[iwar] [NewsBits] NewsBits - 11/27/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-11-28 06:28:31


Return-Path: <sentto-279987-3958-1006957606-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 28 Nov 2001 06:29:08 -0800 (PST)
Received: (qmail 32057 invoked by uid 510); 28 Nov 2001 14:27:10 -0000
Received: from n11.groups.yahoo.com (216.115.96.61) by all.net with SMTP; 28 Nov 2001 14:27:10 -0000
X-eGroups-Return: sentto-279987-3958-1006957606-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.4.56] by n11.groups.yahoo.com with NNFMP; 28 Nov 2001 14:26:45 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 28 Nov 2001 14:26:46 -0000
Received: (qmail 68990 invoked from network); 28 Nov 2001 14:26:45 -0000
Received: from unknown (216.115.97.172) by m12.grp.snv.yahoo.com with QMQP; 28 Nov 2001 14:26:45 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2.grp.snv.yahoo.com with SMTP; 28 Nov 2001 14:26:43 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fASESWO31540 for iwar@onelist.com; Wed, 28 Nov 2001 06:28:32 -0800
Message-Id: <200111281428.fASESWO31540@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 28 Nov 2001 06:28:31 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 11/27/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

November 27, 2001

Worm hits home for the holidays
A computer worm that was spreading at an alarming
rate has begun to slow, according to security
experts. Known as as BadTrans.B, the worm installs
hacking software on infected computers. It hit
home e-mail users hard last weekend, but the
damage to corporate consumers was less than
previously anticipated.
http://news.cnet.com/news/0-1003-200-7979449.html

Internet worm that tracks typing still spreading
http://www.siliconvalley.com/docs/news/tech/020757.htm
E-mail virus hits home
http://news.cnet.com/news/0-1005-201-7990483-0.html
'Badtrans' worm still spawns at slower pace
http://www.cnn.com/2001/TECH/internet/11/27/badtrans.update/index.html
Britain invaded by worm
http://www.zdnet.com/zdnn/stories/news/0,4586,2827085,00.html
Badtrans worm leaves back doors, logs data
http://www.computerworld.com/storyba/0,4125,NAV47_STO66067,00.html

Hybrid viruses set to become bigger threat
Viruses which try to infect users through a
variety of means, such as the infamous Nimda
worm, and mass mailers are predicted to become
even more of a problem for Internet users next
year. That's the prediction of anti-virus firm
Sophos which has gazed into the crystal ball
and come up with some predictions for the
threats we'll see next year.
http://www.theregister.co.uk/content/56/23050.html

Nimba, SirCam Most Prevalent Viruses of 2001
Sophos, a Wakefield, Mass., maker of corporate
anti-virus software, said two viruses -- Nimda
and Sircam -- accounted for nearly half of the
reports to its help desk this year. Code Red,
the most hyped virus of the year, does not
appear in the top 10. Sophos has detected
11,160 new viruses, worms and Trojan horses
this year, bringing the total protected against
to almost 70,000. On average, the Sophos virus
labs produce detection routines for over 30
viruses each day.
http://boston.internet.com/news/article/0,1928,2001_929311,00.html

'Lantern' Backdoor Flap Rages
Network Associates has been snared in a web
of accusations over whether it will place backdoors
for the U.S. government in its security software.
Since Network Associates (NETA) makes popular
security products, including McAfee anti-virus
software and Pretty Good Privacy encryption
software, reports of a special arrangement with
the U.S. government have drawn protests and
threats of a boycott.
http://www.wired.com/news/conflict/0,2100,48648,00.html

AV vendors split over FBI Trojan snoops
http://www.theregister.co.uk/content/55/23057.html

Cybersecurity chief pushes early-warning system
The top priorities for the White House Office
of Cyberspace Security include the creation of
both an early-warning network for cyberattacks
and an analysis center that would help the
government target the most vulnerable points
in the nation's critical infrastructure, the
office's chief said last week in an interview
with National Journal's Technology Daily.
http://www.govexec.com/dailyfed/1101/112601td2.htm

White House resurrects plan to track computer break-ins.
White House cybersecurity adviser Richard Clarke
would like to revive a plan for tracking patterns
of computer activity and attempted intrusions at
all government agencies, though the plan has been
controversial in the past.
http://www.govexec.com/dailyfed/1101/112601td1.htm

US assumes global cyber-police authority
Much has been written about the new anti-
terrorism legislation passed by Congress
and signed by President Bush, particularly
as it respects the ability of the government
to conduct surveillance on email, voice-mail,
and other electronic communications.
http://www.theregister.co.uk/content/6/23036.html

Bill would boost Commerce role in computer security.
Citing the failing grades that government agencies
are getting for securing their computer networks,
Reps. Connie Morella, R-Md., House Science
Committee Chairman Sherwood Boehlert, R-N.Y.,
and Rep. Ralph Hall, D-Texas, Tuesday pushed
legislation, H.R. 1249, that would turn the
Commerce Department's National Institute of
Standards and Technology into the official
computer security adviser to federal agencies.
http://www.govexec.com/dailyfed/1101/112701td1.htm

House Ready To Pass Computer Security Bill
The House of Representatives today finished
debate on a bill designed to increase the
National Institute of Standards and Technology's
(NIST) role in enhancing U.S. network
infrastructure security, and appears set to
pass the bill within the next several hours.
http://www.newsbytes.com/news/01/172452.html

Cantwell Introduces Bill To Combat ID Theft
Sen. Maria Cantwell, D-Wash., today introduced
legislation that would broaden the rights of
consumers to obtain information from, and
pursue legal action against credit companies
that don't do enough to prevent identity theft.
http://www.newsbytes.com/news/01/172460.html

House Approves Short Term Export Act Extension
The U.S. House of Representatives today approved
a short-term extension of laws governing the
export of high-performance computers, software
and other sensitive technologies. By a voice
vote, the House passed H.R. 3189, a measure
introduced by House International Relations
Committee Chairman Henry Hyde, R-Ill., to
extend the Export Administration Act (EAA)
until April 20, 2002.
http://www.newsbytes.com/news/01/172461.html

European Union Holds Cybercrime Conference
The European Union has taken several steps to
combat cybercrime, notably heading up initiatives
to confront "harmful and illegal content" on the
Internet, while protecting copyrights and personal
data, an E.U. official said today.
http://www.newsbytes.com/news/01/172449.html

Agencies Prepare To Hit Back At Hackers
A number of federal agencies are preparing
to fight back against hackers who attack their
computer systems. The Veterans Affairs Department
soon will ask industry to help it create an IT
security center that can monitor agency systems
for intrusions, retaliate against hackers, and
gather forensic evidence of intrusions to use
in prosecutions.
http://www.federaltimes.com/issues/iss111901c.html

DTI anti-fraud budget is 'too small'
IT managers say the =A33m fund announced by the
DTI last week will not be of any practical
value to companies or their customers. The
Department of Trade and Industry's =A33m funding
to help firms fight fraud and boost consumer
and business confidence in e-commerce has been
criticised for being too small, and the scale
of government buy-in can only add to IT
managers' problems in gaining budget
approval for security projects.
http://news.zdnet.co.uk/story/0,,t269-s2099868,00.html

Playboy Claims Domain Registered By The Anti-Porn Flynt
The publisher of Playboy magazine has wrested
the Internet domain PlayboyOnline.com from
anti-porn crusaders who appeared to be making
money when stray surfers visited a Web site at
that address. In a decision released last week,
international arbitrators for disputes between
trademark holders and domain registrants ordered
that PlayboyOnline.com be taken away from an
organization founded by Tonya Flynt, the estranged
daughter of Hustler publisher Larry Flynt.
http://www.newsbytes.com/news/01/172451.html

Microsoft touts tightened security of Web services
Microsoft Corp.'s new Web services software will
allow developers to create secure applications
more easily and screen out the kind of unauthorized
commands that are commonly used by malicious
hackers, according to a review commissioned by
the company.
http://www.siliconvalley.com/docs/news/tech/076856.htm
http://www.cnn.com/2001/TECH/internet/11/27/microsoft.security.reut/index.html
http://www.techtv.com/news/hackingandsecurity/story/0,24195,3362329,00.html

This is what Microsoft said about grey imports in 1998
Last year, Levi Strauss & Co refused to allow
UK supermarket chain Tesco to stock its denims.
The jeans manufacturer had spent years and
millions of pounds persuading the Great British
public to stump up =A350 for a pair for the
privilege of wearing the brand.
http://www.theregister.co.uk/content/51/23045.html

Lawyer takes free-speech case to top court
If they had a chance to meet, Ann Beeson and
President Bush just might hit it off. Both hail
from Texas and have that plain, down-home way
of speaking. Both are described as personable
yet passionate. Both are seen as team players.
And both have dedicated their lives to causes.
But they also happen to be on opposite ends of
the political spectrum.
http://www.usatoday.com/life/cyber/tech/2001/11/27/ebrief.htm

Keeping a Who's-Naughty List
London police are planning to register children
who exhibit criminal potential in an effort to
prevent them from developing into full-fledged
lawbreakers. Kids who tag buildings with graffiti,
skip school, or even talk back to adults run the
risk of being entered into a database program
that will be used to monitor their behavior as
they grow up, according to police sources.
http://www.wired.com/news/business/0,1367,48637,00.html

A Brief History of The Worm
"You will REALLY love it when Word is part of
Navigator, and macro viruses will be able to
COMMUNICATE!" - The author in electronic chat,
quoted in 1997. Self-replicating malware has
been an issue in computer security for many
years, dating back at least to Ken Thompson's
self replicating code.
http://www.securityfocus.com/infocus/1515

Users Are the Weakest Link:
Insiders main threat to corporate networks
Companies that would have trouble if asked to
compile a list of their networks' users and detail
the level of access those users have are sitting
ducks for cybersabotage, a group of industry experts
said last week. Weak user passwords, inconsistent
policy enforcement and lackadaisical user-access
management have made corporate network users the
No. 1 cyberthreat to sensitive business data, said
experts during a webcast sponsored by Irvine, Calif.
-based Access360, a company that specializes in
resource provisioning management.
http://www.computerworld.com/storyba/0,4125,NAV47_STO66047,00.html

How instant messaging can jeopardise network security
The use of instant messaging within a company can
slow network performance and expose systems to
hackers and viruses. Jonathan Bennett explains how
good policies and tools can reduce the risks Instant
messaging (IM) over the Internet is a fast-growing
application that allows people to send short text
messages to each other in real time.
http://www.zdnet.co.uk/itweek/brief/2001/45/network/

Security: When rules become the problem
Perhaps the worst thing about the post-Sept. 11
environment is the abandonment of cost-benefit
analysis, or any analysis at all, in the rush
to prove that one has taken every possible
precaution. The result reminds me of descriptions
of the Prohibition era: The rules become the
problem, and people begin to sneer at both the
rules and at those who bother to obey them.
http://www.zdnet.com/zdnn/stories/news/0,4586,2826153,00.html

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST