[iwar] [NewsBits] NewsBits - 04/08/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-04-10 21:24:49


Return-Path: <sentto-279987-4612-1018498982-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 10 Apr 2002 21:27:12 -0700 (PDT)
Received: (qmail 6582 invoked by uid 510); 11 Apr 2002 04:23:51 -0000
Received: from n3.grp.scd.yahoo.com (66.218.66.86) by all.net with SMTP; 11 Apr 2002 04:23:51 -0000
X-eGroups-Return: sentto-279987-4612-1018498982-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.194] by n3.grp.scd.yahoo.com with NNFMP; 11 Apr 2002 04:23:02 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_1); 11 Apr 2002 04:23:02 -0000
Received: (qmail 16519 invoked from network); 11 Apr 2002 04:23:02 -0000
Received: from unknown (66.218.66.216) by m12.grp.scd.yahoo.com with QMQP; 11 Apr 2002 04:23:02 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 11 Apr 2002 04:23:01 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3B4OoX15230 for iwar@onelist.com; Wed, 10 Apr 2002 21:24:50 -0700
Message-Id: <200204110424.g3B4OoX15230@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 10 Apr 2002 21:24:49 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 04/08/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

April 8, 2002

MS gets leaked Win2k USB 2.0 drivers pulled, cites DMCA
Microsoft has acted to suppress unofficial/
unauthorised sources for the USB 2.0 drivers
for Windows 2000, citing the Digital Millennium
Copyright Act in a complaint to the hosting
company of Littlewhitedog.com, (LWD) which
has been hosting leaked drivers since January.
In response LWD has pulled the drivers, and
the other site hosting them, Digital Silence,
has also deemed it prudent to cease and desist,
with some encouragement from its host. Which
doesn't mean the drivers aren't still out
there, but it does mean they've been pretty
much consigned to warezland, Microsoft having
made it clear by its actions that anybody not
in a position to run and hide is going to get
a take-down.
http://www.theregister.co.uk/content/4/24749.html

FBI: Businesses Loath To Report Hacks
Ninety percent of businesses and government
agencies suffered hacker attacks within the
past year, yet only a third of those businesses
reported the intrusions to law enforcement,
an FBI survey found. While 80 percent of the
respondents acknowledged financial losses due
to computer attacks, only 44 percent were
willing or able to quantify the damage,
according to survey results released Sunday
by the FBI. Seventy-eight percent said
employees had abused their Internet access
privileges by downloading pornography or
pirated software. Eighty-five percent
detected computer viruses on their networks.
http://online.securityfocus.com/news/364
http://www.newsfactor.com/perl/story/17146.html
http://www.newsbytes.com/news/02/175718.html
http://www.cnn.com/2002/TECH/internet/04/07/cybercrime.survey/index.html
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1916000/1916655.stm
http://www.usatoday.com/life/cyber/tech/2002/04/08/fbi-survey.htm
http://www.theregister.co.uk/content/6/24747.html
http://www.nandotimes.com/technology/story/347520p-2853392c.html

Researcher bemoans 'blunders waiting to happen'
A technology researcher at Berkeley, University
of California, has described distributed computing
systems that connect to a central server as security
blunders waiting to happen. The warning follows the
news last week that peer-to-peer file sharing
software Kazaa contains a Trojan that puts millions
of machines at risk. In a federal securities filing
last week, it was revealed that Kazaa contains
another program designed to create a second
underlying distributed computing network made up
of unwitting Kazaa users. Brilliant Digital Media,
the company behind the stealth peer-to-peer software,
known as Altnet, plans to activate the software on
users' machines in the next few weeks to be used
for distributed computing.
http://www.vnunet.com/News/1130726

New Defense Against Hack Attacks
'If someone has built up a relatively large
attack network with 1,000 machines, you're
going to want to find out what's attacking,'
SecurityFocus incident analyst Ryan Russell
told NewsFactor. 'However, how long is it
going to take you to clean up 1,000 boxes?'
A University of Massachusetts Amherst
researcher claims to have come up with a new
approach to denial-of-service (DoS) attacks,
tracking the source of such onslaughts using
just a single bit of information added to
Internet messages.
http://www.newsfactor.com/perl/story/17141.html

FBI's new Cyber Division quietly ramps up
To the surprise of many people in government
and in the technology industry, the FBI has
been quietly forming its new Cyber Division.
The first formal announcement of the division
indirectly was made Tuesday, when FBI Director
Robert Mueller announced the appointment of
Larry Mefford as assistant director of the
division. Mefford is associate special agent
in charge of the San Francisco FBI field office.
http://www.govexec.com/dailyfed/0402/040802td1.htm

Flyzik will advise Ridge on IT
Starting April 15, James Flyzik will go on
detail as the senior adviser for IT on homeland
security director Tom Ridge=92s staff. Flyzik,
acting assistant secretary for information
systems at the Treasury Department, discussed
his new assignment Saturday at the 4th Annual
Connect for a Cure Black-Tie Gala to benefit
the Juvenile Diabetes Research Foundation.
=93I decided that I needed to do something to
support homeland security,=94 said Flyzik, also
Treasury=92s CIO. The new charge is not a burden,
he said, adding that he has always been proud
to be a federal employee.
http://www.gcn.com/vol1_no1/daily-updates/18341-1.html

Outflanking the Cyberterrorist Threat
While cyberterrorism may not be an immediate
threat, it would be foolish not to recognize
that the U.S. is facing a "thinking enemy"
who will adapt to attack our critical
infrastructures and vulnerabilities, says
Ruth David, former director for science and
technology at the CIA. David is now president
and CEO of Analytic Services Inc., an
independent, not-for-profit, public service
research institution in Arlington, Va. She and
Bill Crowell, CEO of Santa Clara, Calif.-based
security firm Cylink Corp. and a former deputy
director of the supersecret National Security
Agency, each participated in rare interviews
with Computerworld's Dan Verton. They discussed
the threats posed by cyberterrorist attacks and
the steps that the public and private sectors
should take to thwart them.
http://www.computerworld.com/storyba/0,4125,NAV47_STO69866,00.html
- - - - - - - -
Watch out for pop-up downloads
Web surfers who thought online advertisements
were becoming increasingly obtrusive may be
dismayed by a new tactic: pop-up downloads. In
recent weeks, some software makers have enlisted
Web site operators to entice their visitors to
download software rather than simply to view
some advertising. For example, when visiting
a site a person may receive a pop-up box that
appears as a security warning with the message:
"Do you accept this download?" If the consumer
clicks "Yes," an application is automatically
installed.
http://zdnet.com.com/2100-1106-877592.html
http://news.zdnet.co.uk/story/0,,t269-s2107900,00.html
http://news.com.com/2100-1023-877568.html
http://www.newsbytes.com/news/02/175703.html
- - - - - - - -
Service providers as speech police?
Legal protections generate complex disputes.
A 1998 federal law meant to combat digital
piracy is increasingly being used to challenge
free speech online as well. In one recent case,
the search engine Google removed links to a
Norwegian site that criticizes the Church of
Scientology International after the organization
complained of copyright violations.
http://www.cnn.com/2002/TECH/internet/04/07/online.speech.police.ap/index.h=
tml

HDTV advocates join copy-protection fray
http://www.usatoday.com/life/cyber/tech/2002/04/08/digitaltv-usat.htm
Proposed copyright law raises controversy
http://www.sfgate.com/cgi-bin/article.cgi?file=3D/chronicle/archive/2002/04=
/08=20
/BU140716.DTL

BMG puts kibosh on copying promo CDs
BMG Entertainment, the major record company
owned by German media giant Bertelsmann, said
it will begin this month to protect promotional
releases of its CDs against copying. That means
free samples of new albums sent to U.S. radio
stations, retailers and the press will come
packaged with software that prevents songs from
being copied onto computer hard drives. BMG will
begin the trials with the April promo releases
from artists Cee-Lo and Donnel Jones.
http://news.com.com/2100-1023-877933.html

IPod: Music to Hackers' Ears
Jean-Olivier Lanct=F4t-David is a 14-year-old
hacker who has figured out a way to display
online news headlines on Apple's iPod digital
music player. Lanct=F4t-David, who has been
using Macs since he was 4 and programming
since he was 11, was given an iPod for
Christmas and immediately wanted to make
it do more than just play music.
http://www.wired.com/news/mac/0,2125,51586,00.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
SALE --> Wireless Video Cameras
for Home Surveillance! VERY TINY! PRICE BREAKTHROUGH - $79.99!
http://us.click.yahoo.com/W0toNC/7o6DAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:31 PDT