[iwar] [NewsBits] NewsBits - 04/26/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-04-28 07:43:58


Return-Path: <sentto-279987-4630-1020004850-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 28 Apr 2002 07:48:08 -0700 (PDT)
Received: (qmail 6856 invoked by uid 510); 28 Apr 2002 14:43:48 -0000
Received: from n15.grp.scd.yahoo.com (66.218.66.70) by all.net with SMTP; 28 Apr 2002 14:43:48 -0000
X-eGroups-Return: sentto-279987-4630-1020004850-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.199] by n15.grp.scd.yahoo.com with NNFMP; 28 Apr 2002 14:42:12 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_1); 28 Apr 2002 14:40:49 -0000
Received: (qmail 26957 invoked from network); 28 Apr 2002 14:40:46 -0000
Received: from unknown (66.218.66.218) by m6.grp.scd.yahoo.com with QMQP; 28 Apr 2002 14:40:46 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 28 Apr 2002 14:40:46 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3SEhwJ11204 for iwar@onelist.com; Sun, 28 Apr 2002 07:43:58 -0700
Message-Id: <200204281443.g3SEhwJ11204@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 28 Apr 2002 07:43:58 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 04/26/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

April 26, 2002

Thieves leave capital gridlocked
Santiago's traffic management system stolen
Chile's capital Santiago was bought to a standstill
yesterday after burglars stole computers used to
co-ordinate the city's traffic lights. Police said
that traffic was in chaos after the thieves broke
into the office of the Traffic Control Centre
overnight and took 17 computers.
http://www.vnunet.com/News/1131302
http://www.wired.com/news/business/0,1367,52114,00.html

Earthlink co-founder surrenders to face fraud charges
Financial adviser Reed Slatkin surrendered
Thursday to face charges that he ran a fraud
scheme that bilked investors out of at least
$254 million. Slatkin, 53, who also co-founded
Internet company EarthLink Inc., appeared in
federal court and was ordered detained pending
a scheduled Monday arraignment on 15 felony
counts of mail fraud, wire fraud, money
laundering and conspiracy to obstruct justice.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3139397.htm

FAA Confirms Hack Attack
Self-styled patriotic intruders deface a government
airline security site and download a detailed
screener database. Their proclaimed mission:
saving the U.S. from foreign cyber terrorists.
Hackers were able to penetrate a Federal Aviation
Administration system earlier this week and
download unpublished information on airport
passenger screening activities, federal
officials confirmed Thursday.
http://online.securityfocus.com/news/378
http://www.theregister.co.uk/content/55/25029.html

Klez threat upgraded to 'severe'
Over 3,000 infections a day during March Antivirus
experts have upgraded the Klez virus threat in
response to an overwhelming number of submissions
of infected material. Security firm Symantec
reported seeing "a few thousand" just yesterday.
Klez retained the number one position of most
infectious viruses throughout March, and it looks
like April will be no different, according to the
statistics.
http://www.vnunet.com/News/1131284

Hybrid threats overtake DoS attacks
Latest X-Force report paints a grim picture
Internet-facing devices are likely to be
compromised less than a day after being
connected, and hybrid threats have overtaken
denial of service (DoS) attacks as the biggest
security bugbear. The Internet Risk Impact
Summary for the first quarter of  2002,
released this week by Internet Security
Systems' white hat hacker unit X-Force,
painted a grim picture for IT administrators.
http://www.vnunet.com/News/1131294

Lab will help FBI crack high-tech cases
High-tech crime isn't just for high-tech criminals
anymore. Confined mostly to corporate insiders
and high-tech hackers only five years ago, computers
have become an everyday tool for everyday criminals.
Drug dealers are communicating by e-mail, and do-it-
yourself counterfeiters are using a $19.95 software
program to print phony checks. One California bank
robber's stick-up note had been typed out using
Microsoft Word and printed on his home computer
printer.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3145543.htm

Security Agents Head For Cybercrime School
Security agents from both sides of the Atlantic
are being sent to school so they can trace and
prosecute computer criminals. The FBI, U.S.
Customs, the High Technology Crime Investigation
Association, Europol and the U.K.'s National
High-Tech Crime Unit are among the agencies
that have sent staff to learn about cybercrime,
fraud, hacking and software bugs, according to
the company, Massachusetts-based QinetiQ
Trusted Information Management.
http://www.newsbytes.com/news/02/176176.html

Industry hails cyber R&D bill
When the Senate went to work on legislation to
pump $878 million into cybersecurity research
and development, it got no argument from
representatives of industry and academia. Sen.
Ron Wyden (D-Ore.) convened a panel of scientists
and businessmen April 24 who unanimously praised
the Cyber Security Research and Development Act
as a step toward correcting chronic underfunding
in computer security research.
http://www.fcw.com/fcw/articles/2002/0422/web-leg-04-26-02.asp

Cyberwargames: Cadets hone security skill
Systems administrator David Riebrandt's first
hint that intruders had hacked the military
network came from telltale electronic footprints.
 From the logs--electronic records of the information
passed on the network--it quickly became evident
that a server with gate-keeping control over
different parts of the system was getting
downright chatty with a foreign computer via
the Internet. "I didn't know what the information
meant," said Riebrandt. "I just knew that someone
was talking to (the server). And it was talking
back."
http://news.com.com/2100-1001-893314.html

Datawiping doesn't work
eTesting Labs has run a series of tests of eight
commercial available diskwiping products - and only
one of them worked properly. This is Redemtech
Data Erasure, from the company which contracted
eTesting to run the trials. So the results should
be treated with caution. The eight products were
run on six variously configured PCs.
http://www.theregister.co.uk/content/54/25034.html

Crackers favour war dialling and weak passwords
With all the talk about zero day exploits and
sometimes esoteric vulnerabilities its easy to
lose sight of the role of older, less sophisticated
techniques as a mainstay of cracker activity.
During a hacking debate at InfoSecurity Europe
yesterday, black hat hacker KP said that when
he broke into a network he did so 90 per cent
of the time through an unprotected modem, often
through war dialling.
http://www.theregister.co.uk/content/55/25044.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tied to your PC? Cut Loose and
Stay connected with Yahoo! Mobile
http://us.click.yahoo.com/QBCcSD/o1CEAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT