Return-Path: <sentto-279987-4325-1011215617-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 16 Jan 2002 13:16:08 -0800 (PST) Received: (qmail 14500 invoked by uid 510); 16 Jan 2002 21:13:44 -0000 Received: from n11.groups.yahoo.com (216.115.96.61) by all.net with SMTP; 16 Jan 2002 21:13:44 -0000 X-eGroups-Return: sentto-279987-4325-1011215617-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.163] by n11.groups.yahoo.com with NNFMP; 16 Jan 2002 21:13:37 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 16 Jan 2002 21:13:36 -0000 Received: (qmail 18777 invoked from network); 16 Jan 2002 21:13:36 -0000 Received: from unknown (216.115.97.172) by m9.grp.snv.yahoo.com with QMQP; 16 Jan 2002 21:13:36 -0000 Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 16 Jan 2002 21:13:35 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0GLEma10351 for iwar@onelist.com; Wed, 16 Jan 2002 13:14:48 -0800 Message-Id: <200201162114.g0GLEma10351@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 16 Jan 2002 13:14:48 -0800 (PST) Subject: [iwar] News to Use from Infowar.Com 01-16-02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit "News to Use from Infowar.Com" is a periodic output of information relevant to computer security, information warfare, and related genres. If you do not wish to receive this email, please feel free to unsubscribe. Those directions are at the bottom of this email. Infowar.Com PROTECTS your privacy. Your email address is never sold or leased to outside parties. You have received this email because you have JOINED the list, or someone has forwarded this to you. "News to" Use is sponsored by VeriSign - The Value of Trust ============================================================ Protect your servers with 128-bit SSL encryption! Get VeriSign's FREE guide, "Securing Your Web Site for Business." You will learn everything you need to know about using SSL to encrypt your e-commerce transactions for serious online security. Click here! http://www.verisign.com/cgi-bin/go.cgi?a=n146574080057000 1. Education Challenges Hinder Future Tech Workforce - Study 2. Feds Hope To Unplug Cybercrime In N. Va. 3. National Library of Medicine Opens Resource site for biological warfare 4. Systems Fail to Deliver... the digital Pearl Harbor happened 0911 5. CFP: Journal of Information Warfare, Special Edition 6. Low-Tech Humans Subvert High-Tech Information Assurance 7. CERT Report: Computer Security Vulnerabilities Double In '01 8. NIPC published its 84-page year-end wrapup of bugs, exploits, viruses, etc. 9. Congress Takes Up Cybersecurity 10. Homeland Defense: New Rules of War *Book Recommendation: Wireless Security: Models, Threats, and Solutions by Randall K.L Nichols, Panos C. Lekkas Paperback - 657 pages 1st edition (December 13, 2001) McGraw-Hill Professional Publishing; ISBN: 0071380388 Randy did it again! A MUST to add to your library. ================================================================== 1. Education Challenges Hinder Future Tech Workforce - Study The nation's public schools have more computers and are wired to the Internet as never before, yet many teachers lack the basic training needed to integrate the technology into their lesson plans, a report issued today found. http://www.infowar.com/survey/02/survey_011502a_j.shtml ================================================================ 2. Feds Hope To Unplug Cybercrime In N. Va. The FBI and U.S. attorney's office in Alexandria, Va. are launching efforts to fight cybercrime, hoping to head off potential terrorism and prosecute criminal attacks on Northern Virginia's Internet economy. Six prosecutors will work full time on computer crime, including software piracy, economic espionage, online child pornography and terrorist efforts to disrupt the electronic systems of banks, utilities and other institutions. http://www.infowar.com/law/02/law_011502c_j.shtml =============================================================== ======================================================================= 3. National Library of Medicine Opens Resource site for biological warfare. Nice site, check it out! http://www.infowar.com/resource/02/resource_011402a_j.shtml ======================================================================= 4. Systems Fail to Deliver The digital Pearl Harbor the technology world fears already happened Sept. 11, when information technology failed the intelligence community, according to a CIA official. http://www.fcw.com/fcw/articles/2002/0107/web-inqtel-01-11-02.asp ================================================================== 5. Call for Papers Special Edition Cyber Terrorism Journal of Information Warfare Should be emailed to the guest editor by the 31st May, 2002. http://www.infowar.com/papers/02/paper_011102a_j.shtml ====================================================================== 6. Low-Tech Humans Subvert High-Tech Information Assurance- Excellent article by By Col. Alan D. Campen, USAF (Ret.) A worthwhile read! http://www.us.net/signal/CurrentIssue/Jan02/low-jan.html ======================================================================= 7. CERT Report: Computer Security Vulnerabilities Double In '01 Hackers and system administrators alike were busier than ever in 2001, a year that brought a 200 percent increase in computer security incidents and vulnerabilities, according to statistics published Thursday. More than 52,000 "incidents, including Web site attacks, malicious viruses and network intrusions, were reported in 2001, according to the Computer Emergency Response Team (CERT), the federally funded computer security clearinghouse at Pittsburgh's Carnegie Mellon University. The numbers are up from 21,756 the previous year, CERT indicates. To put the figures into perspective, incidents reported last year accounted for more than half of all attacks reported since 1988, the first year CERT began keeping records. The report is located at: http://www.cert.org/stats/cert_stats.html ================================================================= 8. NIPC published its 84-page year-end wrapup of bugs, exploits, viruses, trojans, etc. at a quick glance, it appears reasonably complete and useful. Download at: http://www.nipc.gov/cybernotes/2001/cyberissue2001-26.pdf ================================================================ 9. Congress Takes Up Cybersecurity Lawmakers are moving to beef up the nation's information security with legislation that would provide more than $870 million over five years for a wide range of research and education grants. The Cybersecurity Research and Development Act, introduced Dec. 4 by Rep. Sherwood Boehlert, R-N.Y., and five co-sponsors, would allocate more than $560 million to the National Science Foundation. With the funds, the foundation would administer grants for educational programs and basic research on computer security techniques and technologies, including authentication, encryption, intrusion detection, reliability, privacy and confidentiality. (snip) http://www.newsbytes.com/news/02/173655.html ===================================================================== 10. Homeland Defense: New Rules of War- THE WAR AGAINST terrorism is forcing government and business to forge new alliances. Federal government actions since Sept. 11, including legislation enacted by Congress and policies issued by the White House, aim to broaden cooperation between the private sector and law enforcement officials charged with counter-terrorism efforts. Those actions include new ways companies can work with government using IT to thwart conventional attacks, and there are more to come. Every week brings new government proposals to get companies more involved in homeland defense. http://www.cio.com/archive/011502/defense.html News to Use Jan. 16, 2002 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Sponsored by VeriSign - The Value of Trust Secure all your Web servers now - with a proven 5-part strategy. The FREE Server Security Guide shows you how. http://us.click.yahoo.com/uCuuSA/VdiDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST