Return-Path: <sentto-279987-4614-1018507162-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 10 Apr 2002 23:42:08 -0700 (PDT) Received: (qmail 9528 invoked by uid 510); 11 Apr 2002 06:39:45 -0000 Received: from n25.grp.scd.yahoo.com (66.218.66.81) by all.net with SMTP; 11 Apr 2002 06:39:45 -0000 X-eGroups-Return: sentto-279987-4614-1018507162-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.193] by n25.grp.scd.yahoo.com with NNFMP; 11 Apr 2002 06:39:23 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_1); 11 Apr 2002 06:39:22 -0000 Received: (qmail 52955 invoked from network); 11 Apr 2002 06:39:22 -0000 Received: from unknown (66.218.66.216) by m11.grp.scd.yahoo.com with QMQP; 11 Apr 2002 06:39:22 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 11 Apr 2002 06:39:21 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3B6fBU12498 for iwar@onelist.com; Wed, 10 Apr 2002 23:41:11 -0700 Message-Id: <200204110641.g3B6fBU12498@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 10 Apr 2002 23:41:11 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 04/10/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit April 10, 2002 FBI information systems still at 'substantial risk' The FBI runs major risks of having its information systems infiltrated despite the agency's recent overhaul efforts, top FBI officials said Tuesday. After the capture of Robert Hanssen, who worked at the FBI for more than 20 years while spying for the Soviet Union, the FBI has taken steps to bolster its security and revamp its information management practices. But Kenneth Senser, the FBI's assistant director for security, told members of the Senate Judiciary Committee that the agency, along with other U.S. intelligence departments, still suffers from the threat of security breaches. http://www.govexec.com/dailyfed/0402/040902td1.htm California Fax Spam Bill Clears State Senate Committee A California State Senate committee Monday approved a bill that would ban the delivery of unsolicited faxes. The bill, S.B. 1358, is sponsored by State Sen. Debra Bowen, D-Redondo Beach, who late last year lost her bid to create an employee e-mail surveillance bill, and won in her efforts to create stronger identity theft protections in California. http://www.newsbytes.com/news/02/175756.html Spam: the ultimate anti-terrorist weapon Junk mail technology could help the fight Spam technology could be the key to defeating terrorism, according to former US president Bill Clinton. Talking to the BBC, Clinton said that information management systems used by junk mail companies could provide an early warning about suspicious behaviour. "More than 95 per cent of the people in the US at any given time are in the computers of companies that send junk mail, and you can look for patterns there," he explained. http://www.vnunet.com/News/1130817 Fed report: Spam destabilising the Net According to Federal Government findings, spam accounts for 10 to 20 percent of e-mail passing through commercial servers and is starting to invade other Internet messaging services. Australia's minister for information technology Senator Richard Alston acknowledged that spam has become a threat to the stability of Internet services in a progress report on the National Office for the Information Economy's (NOIE) investigation into bulk unsolicited e-mail. http://www.zdnet.com.au/newstech/security/story/0,2000024985,20264515,00.htm Net users out to sink anti-piracy bill A digital-copyright bill introduced last month has inspired howls of protest from consumers and high-tech firms who say it could slow technological advances and dictate how consumers listen to music or watch videos at home. Well-connected lobbyists and everyday users alike have flooded Congress with faxes and e-mails over the last several weeks to lodge complaints against a bill that would prevent new computers, CD players and other consumer-electronics devices from playing unauthorized movies, music and other digital media files. http://zdnet.com.com/2100-1106-879629.html Andreessen: Copy protection efforts are doomed http://www.siliconvalley.com/mld/siliconvalley/3031836.htm CD copying war heats up http://news.zdnet.co.uk/story/0,,t269-s2108122,00.html US retailer joins in CD copy protection fracas http://news.zdnet.co.uk/story/0,,t269-s2108111,00.html Professor says Disney, other firms typify what's wrong with copyrights http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3034892.htm Recording industry collects $1 million fine http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3030777.htm Chat rooms a haven for hackers Computer security expert Chad Harrington regularly surfs Internet Relay Chat (IRC), one of the oldest chat technologies on the Web. The IRC networks have names like Dalnet and EFnet, but he agrees that another name works just as well: eBay for hackers. "Once the hacker or someone in the underworld has personal information, credit card numbers, social security numbers, address, whatever it may be," says Harrington, once the hacker "has that information and wants to sell it, often they'll go to a hacker chat room, a place on the Web using an Internet Relay Chat which provides them some anonymity and allows them to mention that they have this personal information and they want to trade. http://www.cnn.com/2002/TECH/internet/04/10/hackers.chat.rooms/index.html Fears of a Security Brain Drain Some computer security professionals are already feeling the pinch from a new Defense Department policy discouraging contractors from hiring non- citizens. The Pentagon says it's about loyalty; visa holders call it classic xenophobia. When the Washington Post reported last month that the U.S. Department of Defense was crafting a new person- nel policy, industry went on red alert. The new policy stated that IT companies with defense contracts would no longer be allowed to employ non-U.S. citizens on unclassified projects. http://online.securityfocus.com/news/367 Cost, Mistrust Hold Back Security Outsourcing Fears about costs and reluctance to trust a third party are holding back firms from outsourcing security. That's among the main conclusions of a survey of 100 IT managers by the McAfee security division of Network Associates, which revealed widespread confusion about the financial pros and cons of letting third parties handle anti-virus protection. http://online.securityfocus.com/news/366 Buffer overloads: the big security hole Last month, Microsoft reissued its buffer-overflow vulnerability announcement for Simple Network Management Protocol (SNMP), which is included within every edition of Windows except Windows Me. This follows Microsoft's announcements earlier this year of buffer-overflow vulnerabilities in ISAPI in Microsoft Commerce Server 2000, Microsoft SQL Server, and Telnet Server in Windows 2000. http://zdnet.com.com/2100-1107-879619.html Agencies need to coordinate homeland security research A great deal of money for homeland security and research for new technologies to combat terrorism is tucked in agency budgets across the government. The trick is to coordinate efforts throughout government to ensure that efforts are not duplicated and that the research results will be effective, senators said during a Wednesday hearing. http://www.govexec.com/dailyfed/0402/041002td3.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> HOW to SEE & RECORD EVERYTHING! TINY Camera for Under $80 BUCKS! PRICE BREAKTHROUGH --> CLICK! http://us.click.yahoo.com/w7toOC/.o6DAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:31 PDT