Return-Path: <sentto-279987-3901-1006132885-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 18 Nov 2001 17:23:08 -0800 (PST) Received: (qmail 1857 invoked by uid 510); 19 Nov 2001 01:20:07 -0000 Received: from n18.groups.yahoo.com (216.115.96.68) by all.net with SMTP; 19 Nov 2001 01:20:07 -0000 X-eGroups-Return: sentto-279987-3901-1006132885-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.222] by n18.groups.yahoo.com with NNFMP; 19 Nov 2001 01:21:30 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 19 Nov 2001 01:21:24 -0000 Received: (qmail 33598 invoked from network); 19 Nov 2001 01:21:23 -0000 Received: from unknown (216.115.97.167) by m4.grp.snv.yahoo.com with QMQP; 19 Nov 2001 01:21:23 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 19 Nov 2001 01:21:23 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAJ1MON23917 for iwar@onelist.com; Sun, 18 Nov 2001 17:22:24 -0800 Message-Id: <200111190122.fAJ1MON23917@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 18 Nov 2001 17:22:23 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 11/16/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit November 16, 2001 US Muslim Council hacked The American Muslim Council (AMC) is furious after its website was hacked afew days before the start of its holy month of Ramadan. According to a press release issued by the Council on its website, the hacker got into its mail server and planted the Snow White and Seven Dwarfs virus, which then sent the virus to the Council's entire email list. http://www.vnunet.com/News/1126902 Internet An Ideal Tool For Extremists - FBI Modern information technology is facilitating new organizational models used by extremist groups, according to the FBI's National Infrastructure Protection Center (NIPC). Technologies such as Internet relay chat (IRC), Web-based bulletin boards, and free e-mail accounts are enabling extremist groups to adopt a structure known as "leaderless resistance," according to an unclassified document published Nov.10 by the NIPC. http://www.newsbytes.com/news/01/172246.html High-tech crime unit scared of hackers The police National Hi-Tech Crime Unit (NHTCU) has admitted it is scared of going online because the website will be an obvious target for hackers. The NHTCU's website will be launched imminently but it is currently undergoing strenuous testing to ensure there are no security holes that would embarrass the unit. http://www.vnunet.com/News/1126921 Senate Bill Would Alter Supreme Court ID Theft Ruling Senate lawmakers introduced legislation today to clarify that the two-year statute of limitations for identity theft does not start until the consumer becomes aware of the problem. The bill introduced today by Senate Judiciary Committee Chairman Patrick Leahy, D-Vt., and Senate Finance Committee Ranking Republican Charles Grassley, R-Iowa, would alter a Supreme Court ruling issued earlier this week. http://www.newsbytes.com/news/01/172255.html Government not prepared to deploy new security technology Reliable biometric technologies that identify people by their unique physical characteristics are on the market today, but federal agencies aren't taking advantage of them on a wide scale yet, according to industry experts and government officials. http://www.govexec.com/dailyfed/1101/111601h1.htm Ex-lawmakers recommend biometric smart cards to track foreign nationals. Three former members of Congress today told the House Government Reform subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations that the United States should track foreign visitors via identification cards that require fingerprint or iris scans. http://www.gcn.com/vol1_no1/daily-updates/17509-1.html Feinstein-Kyl visa bill stresses value of biometrics http://www.gcn.com/vol1_no1/daily-updates/17505-1.html Congress Reopens Debate On National ID Card http://www.newsbytes.com/news/01/172252.html Emergency data laws 'break Human Rights Act' A Parliamentary committee on human rights has called for safeguards to prevent antiterrorist measures from breaking European laws. Emergency data retention measures are likely to break European human rights laws, a joint Parliamentary committee said on Friday. http://news.zdnet.co.uk/story/0,,t269-s2099399,00.html Confidentiality Claws Researchers at Imperial College, London are developing mathematical and programming techniques to better assess the extent that systems prevent the leakage of confidential information. Typically, models for confidentiality characterise the absence of information flow by trying to establish non-interference between units of a system. It is notoriously difficult to establish such absolutes in a software system. http://www.theregister.co.uk/content/55/22886.html Work needed to minimize threat of attacks on Web, officials say. The Internet's guardians concluded Thursday they can't make the worldwide network immune to terrorism, but they can guard against the most likely risks. Several terrorist-related risks were identified during a three-day meeting of the Internet Corporation for Assigned Names and Numbers, the organization designated by the U.S. government to oversee the Net's address system. http://www.siliconvalley.com/docs/news/tech/086117.htm 'Drive-by' hacking a real threat Wireless networks are vulnerable to hacking - layers of security may be the best defence. X-Force -- an Internet Security Systems anti-hacking team -- takes its job very seriously, even taking to the streets of Sydney for security threat analysis in the form of 'drive-by hacking'. A recent analysis conducted by the X-Force team in Australia tested the security of wireless networks operating within Pitt St, Sydney a major retail and business centre. http://news.zdnet.co.uk/story/0,,t269-s2099348,00.html IP conference: copyright law has gone too far The recording industry and the Business Software Alliance squared off against the Electronic Frontier Foundation and US Rep. Rick Boucher Wednesday in a debate over laws such as the Digital Millennium Copyright Act aimed at protecting large copyright holders, with the hearts and minds of a crowd of Washington, D.C., decision-makers as the prize. http://www.theregister.co.uk/content/6/22876.html Security world skeptical of Microsoft push to keep flaws quiet. When Oy Online Solutions Ltd. discovered that a flaw in Microsoft's Internet Explorer could let hackers steal private user information from Web files known as ``cookies,'' the Finnish company faced a difficult decision. Should it whisper the news to Microsoft so the software giant could fix the problem? Or should it announce the so-called ``bug'' to the world so Explorer users could protect themselves before a hacker discovered the same vulnerability? http://www.siliconvalley.com/docs/news/tech/036564.htm Close the Window on Virus-Prone Outlook In a perfectly normal and rational world, an epidemic that costs global computer users an average of $10 billion a year might be considered something of a crisis. But because this is a world in which nearly every computer is controlled by Microsoft operating systems and programs, we muddle along--aware of the chaos but unwilling to do anything to remedy the situation. http://www.latimes.com/technology/la-000091345nov15.column Effective security starts with policies IT SECURITY POLICIES are the foundation of any security infrastructure, and judging by findings from our 2001 InfoWorld Security Solutions Survey, companies recognize their importance. Of 500 respondents, only 3 percent reported that their companies have no formal security policies. Creating the initial policy, however, is only the first step. http://www.infoworld.com/articles/tc/xml/01/11/19/011119tcpolicy.xml Fingerprinting Port 80 Attacks Port 80 is the standard port for websites, and it can have a lot of different security issues. These holes can allow an attacker to gain either administrative access to the website, or even the web server itself. This paper looks at some of the signatures that are used in these attacks, and what to look for in your logs. http://www.cgisecurity.com/papers/fingerprint-port80.txt Florida slams feds for not sharing antiterror data Florida's top law enforcement officer has blasted the FBI for failing to share data essential to tracking down terrorists. James "Tim" Moore, commissioner of the Florida Department of Law Enforcement, objected to federal data-sharing policies and laws in a recent letter to FBI director Robert S. Mueller III and Homeland Security Office director Tom Ridge. http://www.gcn.com/vol1_no1/daily-updates/17506-1.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> StartMeUp jump starts your car's battery using only the cigarette lighter. $24.95 at Youcansave.com http://us.click.yahoo.com/k4tJlC/LTTDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST