Return-Path: <sentto-279987-4630-1020004850-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 28 Apr 2002 07:48:08 -0700 (PDT) Received: (qmail 6856 invoked by uid 510); 28 Apr 2002 14:43:48 -0000 Received: from n15.grp.scd.yahoo.com (66.218.66.70) by all.net with SMTP; 28 Apr 2002 14:43:48 -0000 X-eGroups-Return: sentto-279987-4630-1020004850-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.199] by n15.grp.scd.yahoo.com with NNFMP; 28 Apr 2002 14:42:12 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_1); 28 Apr 2002 14:40:49 -0000 Received: (qmail 26957 invoked from network); 28 Apr 2002 14:40:46 -0000 Received: from unknown (66.218.66.218) by m6.grp.scd.yahoo.com with QMQP; 28 Apr 2002 14:40:46 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 28 Apr 2002 14:40:46 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3SEhwJ11204 for iwar@onelist.com; Sun, 28 Apr 2002 07:43:58 -0700 Message-Id: <200204281443.g3SEhwJ11204@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 28 Apr 2002 07:43:58 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 04/26/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit April 26, 2002 Thieves leave capital gridlocked Santiago's traffic management system stolen Chile's capital Santiago was bought to a standstill yesterday after burglars stole computers used to co-ordinate the city's traffic lights. Police said that traffic was in chaos after the thieves broke into the office of the Traffic Control Centre overnight and took 17 computers. http://www.vnunet.com/News/1131302 http://www.wired.com/news/business/0,1367,52114,00.html Earthlink co-founder surrenders to face fraud charges Financial adviser Reed Slatkin surrendered Thursday to face charges that he ran a fraud scheme that bilked investors out of at least $254 million. Slatkin, 53, who also co-founded Internet company EarthLink Inc., appeared in federal court and was ordered detained pending a scheduled Monday arraignment on 15 felony counts of mail fraud, wire fraud, money laundering and conspiracy to obstruct justice. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3139397.htm FAA Confirms Hack Attack Self-styled patriotic intruders deface a government airline security site and download a detailed screener database. Their proclaimed mission: saving the U.S. from foreign cyber terrorists. Hackers were able to penetrate a Federal Aviation Administration system earlier this week and download unpublished information on airport passenger screening activities, federal officials confirmed Thursday. http://online.securityfocus.com/news/378 http://www.theregister.co.uk/content/55/25029.html Klez threat upgraded to 'severe' Over 3,000 infections a day during March Antivirus experts have upgraded the Klez virus threat in response to an overwhelming number of submissions of infected material. Security firm Symantec reported seeing "a few thousand" just yesterday. Klez retained the number one position of most infectious viruses throughout March, and it looks like April will be no different, according to the statistics. http://www.vnunet.com/News/1131284 Hybrid threats overtake DoS attacks Latest X-Force report paints a grim picture Internet-facing devices are likely to be compromised less than a day after being connected, and hybrid threats have overtaken denial of service (DoS) attacks as the biggest security bugbear. The Internet Risk Impact Summary for the first quarter of 2002, released this week by Internet Security Systems' white hat hacker unit X-Force, painted a grim picture for IT administrators. http://www.vnunet.com/News/1131294 Lab will help FBI crack high-tech cases High-tech crime isn't just for high-tech criminals anymore. Confined mostly to corporate insiders and high-tech hackers only five years ago, computers have become an everyday tool for everyday criminals. Drug dealers are communicating by e-mail, and do-it- yourself counterfeiters are using a $19.95 software program to print phony checks. One California bank robber's stick-up note had been typed out using Microsoft Word and printed on his home computer printer. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3145543.htm Security Agents Head For Cybercrime School Security agents from both sides of the Atlantic are being sent to school so they can trace and prosecute computer criminals. The FBI, U.S. Customs, the High Technology Crime Investigation Association, Europol and the U.K.'s National High-Tech Crime Unit are among the agencies that have sent staff to learn about cybercrime, fraud, hacking and software bugs, according to the company, Massachusetts-based QinetiQ Trusted Information Management. http://www.newsbytes.com/news/02/176176.html Industry hails cyber R&D bill When the Senate went to work on legislation to pump $878 million into cybersecurity research and development, it got no argument from representatives of industry and academia. Sen. Ron Wyden (D-Ore.) convened a panel of scientists and businessmen April 24 who unanimously praised the Cyber Security Research and Development Act as a step toward correcting chronic underfunding in computer security research. http://www.fcw.com/fcw/articles/2002/0422/web-leg-04-26-02.asp Cyberwargames: Cadets hone security skill Systems administrator David Riebrandt's first hint that intruders had hacked the military network came from telltale electronic footprints. From the logs--electronic records of the information passed on the network--it quickly became evident that a server with gate-keeping control over different parts of the system was getting downright chatty with a foreign computer via the Internet. "I didn't know what the information meant," said Riebrandt. "I just knew that someone was talking to (the server). And it was talking back." http://news.com.com/2100-1001-893314.html Datawiping doesn't work eTesting Labs has run a series of tests of eight commercial available diskwiping products - and only one of them worked properly. This is Redemtech Data Erasure, from the company which contracted eTesting to run the trials. So the results should be treated with caution. The eight products were run on six variously configured PCs. http://www.theregister.co.uk/content/54/25034.html Crackers favour war dialling and weak passwords With all the talk about zero day exploits and sometimes esoteric vulnerabilities its easy to lose sight of the role of older, less sophisticated techniques as a mainstay of cracker activity. During a hacking debate at InfoSecurity Europe yesterday, black hat hacker KP said that when he broke into a network he did so 90 per cent of the time through an unprotected modem, often through war dialling. http://www.theregister.co.uk/content/55/25044.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tied to your PC? Cut Loose and Stay connected with Yahoo! Mobile http://us.click.yahoo.com/QBCcSD/o1CEAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT