[iwar] [NewsBits] NewsBits - 05/06/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-05-07 17:36:31


Return-Path: <sentto-279987-4645-1020818153-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 07 May 2002 17:54:08 -0700 (PDT)
Received: (qmail 4476 invoked by uid 510); 8 May 2002 00:52:31 -0000
Received: from n24.grp.scd.yahoo.com (66.218.66.80) by all.net with SMTP; 8 May 2002 00:52:31 -0000
X-eGroups-Return: sentto-279987-4645-1020818153-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.197] by n24.grp.scd.yahoo.com with NNFMP; 08 May 2002 00:35:53 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 8 May 2002 00:35:52 -0000
Received: (qmail 86226 invoked from network); 8 May 2002 00:35:52 -0000
Received: from unknown (66.218.66.218) by m4.grp.scd.yahoo.com with QMQP; 8 May 2002 00:35:52 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 8 May 2002 00:35:52 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g480aVN18016 for iwar@onelist.com; Tue, 7 May 2002 17:36:31 -0700
Message-Id: <200205080036.g480aVN18016@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 7 May 2002 17:36:31 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 05/06/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

May 6, 2002

'Spidey' Already Being Swapped By Online Pirates
While Columbia Picture's new "Spider-Man" movie
was breaking box-office records over the weekend,
Internet movie pirates were busily downloading
free copies of the film on file-trading networks.
By Saturday, pirated versions of the comic book
inspired movie were showing up in "screener"
format on the EDonkey, Kazaa, and Morpheus
Internet file-swapping systems.
http://www.newsbytes.com/news/02/176387.html

ISP Can Finally Disconnect Spammer, Court Rules
After more than a year of battling with bulk
e-mailer MonsterHut, a Rochester-based Internet
service provider (ISP) has been given permission
by a New York State appeals court to disconnect
the company it says is a notorious spammer. The
decision Friday reversed lower court rulings last
year that kept MonsterHut.com online even though
PaeTec Communications of Fairport, N.Y., near
Rochester, said MonsterHut had contravened its
anti-spam policy.
http://www.newsbytes.com/news/02/176381.html

Domain owners could face the slammer
People who provide false data when registering
a domain name on the Web could be thrown into
jail for up to five years, if a recently
introduced bill becomes law. Reps. Howard Berman,
D-Calif., and Howard Coble, R-N.C., introduced
the legislation Thursday, targeting Internet
address registration procedures that make it
easier for Web site publishers to stay
anonymous.
http://zdnet.com.com/2100-1106-900448.html
http://news.com.com/2100-1023-900342.html
http://www.newsbytes.com/news/02/176407.html
http://www.newsbytes.com/news/02/176371.html

Midwest Express hackers cause a stir
The self-proclaimed "Deceptive Duo" that hacked
into Midwest Express Airlines' intranet say their
goal was to embarrass the airline, which is part
of the nation's transportation infrastructure
and therefore essential to homeland defense.
http://www.msnbc.com/news/748369.asp
http://www.cnn.com/2002/TECH/internet/05/06/national.security.hackers.idg/in 
dex.html

Cyberspace Full of Terror Targets
Officials are most concerned that a cyber attack
could be coupled with a conventional terrorist
attack, such as those on September 11th, and
hinder rescue efforts. Government and private
computer networks are facing new threats of
terrorist attacks, ranging from an attempt
to bring havoc to a major city to nationwide
disruptions of finances, transportation and
utilities. But people with knowledge of
national intelligence briefings say little
has been done to protect against a cyber
attack. Some of the threats come from
individuals who might have connections
to Osama bin Laden's al-Qaeda network in
Pakistan and elsewhere, those who have
been briefed say.
http://www.usatoday.com/life/cyber/tech/2002/05/06/cyber-terror.htm

Legal protection turns service providers into speech police
A 1998 federal law meant to combat digital piracy
is increasingly being used to challenge free
speech online as well. In one recent case, the
search engine Google removed links to a Norwegian
site that criticizes the Church of Scientology
International after the organization
complained of copyright violations.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3200100.htm

China shuts unlicensed Internet cafes in Shanghai, report says
Nearly 200 unlicensed Internet cafes were shut
down recently in the eastern Chinese city of
Shanghai, state-run media reported Monday.
The city's Bureau of Commerce and Industry
closed 122 establishments in early Monday
and more than 75 others at the end of April,
Xinhua news agency said. The latest campaign
targeted Internet cafes in the Shanghai
suburbs, it said.
http://www.nandotimes.com/technology/story/392495p-3118009c.html
http://www.wired.com/news/politics/0,1283,52330,00.html

Working in a network war zone
Even before the CanSecWest security conference
started on Wednesday, unknown hackers had given
the hotel's high-speed network a case of the hiccups.
By Wednesday evening, the system was laid out flat.
The pros were peeved, and a call for an electronic
posse went out. "We're forming a hunting party,"
Dragos Ruiu, independent security consultant and
conference organizer, told the room of nearly 150
hackers and security experts late Thursday
afternoon. "If anyone wants to help us find out
who's...poisoning the hotel network, talk to me."
But that evening, the vandal stayed offline and
the hotel network was, for a little while,
glitch free.
http://news.com.com/2100-1001-900511.html

IDS Evasion Techniques and Tactics
Blackhats, security researchers and network
intrusion detection system (NIDS) developers
have continually played a game of point-counter-
point when it comes to NIDS technology. The
BlackHat community continually develops methods
to evade or bypass NIDS sensors while NIDS
vendors continually counter act these methods
with patches and new releases. Due to he inherent
complexities involved in capturing, analyzing
and understanding network traffic there are
several common techniques that can be used
to exploit inherent weaknesses in NIDSs.
http://online.securityfocus.com/infocus/1577

Homeland security report will lack consensus, Ridge says
A report due to the president by mid-year on
the status of homeland security likely will not
have consensus, White House Homeland Security
Director Tom Ridge said Monday. "I already
told the president, 'Do not expect a consensus
document,'" Ridge said at the Council of the
Americas annual conference at the State
Department. "We do not have time to build
consensus."
http://www.govexec.com/dailyfed/0502/050602td1.htm

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Tied to your PC? Cut Loose and
Stay connected with Yahoo! Mobile
http://us.click.yahoo.com/QBCcSD/o1CEAA/sXBHAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT