[iwar] [NewsBits] NewsBits - 11/13/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-11-14 06:06:54


Return-Path: <sentto-279987-3871-1005746774-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 14 Nov 2001 06:08:08 -0800 (PST)
Received: (qmail 2716 invoked by uid 510); 14 Nov 2001 14:05:05 -0000
Received: from n18.groups.yahoo.com (216.115.96.68) by all.net with SMTP; 14 Nov 2001 14:05:05 -0000
X-eGroups-Return: sentto-279987-3871-1005746774-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.53] by n18.groups.yahoo.com with NNFMP; 14 Nov 2001 14:06:19 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 14 Nov 2001 14:06:14 -0000
Received: (qmail 30839 invoked from network); 14 Nov 2001 14:06:13 -0000
Received: from unknown (216.115.97.167) by m9.grp.snv.yahoo.com with QMQP; 14 Nov 2001 14:06:13 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 14 Nov 2001 14:06:13 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAEE6sd31080 for iwar@onelist.com; Wed, 14 Nov 2001 06:06:54 -0800
Message-Id: <200111141406.fAEE6sd31080@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 14 Nov 2001 06:06:54 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 11/13/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Cybersecurity czar urges more spending to protect infrastructure.
U.S. cybersecurity czar Richard Clarke said yesterday
that cyberattacks on the nation's critical IT
infrastructure could potentially cause "catastrophic
damage to the economy" and urged more spending on IT
infrastructure and security.
http://www.computerworld.com/storyba/0,4125,NAV47_STO65468,00.html

Defending America against cyberterrorism
Anyone following cybercrime may think the whole concept
of "cyberterrorism" is an overhyped myth. With Web
defacements and short denial-of-service attacks the
norm, few fear a future attack from the Net. But
Richard Clarke, the newly appointed special adviser
to the president for cybersecurity, is one of those
few.
http://www.zdnet.com/zdnn/stories/news/0,4586,2824322,00.html

Govt. Tech Security Officials Visit Key Net Facility
http://www.newsbytes.com/news/01/172126.html

Agency examines security of mission-critical computers.
Imagine if someone were able to switch all interstate
highway signs so motorists never reached their intended
destinations. The Sept. 11 attacks have heightened
concerns that the Internet could be vulnerable in
that way, prompting a security review by the body
that oversees the worldwide network's core computers.
http://www.siliconvalley.com/docs/news/tech/065237.htm

CIO Council folds security panel
The Office of Management and Budget and the federal
CIO Council have decided to disband the council's
Security, Privacy and Critical Infrastructure
Committee to move beyond general issues to the
"nitty-gritty details," said Mark Forman, OMB's
associate director for information technology
and e-government.
http://www.fcw.com/fcw/articles/2001/1112/web-cio-11-13-01.asp

EU Parliament backs anti-terrorist data protection bill.
The European Parliament voted Tuesday to allow
anti-terrorist investigators to eavesdrop on
private data on the Internet and endorsed
improved police cooperation in hunting down
terrorists.
http://www.siliconvalley.com/docs/news/tech/020811.htm
http://www.newsbytes.com/news/01/172116.html
http://www.theregister.co.uk/content/6/22810.html

Europe: Time to crunch the cookies?
In a move that has riled Internet vendors and publishers,
the European Commission is backing a plan to prohibit
the placement of files on people's computers without
their explicit permission. The European Parliament is
expected to debate the proposal Monday and vote on it
on Tuesday in the context of a controversial draft law
governing privacy in electronic communications such
as faxing, e-mail and mobile-phone use.
http://www.zdnet.com/zdnn/stories/news/0,4586,2823996,00.html
http://www.siliconvalley.com/docs/news/reuters_wire/1649027l.htm

Euro Parliament Tackles Spam, Cookies This Week
http://www.newsbytes.com/news/01/172086.html
http://www.zdnet.com/zdnn/stories/news/0,4586,2824264,00.html

Cybercrime treaty ready for signatures
A controversial international treaty to combat
online crime is ready for adoption by participating
countries after ministers of the Council of Europe
approved the final draft Thursday. The cybercrime
treaty will be opened for countries to sign at an
international conference on cybercrime in Budapest
on November 23, the council said in a statement.
http://www.cnn.com/2001/TECH/internet/11/12/cybercrime.treaty.idg/index.html
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1651000/1651381.stm

Security concerns dominate Internet meeting
Computer geeks and public-policy wonks arriving here
to take part in the annual meeting of the body that
sets standards for the Internet's addressing system
will find that, like everything else, September 11
has profoundly changed the online world. In the wake
of the devastating hijacking attacks in Washington
and New York, the Internet Corporation for Assigned
Names and Numbers decided to devote its annual
meeting to a discussion of computer security.
http://www.siliconvalley.com/docs/news/reuters_wire/1644856l.htm

Japanese Tech Official Urges Enhanced Net Security
A senior Japanese technology official today urged
Internet addressing authorities to make the safety
and security of the global Domain Name System (DNS)
a top priority. Kenji Kosaka, Japan's Senior Vice
Minister for Public Management, Home Affairs, Posts
and Telecommunications today gave the opening keynote
at the annual meeting of the Internet Corporation for
Assigned Names and Numbers (ICANN).
http://www.newsbytes.com/news/01/172119.html

House Subcommittee To Debate Need For National ID
Once again, Congress is prepared wade into the
debate over whether Americans should be made to
carry national identification cards, an idea
that has gained substantial currency in the
wake of Sept. 11.
http://www.newsbytes.com/news/01/172071.html

Justice officials shift priorities for wartime
It was only this summer that Attorney General John
Ashcroft and then newly minted FBI Director Robert
Mueller III showed up at Verisign in Mountain View
to make the prosecution of cybercrime the first
major federal law enforcement initiative of the
Bush administration.  But that was then, and this
is post-Sept. 11th.
http://www.siliconvalley.com/docs/news/depth/prior111101.htm

Small firms respond to government's plea for anti-terror tech
Long before Sept. 11, small companies here and
across the nation were at work on a remarkable
array of gadgets and strategies to counter
terrorists. Some have been trying to develop
electromagnetic beams or ``sonic fields'' for
neutralizing toxic chemicals, blast-proof
fabrics to wrap around buildings and orbiting
radar for detecting ships carrying weapons of
mass destruction.
http://www.siliconvalley.com/docs/news/svfront/countr111201.htm

Cybersecurity firms rush to capitalize on attacks
http://www.siliconvalley.com/docs/news/tech/052376.htm

Post-attacks, privacy takes back seat to security
The Statue of Liberty stands gracefully alone in
New York Harbor, averting her gaze like many New
Yorkers from the ghastly site of what was once
the World Trade Center. The statue, a symbol of
America's open society, is closed to visitors for
now, a victim of the trade-off between personal
freedoms and domestic security =97 a trade-off that
has far-reaching implications for the technology
industry.
http://www.usatoday.com/life/cyber/tech/2001/11/13/privacy-vs-security.htm

IE flaw puts credit card info at risk
Personal data contained in cookies may be at risk
from an Internet Explorer vulnerability. Microsoft
has warned that versions of Internet Explorer can
expose consumers' personal data contained within
cookies. The vulnerability exists within IE 5.5 and
6.0, but earlier browser editions "may or may not
be affected," according to a security bulletin
posted to Microsoft's Web site on Thursday.
http://news.zdnet.co.uk/story/0,,t269-s2099008,00.html
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3359674,00.html

MS 'Security Framework' is another .NET vulnerability
In late October 2001, Microsoft's Security Manager
Scott Culp published a missive calling for
'responsible disclosure' of security vulnerability
information on the Internet, claiming it was because
of the public availability of such information that
major Internet security problems or cyber-terrorist
events could occur. His commentary was well-received
by large commercial companies and security vendors,
and panned by nearly everyone else.
http://www.theregister.co.uk/content/55/22816.html

Virus False Alarm Bugs InstallShield Users
Symantec has confirmed that its Norton AntiVirus
software was erroneously detecting a virus in
InstallShield, a popular software installation
tool. Due to an error in virus definition files
dated Nov. 9, Norton AntiVirus reported that
InstallShield was infected with a variant of
the Nimda Internet worm, according to a bulletin
at Symantec's site.
http://www.newsbytes.com/news/01/172115.html

Apple strengthens AirPort security
Apple Computer on Tuesday announced a new version
of its AirPort wireless networking technology, with
software that offers better security and the ability
for Macs to wirelessly connect to the Internet using
America Online. AirPort 2.0 base stations, which use
the 802.11b networking standard, now include a built-
in firewall, along with stronger 128-bit encryption
for added security, and the ability for up to 50
computers to share a single base station.
http://www.zdnet.com/zdnn/stories/news/0,4586,5099557,00.html

Handspring: Security could be our business
Handspring co-founder Jeff Hawkins said demand
for better security technology in the wireless
industry is a potential business opportunity for
his company. In a keynote speech at Comdex Fall
2001, Hawkins identified a number of directions
in which the cell phone and handheld computer
industries are headed, and he identified improved
security as a top concern.
http://news.cnet.com/news/0-1006-200-7865649.html

Gates stresses the need for trustworthy core systems
Security and mobility will be key elements in a
network landscape that will change drastically
over the next five years, Microsoft Corp.
chairman Bill Gates said today in his annual
state of the industry address at the Comdex
Computer trade show in Las Vegas. Gates said
the terrorist attacks of Sept. 11 showed the
need for both physical and digital security
to guard against tragedy.
http://www.gcn.com/vol1_no1/daily-updates/17468-1.html

Personal firewalls could leak private info
Protecting your PC with a personal firewall may
not stop malicious programs sending out personal
information onto the Web. Consumers protecting
their PCs with personal firewalls should not feel
too comfortable in their defence methods, according
to a security researcher.
http://news.zdnet.co.uk/story/0,,t269-s2099013,00.html
http://www.theregister.co.uk/content/55/22788.html

Companies Prepare Airport Security Technology
Imagine this scenario: Upon arrival at the airport,
you show the ticket agent your government-issued
identification card, place your thumb in a
fingerprint reader to verify your identity,
and it gets checked against a database of
known terrorists.
http://www.newsbytes.com/news/01/172079.html

A Novice Tries Steganography
With the war on terrorism and the hunt for those
responsible for the September 11 attacks mounting,
steganography is increasingly in the news. Some
experts theorize the al Qaeda terrorists used
the Internet to plan the attacks, possibly using
steganography to keep their intentions secret.
http://www.techtv.com/cybercrime/privacy/story/0,23008,3359041,00.html

Bug secrecy vs. full disclosure
Microsoft is leading the charge to restrict the free
flow of computer-security vulnerabilities. Last month
Scott Culp, manager of the security response center
at Microsoft, published an essay describing the current
practice of publishing security vulnerabilities to be
"information anarchy." He claimed that we'd all be a
lot safer if researchers would keep details about
vulnerabilities to themselves, and stop arming hackers
with offensive tools. Last week, at Microsoft's Trusted
Computing Forum, Culp announced a new coalition to put
these ideas into practice.
http://www.zdnet.com/zdnn/stories/comment/0,5859,2824251,00.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Universal Inkjet Refill Kit $29.95
Refill any ink cartridge for less!
Includes black and color ink.
http://us.click.yahoo.com/Vv.L9D/MkNDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST