Return-Path: <sentto-279987-3835-1005408961-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 10 Nov 2001 08:17:06 -0800 (PST) Received: (qmail 15428 invoked by uid 510); 10 Nov 2001 16:14:57 -0000 Received: from n20.groups.yahoo.com (216.115.96.70) by all.net with SMTP; 10 Nov 2001 16:14:57 -0000 X-eGroups-Return: sentto-279987-3835-1005408961-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.220] by n20.groups.yahoo.com with NNFMP; 10 Nov 2001 16:13:49 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 10 Nov 2001 16:16:00 -0000 Received: (qmail 23701 invoked from network); 10 Nov 2001 16:16:00 -0000 Received: from unknown (216.115.97.167) by m2.grp.snv.yahoo.com with QMQP; 10 Nov 2001 16:16:00 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 10 Nov 2001 16:16:00 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAAGGMJ12900 for iwar@onelist.com; Sat, 10 Nov 2001 08:16:22 -0800 Message-Id: <200111101616.fAAGGMJ12900@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 10 Nov 2001 08:16:22 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 11/09/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit November 9, 2001 Cambridge Students Find Way to Hack Into Banks Two graduate students have found a way to hack into security systems that protect many banking and e-commerce transactions, Cambridge University said on Thursday. Michael Bond and Richard Clayton, computer science Ph.D. students, developed programs allowing them to hack into an IBM security computer that was previously thought to be impregnable, it said. http://dailynews.yahoo.com/h/nm/20011108/tc/tech_britain_hackers_dc_1.html http://www.siliconvalley.com/docs/news/tech/045088.htm http://www.zdnet.com/zdnn/stories/news/0,4586,5099425,00.html http://www.wired.com/news/technology/0,1282,48277,00.html http://www.usatoday.com/life/cyber/tech/2001/11/09/bank-hack.htm http://www.theregister.co.uk/content/55/22751.html Microsoft touts XP in China, held back by pirates The world's top software firm has seen few ``concrete results'' in an anti-piracy campaign in the world's most heavily pirated market, but pre-conditions for improvement were falling into place, a Microsoft Corp. executive said on Friday. http://www.siliconvalley.com/docs/news/tech/059015.htm http://www.zdnet.com/zdnn/stories/news/0,4586,2823738,00.html Finaldo worm: Demo of worse to come Finaldo (w32.Finaldo.b@mm) appears to be a flawed version of a more ambitious worm yet to come. Finaldo is a mass-mailer; it spreads by e-mail, using randomly chosen names as attached files, and via shared network directories. Once activated, Finaldo will attempt to infect EXE, OCX, and SCR files as well as ASP, HTM, and HTML files. http://www.zdnet.com/zdnn/stories/news/0,4586,2823577,00.html Instant messaging vulnerable to viruses Security experts have warned companies that increased use of corporate instant messaging services could increase vulnerability to virus attacks and the interception of messages. Yahoo! and Sun Microsystems have both announced that they will release instant messaging (IM) software for corporate use, and Microsoft has said that IM will play a large role in its .Net strategy for accessing applications online. http://www.zdnet.com/zdnn/stories/news/0,4586,2823750,00.html Counterterrorism: `Wartime' changes sweep spy, law agencies. The Bush administration Thursday announced a sweeping ``wartime reorganization and mobilization'' aimed at making counterterrorism the dominant priority of federal law enforcement and intelligence agencies -- even at the expense of other traditional operations. http://www0.mercurycenter.com/premium/front/docs/fbi09.htm Justice Shift Calls for Better IT http://www.fcw.com/fcw/articles/2001/1105/web-doj-11-09-01.asp http://www.cnn.com/2001/TECH/internet/11/09/infrastructure.protection.idg/index.html Share more leads, Ashcroft tells Justice bureaus http://www.gcn.com/vol1_no1/daily-updates/17463-1.html Government brandishes new powers in cybersecurity In Washington, the change in the national mood since September 11 is plain to see. The famous marble monuments stand ringed by makeshift concrete barricades. White police vans sit in parking lots formerly filled with tour buses. Guard dogs prowl outside the White House, while up on Capitol Hill moon-suited investigators sweep for traces of anthrax. http://www.siliconvalley.com/docs/news/reuters_wire/1638802l.htm House panel flunks federal government on computer security Despite dramatically tighter security at U.S. buildings since the terrorist attacks, a House panel is giving the government failing marks for lax protection of federal computer networks against hackers, terrorists and others. http://www.siliconvalley.com/docs/news/tech/011772.htm http://www.gcn.com/vol1_no1/daily-updates/17466-1.html http://www.newsbytes.com/news/01/172052.html http://www.wired.com/news/politics/0,1283,48271,00.html http://www.usatoday.com/life/cyber/tech/2001/11/09/security-flunk.htm Security woes dog federal agencies http://news.cnet.com/news/0-1003-201-7818951-0.html UPS technology improving security, chief says For more than a decade, United Parcel Service Inc. has invested a billion dollars a year on computer technology -- for cargo-tracking and management systems -- and that has really paid off since Sept. 11, the company's chief executive officer said Thursday. http://www.siliconvalley.com/docs/news/tech/072832.htm Trojans make firewalls futile Security watchers have warned that personal firewalls may be an "exercise in futility" given the latest developments in Trojan techniques. Just days after the security community advised that Trojans are increasingly using outbound connections to pick up commands and avoid port blocking and intrusion detection, experts have said that firewalls may be highly susceptible to such tricks. http://www.vnunet.com/News/1126734 IBM chip achieves security standard IBM Corp. announced this week that its Cryptographic Security Chip, used in its NetVista desktop computers and ThinkPad notebooks, has received Common Criteria certification, a security standard recognized by the United States and 13 other countries. Common Criteria (ISO/IEC 15408) is an international standard for evaluating information technology security products to be certified at a defined assurance level. http://www.fcw.com/fcw/articles/2001/1105/web-chip-11-09-01.asp ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST