[iwar] [NewsBits] NewsBits - 02/01/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-02-05 06:32:31


Return-Path: <sentto-279987-4427-1012919460-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 05 Feb 2002 06:33:07 -0800 (PST)
Received: (qmail 1086 invoked by uid 510); 5 Feb 2002 14:31:27 -0000
Received: from n32.groups.yahoo.com (216.115.96.82) by all.net with SMTP; 5 Feb 2002 14:31:27 -0000
X-eGroups-Return: sentto-279987-4427-1012919460-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.188] by n32.groups.yahoo.com with NNFMP; 05 Feb 2002 14:31:00 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 5 Feb 2002 14:30:59 -0000
Received: (qmail 22335 invoked from network); 5 Feb 2002 14:30:58 -0000
Received: from unknown (216.115.97.172) by m2.grp.snv.yahoo.com with QMQP; 5 Feb 2002 14:30:58 -0000
Received: from unknown (HELO red.all.net) (12.232.72.98) by mta2.grp.snv.yahoo.com with SMTP; 5 Feb 2002 14:30:58 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g15EWVc04182 for iwar@onelist.com; Tue, 5 Feb 2002 06:32:31 -0800
Message-Id: <200202051432.g15EWVc04182@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 5 Feb 2002 06:32:31 -0800 (PST)
Subject: [iwar] [NewsBits] NewsBits - 02/01/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

February 1, 2002

World Economic Forum Web site crashes amid cyberthreats
The World Economic Forum's Web site crashed Friday,
and online activists claimed they forced it down in
a "virtual sit-in." Forum officials said they were
trying to determine what brought the site down.
They originally attributed the failure to "overuse,"
but messages posted at the online Independent Media
Center took credit for the crash.
http://www.nandotimes.com/technology/story/236320p-2260761c.html

KaZaA.com 'evaluates' Dutch court ban
KaZaA.com continues to operate its Napster-style
software downloads despite a ruling against its
former owners in a Dutch court. An Amsterdam
district court yesterday ruled KaZaA, the Dutch
software and products firm that founded KaZaA.com,
provided software that encouraged copyright
infringement. It ordered KaZaA to stop the
worldwide distribution of its popular P2P
software.
http://www.theregister.co.uk/content/6/23920.html

E-business edgy after hackers shut British firm
Fears are growing once more that companies operating
on the Internet may not be equipped to ward off
electronic sabotage after anonymous ``hackers''
forced a small British firm out of business.
CloudNine Communications, one of Britain's
oldest Internet Service Providers ISPs),
shut down last week with the loss of eight
jobs in what computer experts believe is
the first instance of a company being
hacked out of existence.
http://www.siliconvalley.com/docs/news/tech/074337.htm
http://www.techtv.com/news/security/story/0,24195,3370593,00.html
http://www.cnn.com/2002/TECH/internet/02/01/hack.attack.reut/index.html

Feds streamline process for battling identity theft
Privacy Rights Clearinghouse ID Theft Affidavit
Get headlines in your inbox with Nando newsletters
A new tool for victims of identity theft may help
them limit the damage when criminals try to run
amok with their financial and personal information.
The Federal Trade Commission, working with financial
companies and consumer groups, has developed an ID
Theft Affidavit, a single form that simplifies the
process of disputing fraudulent debts and new
accounts opened by an identity thief.
http://www.nandotimes.com/technology/story/237001p-2265508c.html

Bush budgets $52 billion for IT
President Bush will seek $52 billion for federal information
technology programs in fiscal 2003, a dramatic 15.6
percent increase stemming from the administration's
focus on using IT to improve government performance
and the response to the Sept. 11 terrorist attacks.
The request to increase the IT budget from $45billion
in fiscal 2002 to $52 billion in fiscal 2003 is
necessary to focus on the three goals outlined in
the president's State of the Union address terrorism,
homeland security and the economy =97 said Mark Forman,
associate director for information technology and
e-government at the Office of Management and Budget.
http://www.fcw.com/fcw/articles/2002/0128/web-budget-02-01-02.asp
http://www.govexec.com/dailyfed/0202/020102h1.htm

Oz Censor Law Still Confuses
Two years after online censorship laws took effect
here, no one -=96 apart from the censors themselves
has much of an idea what's being taken offline.
Opponents say the regime is becoming unaccountable.
The censors say secrecy is vital to fighting child
pornography.  On Jan. 1, 2000, the Australian
Broadcasting Authority (ABA) gained powers to order
Australian Internet content hosts to remove material
deemed overly sexually explicit or violent.
http://www.wired.com/news/business/0,1367,50177,00.html

Peacefire Accuses CyberPatrol Of 'Overblocking'
Anti-Internet-filtering Web site Peacefire.org today
released a scathing review of the CyberPatrol
Internet-blocking software. The software is released
by SurfControl. According to Peacefire's Bennett
Haselton, CyberPatrol has had complaints about
"overblocking" Web sites since 1995. On the group's
site, Haselton said, "it is reasonable to assume that
if problems with the accuracy rate have not been fixed
by now, they are probably inherent in the program."
http://www.newsbytes.com/news/02/174172.html

Microsoft's New Security Chief Was Hacker Hunter
Microsoft's new security czar may not be an expert
in patching holes in software, but he has experience
in hunting down and prosecuting hackers who like
to exploit such vulnerabilities. Scott Charney,
who Microsoft named Thursday as its chief security
strategist, spent most of the 1990s at the U.S.
Department of Justice (DOJ), where he  headed
the division responsible for computer crimes.
http://www.newsbytes.com/news/02/174153.html

US plans crackdown on deceptive junk email
Federal Trade Commission urges users to report spam,
and promises stiff fines for scam artists. Is it too
little, too late? The US government is planning --
for the first time -- to go after "spammers" who
swamp Internet users with deceptive email offers,
Federal Trade Commission officials say. The FTC will
announce enforcement actions as early as next week
against online marketers who use deceptive claims
in their email pitches, said J. Howard Beales,
director of the FTC's enforcement bureau on Friday.
http://news.zdnet.co.uk/story/0,,t269-s2103555,00.html

Group Asks Court To Overturn Unwanted E-Mail Ruling
http://www.newsbytes.com/news/02/174168.html

SMS Spamming Outlawed In Hong Kong
When Hong Kong mobile phone users were given the
ability last December to send text messages to one
another across rival networks there was a fear that
without action by the carriers the amount of short
message spam would skyrocket. But a government
official confirmed this week that the sending of
un-solicited promotional messages on the short
message service (SMS) within mobile phones is
frowned upon and could get the sender's SMS
facility canceled.
http://www.newsbytes.com/news/02/174140.html

FBI wants to share, but how?
The FBI knows the agencies involved in homeland
security need to do a better job of sharing information,
but the bureau is having trouble deciding what to share
with whom, its information resources chief said. The
FBI is willing to share information "with those who
have a need to know. The problem is we don't know
who has a need to know," Mark Tanner, FBI information
resources manager, told technology business
representatives Jan. 31.
http://www.fcw.com/fcw/articles/2002/0128/web-fbi-02-01-02.asp

Mobile immobilising chip to fight crime
An immobiliser chip promises to block stolen mobile
phones, according to its developer, Xilinx. On being
reported stolen, the company's CoolRunner-II chip can
be sent data to block the phone's keypad, Xilinx said,
much like a car immobiliser. "Basically [it] makes
the handset unusable," explained Dave Nicklin,
European market development manager for Xilinx.
http://www.vnunet.com/News/1128891

DoS risks against Cisco storage routers routed
Cisco is advising users to upgrade software on
its line of storage routers after the discovery
of multiple security vulnerabilities involving
the technology. Three vulnerabilities have been
discovered in Cisco SN 5420 Storage Router
software releases up to and including 1.1(5).
http://www.theregister.co.uk/content/55/23916.html

HP fine-tunes recovery, security for PCs
Consumers using Hewlett-Packard PCs now have
new options for disaster recovery, hard-disk upgrades
and online security HP has eased a policy that could
limit how consumers recover their PCs in the event of
hardware failure or when they upgrade hard drives.
http://news.zdnet.co.uk/story/0,,t269-s2103619,00.html

Vast computer-based air security system planned
The U.S. government and technology companies will
soon begin testing a vast air security screening
system that would generate passenger profiles as
well as a wealth of personal information, the
Washington Post reported Friday. The newspaper
said federal aviation authorities plan to build
a computer network linking every reservation
system in the United States to private and
government databases to help authorities identify
potential threats more effectively while easing
lines at airport security checkpoints.
http://www.usatoday.com/life/cyber/tech/2002/02/01/airline-security-system.htm

Parks Cop Burned In Scam Wants Job Back
A national parks cop who once guarded the Statue of
Liberty plans to sue the federal government over his
arrest on charges he raped a Chinese prostitute he met
on the Internet. Richard Koester, 37, says all he wants
is his job back plus the pay he has lost while on
suspension the past 11 months. Koester's globe-spanning
tale of romance, lust and betrayal began last year when
he began flirting with 26-year-old Mau Zheng of Shenzhen,
China, in an America Online chat room.
http://www.nydailynews.com/2002-02-01/News_and_Views/Beyond_the_City/a-14000200.asp

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Sponsored by VeriSign - The Value of Trust
Secure all your Web servers now - with a proven 5-part
strategy. The FREE Server Security Guide shows you how.
http://us.click.yahoo.com/uCuuSA/VdiDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST