[iwar] [NewsBits] NewsBits - 11/16/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-11-18 17:22:23


Return-Path: <sentto-279987-3901-1006132885-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 18 Nov 2001 17:23:08 -0800 (PST)
Received: (qmail 1857 invoked by uid 510); 19 Nov 2001 01:20:07 -0000
Received: from n18.groups.yahoo.com (216.115.96.68) by all.net with SMTP; 19 Nov 2001 01:20:07 -0000
X-eGroups-Return: sentto-279987-3901-1006132885-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.1.222] by n18.groups.yahoo.com with NNFMP; 19 Nov 2001 01:21:30 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 19 Nov 2001 01:21:24 -0000
Received: (qmail 33598 invoked from network); 19 Nov 2001 01:21:23 -0000
Received: from unknown (216.115.97.167) by m4.grp.snv.yahoo.com with QMQP; 19 Nov 2001 01:21:23 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 19 Nov 2001 01:21:23 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAJ1MON23917 for iwar@onelist.com; Sun, 18 Nov 2001 17:22:24 -0800
Message-Id: <200111190122.fAJ1MON23917@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 18 Nov 2001 17:22:23 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 11/16/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

November 16, 2001

US Muslim Council hacked The American Muslim Council (AMC) is furious
after its website was hacked afew days before the start of its holy
month of Ramadan.  According to a press release issued by the Council on
its website, the hacker got into its mail server and planted the Snow
White and Seven Dwarfs virus, which then sent the virus to the Council's
entire email list.  http://www.vnunet.com/News/1126902

Internet An Ideal Tool For Extremists - FBI Modern information
technology is facilitating new organizational models used by extremist
groups, according to the FBI's National Infrastructure Protection Center
(NIPC).  Technologies such as Internet relay chat (IRC), Web-based
bulletin boards, and free e-mail accounts are enabling extremist groups
to adopt a structure known as "leaderless resistance," according to an
unclassified document published Nov.10 by the NIPC. 
http://www.newsbytes.com/news/01/172246.html

High-tech crime unit scared of hackers The police National Hi-Tech Crime
Unit (NHTCU) has admitted it is scared of going online because the
website will be an obvious target for hackers.  The NHTCU's website will
be launched imminently but it is currently undergoing strenuous testing
to ensure there are no security holes that would embarrass the unit. 
http://www.vnunet.com/News/1126921

Senate Bill Would Alter Supreme Court ID Theft Ruling Senate lawmakers
introduced legislation today to clarify that the two-year statute of
limitations for identity theft does not start until the consumer becomes
aware of the problem.  The bill introduced today by Senate Judiciary
Committee Chairman Patrick Leahy, D-Vt., and Senate Finance Committee
Ranking Republican Charles Grassley, R-Iowa, would alter a Supreme Court
ruling issued earlier this week. 
http://www.newsbytes.com/news/01/172255.html

Government not prepared to deploy new security technology Reliable
biometric technologies that identify people by their unique physical
characteristics are on the market today, but federal agencies aren't
taking advantage of them on a wide scale yet, according to industry
experts and government officials. 
http://www.govexec.com/dailyfed/1101/111601h1.htm

Ex-lawmakers recommend biometric smart cards to track foreign nationals. 
Three former members of Congress today told the House Government Reform
subcommittee on Government Efficiency, Financial Management and
Intergovernmental Relations that the United States should track foreign
visitors via identification cards that require fingerprint or iris
scans.  http://www.gcn.com/vol1_no1/daily-updates/17509-1.html

Feinstein-Kyl visa bill stresses value of biometrics
http://www.gcn.com/vol1_no1/daily-updates/17505-1.html Congress Reopens
Debate On National ID Card http://www.newsbytes.com/news/01/172252.html

Emergency data laws 'break Human Rights Act' A Parliamentary committee
on human rights has called for safeguards to prevent antiterrorist
measures from breaking European laws.  Emergency data retention measures
are likely to break European human rights laws, a joint Parliamentary
committee said on Friday. 
http://news.zdnet.co.uk/story/0,,t269-s2099399,00.html

Confidentiality Claws Researchers at Imperial College, London are
developing mathematical and programming techniques to better assess the
extent that systems prevent the leakage of confidential information. 
Typically, models for confidentiality characterise the absence of
information flow by trying to establish non-interference between units
of a system.  It is notoriously difficult to establish such absolutes in
a software system.  http://www.theregister.co.uk/content/55/22886.html

Work needed to minimize threat of attacks on Web, officials say.  The
Internet's guardians concluded Thursday they can't make the worldwide
network immune to terrorism, but they can guard against the most likely
risks.  Several terrorist-related risks were identified during a
three-day meeting of the Internet Corporation for Assigned Names and
Numbers, the organization designated by the U.S.  government to oversee
the Net's address system. 
http://www.siliconvalley.com/docs/news/tech/086117.htm

'Drive-by' hacking a real threat Wireless networks are vulnerable to
hacking - layers of security may be the best defence.  X-Force -- an
Internet Security Systems anti-hacking team -- takes its job very
seriously, even taking to the streets of Sydney for security threat
analysis in the form of 'drive-by hacking'.  A recent analysis conducted
by the X-Force team in Australia tested the security of wireless
networks operating within Pitt St, Sydney a major retail and business
centre.  http://news.zdnet.co.uk/story/0,,t269-s2099348,00.html

IP conference: copyright law has gone too far The recording industry and
the Business Software Alliance squared off against the Electronic
Frontier Foundation and US Rep.  Rick Boucher Wednesday in a debate over
laws such as the Digital Millennium Copyright Act aimed at protecting
large copyright holders, with the hearts and minds of a crowd of
Washington, D.C., decision-makers as the prize. 
http://www.theregister.co.uk/content/6/22876.html

Security world skeptical of Microsoft push to keep flaws quiet.  When Oy
Online Solutions Ltd.  discovered that a flaw in Microsoft's Internet
Explorer could let hackers steal private user information from Web files
known as ``cookies,'' the Finnish company faced a difficult decision. 
Should it whisper the news to Microsoft so the software giant could fix
the problem? Or should it announce the so-called ``bug'' to the world so
Explorer users could protect themselves before a hacker discovered the
same vulnerability?
http://www.siliconvalley.com/docs/news/tech/036564.htm

Close the Window on Virus-Prone Outlook In a perfectly normal and
rational world, an epidemic that costs global computer users an average
of $10 billion a year might be considered something of a crisis.  But
because this is a world in which nearly every computer is controlled by
Microsoft operating systems and programs, we muddle along--aware of the
chaos but unwilling to do anything to remedy the situation. 
http://www.latimes.com/technology/la-000091345nov15.column

Effective security starts with policies IT SECURITY POLICIES are the
foundation of any security infrastructure, and judging by findings from
our 2001 InfoWorld Security Solutions Survey, companies recognize their
importance.  Of 500 respondents, only 3 percent reported that their
companies have no formal security policies.  Creating the initial
policy, however, is only the first step. 
http://www.infoworld.com/articles/tc/xml/01/11/19/011119tcpolicy.xml

Fingerprinting Port 80 Attacks Port 80 is the standard port for
websites, and it can have a lot of different security issues.  These
holes can allow an attacker to gain either administrative access to the
website, or even the web server itself.  This paper looks at some of the
signatures that are used in these attacks, and what to look for in your
logs.  http://www.cgisecurity.com/papers/fingerprint-port80.txt

Florida slams feds for not sharing antiterror data Florida's top law
enforcement officer has blasted the FBI for failing to share data
essential to tracking down terrorists.  James "Tim" Moore, commissioner
of the Florida Department of Law Enforcement, objected to federal
data-sharing policies and laws in a recent letter to FBI director Robert
S.  Mueller III and Homeland Security Office director Tom Ridge. 
http://www.gcn.com/vol1_no1/daily-updates/17506-1.html


------------------------ Yahoo! Groups Sponsor ---------------------~-->
StartMeUp jump starts your car's battery
using only the cigarette lighter.
$24.95 at Youcansave.com
http://us.click.yahoo.com/k4tJlC/LTTDAA/ySSFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST