc_1.html
http://www.siliconvalley.com/docs/news/tech/045088.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,5099425,00.html
http://www.wired.com/news/technology/0,1282,48277,00.html
http://www.usatoday.com/life/cyber/tech/2001/11/09/bank-hack.htm
http://www.theregister.co.uk/content/55/22751.html

Microsoft touts XP in China, held back by pirates The world's top
software firm has seen few ``concrete results'' in an anti-piracy
campaign in the world's most heavily pirated market, but pre-conditions
for improvement were falling into place, a Microsoft Corp.  executive
said on Friday.
http://www.siliconvalley.com/docs/news/tech/059015.htm
http://www.zdnet.com/zdnn/stories/news/0,4586,2823738,00.html

Finaldo worm: Demo of worse to come Finaldo (w32.Finaldo.b@mm) appears
to be a flawed version of a more ambitious worm yet to come.  Finaldo is
a mass-mailer; it spreads by e-mail, using randomly chosen names as
attached files, and via shared network directories.  Once activated,
Finaldo will attempt to infect EXE, OCX, and SCR files as well as ASP,
HTM, and HTML files. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2823577,00.html

Instant messaging vulnerable to viruses Security experts have warned
companies that increased use of corporate instant messaging services
could increase vulnerability to virus attacks and the interception of
messages.  Yahoo! and Sun Microsystems have both announced that they
will release instant messaging (IM) software for corporate use, and
Microsoft has said that IM will play a large role in its .Net strategy
for accessing applications online. 
http://www.zdnet.com/zdnn/stories/news/0,4586,2823750,00.html

Counterterrorism: `Wartime' changes sweep spy, law agencies.  The Bush
administration Thursday announced a sweeping ``wartime reorganization
and mobilization'' aimed at making counterterrorism the dominant
priority of federal law enforcement and intelligence agencies -- even at
the expense of other traditional operations. 
http://www0.mercurycenter.com/premium/front/docs/fbi09.htm

Justice Shift Calls for Better IT
http://www.fcw.com/fcw/articles/2001/1105/web-doj-11-09-01.asp
http://www.cnn.com/2001/TECH/internet/11/09/infrastructure.protection.idg/index.html

Share more leads, Ashcroft tells Justice bureaus
http://www.gcn.com/vol1_no1/daily-updates/17463-1.html

Government brandishes new powers in cybersecurity In Washington, the
change in the national mood since September 11 is plain to see.  The
famous marble monuments stand ringed by makeshift concrete barricades. 
White police vans sit in parking lots formerly filled with tour buses. 
Guard dogs prowl outside the White House, while up on Capitol Hill
moon-suited investigators sweep for traces of anthrax. 
http://www.siliconvalley.com/docs/news/reuters_wire/1638802l.htm

House panel flunks federal government on computer security Despite
dramatically tighter security at U.S.  buildings since the terrorist
attacks, a House panel is giving the government failing marks for lax
protection of federal computer networks against hackers, terrorists and
others.
http://www.siliconvalley.com/docs/news/tech/011772.htm
http://www.gcn.com/vol1_no1/daily-updates/17466-1.html
http://www.newsbytes.com/news/01/172052.html
http://www.wired.com/news/politics/0,1283,48271,00.html
http://www.usatoday.com/life/cyber/tech/2001/11/09/security-flunk.htm

Security woes dog federal agencies
http://news.cnet.com/news/0-1003-201-7818951-0.html

UPS technology improving security, chief says For more than a decade,
United Parcel Service Inc.  has invested a billion dollars a year on
computer technology -- for cargo-tracking and management systems -- and
that has really paid off since Sept.  11, the company's chief executive
officer said Thursday. 
http://www.siliconvalley.com/docs/news/tech/072832.htm

Trojans make firewalls futile Security watchers have warned that
personal firewalls may be an "exercise in futility" given the latest
developments in Trojan techniques.  Just days after the security
community advised that Trojans are increasingly using outbound
connections to pick up commands and avoid port blocking and intrusion
detection, experts have said that firewalls may be highly susceptible to
such tricks.
http://www.vnunet.com/News/1126734

IBM chip achieves security standard IBM Corp.  announced this week that
its Cryptographic Security Chip, used in its NetVista desktop computers
and ThinkPad notebooks, has received Common Criteria certification, a
security standard recognized by the United States and 13 other
countries.  Common Criteria (ISO/IEC 15408) is an international standard
for evaluating information technology security products to be certified
at a defined assurance level. 
http://www.fcw.com/fcw/articles/2001/1105/web-chip-11-09-01.asp

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST