[iwar] [NewsBits] NewsBits - 07/01/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-07-04 07:00:52


Return-Path: <sentto-279987-4947-1025791230-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Jul 2002 07:02:08 -0700 (PDT)
Received: (qmail 27202 invoked by uid 510); 4 Jul 2002 14:00:09 -0000
Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 4 Jul 2002 14:00:09 -0000
X-eGroups-Return: sentto-279987-4947-1025791230-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.196] by n16.grp.scd.yahoo.com with NNFMP; 04 Jul 2002 14:00:30 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 4 Jul 2002 14:00:30 -0000
Received: (qmail 11114 invoked from network); 4 Jul 2002 14:00:30 -0000
Received: from unknown (66.218.66.218) by m3.grp.scd.yahoo.com with QMQP; 4 Jul 2002 14:00:30 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 4 Jul 2002 14:00:30 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g64E0q714315 for iwar@onelist.com; Thu, 4 Jul 2002 07:00:52 -0700
Message-Id: <200207041400.g64E0q714315@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 4 Jul 2002 07:00:52 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 07/01/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

July 1, 2002

Mafia boss jailed in FBI keyboard bugging case
A New Jersey federal court has sentenced Nicodemo
Scarfo to 33 months in prison at the end of a
case that tested the legality of law enforcement
surveillance techniques. Government agents placed
a keystroke-logging device on Scarfo's computer
and a key point in the case was reached when US
District Court Judge Joel Pisano ruled in December
that evidence from the device was admissible. Two
months later Scarfo, the son of the jailed former
boss of the Philadelphia mob, changed his plea and
admitted his role in an illegal gambling operation.
http://www.theregister.co.uk/content/55/25971.html

FBI to valley: Tell us about attacks
Businesses have remained tight-lipped when it comes
to reporting cyberattacks or other breaches of their
security for fear that the bad publicity would also
bombard their bottom lines. But the FBI has begun
offering them anonymity and critical information
in exchange for their much-needed cooperation in
battling hackers and other terrorists.
http://www.msnbc.com/news/774803.asp

Report: Brace for new wave of attacks
The Web is currently more vulnerable to attack
than ever before, as a result of several serious
security flaws for different server applications
being published within a few days of one another,
according to a survey from British network security
firm Netcraft. Microsoft published a trio of security
advisories on June 12 related to its Internet
Information Server (IIS), and this was followed on
June 17 by the publication of a bug in the Apache
Web server application that leaves the software open
to a buffer overflow attack. Together, Apache and
IIS make up nearly 90 percent of active Web servers,
according to Netcraft, although it has not yet been
conclusively proven that the Apache flaw affects
versions running on the Linux and Solaris operating
systems.
http://zdnet.com.com/2100-1105-940797.html

Web ripe for massive worm attack
http://news.zdnet.co.uk/story/0,,t269-s2118228,00.html

Who's Protecting Cyberspace?
Feds consider new organizations, policy to
guard against cyberterrorist threat. Protecting
the nation's cybersecurity is becoming a federal
priority, as experts warn that cyberterrorists
could target not only networks, but also many
services and infrastructure operations controlled
by computers. The Homeland Security Act is
President Bush's solution, but as the plan makes
its way through Congress, government officials
are raising concerns and suggesting additional
precautions.
http://www.pcworld.com/news/article/0,aid,102356,00.asp

Real-life hacker writing unreal account
Barred by the terms of his probation from messing
with computers, ex-convict hacker Kevin Mitnick
has turned to writing about them, baring the
tricks of his former trade in a forthcoming book.
An advance copy of the book, The Art of Deception,
describes more than a dozen scenarios where
tricksters dupe computer network administrators
into divulging passwords, encryption keys and
other coveted security details.
http://usatoday.com/life/cyber/tech/2002/07/01/hacking-manual.htm
http://www.msnbc.com/news/774429.asp?0si=3D-
http://www.cnn.com/2002/TECH/internet/07/01/hacking.manual.ap/index.html
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3576919.htm

Boom time's over for security pros
Despite the ongoing focus on security since the
Sept. 11 attacks, computer security administrators
are not immune to the current economic malaise,
according to a study released Monday.  Though
they remain among the most highly paid tech workers,
security professionals have seen their average
raises drop more than 40 percent since December
2000--from increases of 11.6 percent to bumps of
7 percent. And trading up to better-paying jobs
in the same field is a thing of the past, said
Alan Paller, director of research and development
for the System Administration Networking and
Security (SANS) Institute, which produced the
survey.
http://zdnet.com.com/2100-1105-940916.html

Wireless attacks: Wave a white flag?
The major Internet backbone networks for the
Pacific Northwest converge at a single location:
the Westin building in Seattle, a 32-story
structure that houses dozens of major and minor
Internet service providers. It is also home to
more than 50 wireless networks, most of which
apparently have no security.
http://zdnet.com.com/2100-1105-940820.html

Cyberlaw: Cybersmart or cybersilly?
Sketpics cast doubt on hot new legal field. Is
there really a cyberspace full of  =93cybercitizens=94
who need only be accountable to their own =93cyberlaws=94?
A loose-knit group of law professors is bucking one
of the big fads in the legal field by calling that
whole idea =93cybersilly.=94
http://www.msnbc.com/news/774871.asp

Cyberwar is Hell
The campaign against cyber terrorism has at least
one thing in common with genuine conflicts...
wartime profiteers. Cyberwar is Hell! But it's
never too hellish for feverish salesmanship. Take,
for example, McAfee's recent botched attempt to sell
the public on the merits of the fiendish "JPEG virus"
said to be hanging over beloved digital stockpiles
of family photos and Swedish pornography like the
sword of Damocles.
http://online.securityfocus.com/columnists/92

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/ztNCyD/zDLEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT