Return-Path: <sentto-279987-4947-1025791230-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 04 Jul 2002 07:02:08 -0700 (PDT) Received: (qmail 27202 invoked by uid 510); 4 Jul 2002 14:00:09 -0000 Received: from n16.grp.scd.yahoo.com (66.218.66.71) by all.net with SMTP; 4 Jul 2002 14:00:09 -0000 X-eGroups-Return: sentto-279987-4947-1025791230-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.196] by n16.grp.scd.yahoo.com with NNFMP; 04 Jul 2002 14:00:30 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 4 Jul 2002 14:00:30 -0000 Received: (qmail 11114 invoked from network); 4 Jul 2002 14:00:30 -0000 Received: from unknown (66.218.66.218) by m3.grp.scd.yahoo.com with QMQP; 4 Jul 2002 14:00:30 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 4 Jul 2002 14:00:30 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g64E0q714315 for iwar@onelist.com; Thu, 4 Jul 2002 07:00:52 -0700 Message-Id: <200207041400.g64E0q714315@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 4 Jul 2002 07:00:52 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 07/01/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: July 1, 2002 Mafia boss jailed in FBI keyboard bugging case A New Jersey federal court has sentenced Nicodemo Scarfo to 33 months in prison at the end of a case that tested the legality of law enforcement surveillance techniques. Government agents placed a keystroke-logging device on Scarfo's computer and a key point in the case was reached when US District Court Judge Joel Pisano ruled in December that evidence from the device was admissible. Two months later Scarfo, the son of the jailed former boss of the Philadelphia mob, changed his plea and admitted his role in an illegal gambling operation. http://www.theregister.co.uk/content/55/25971.html FBI to valley: Tell us about attacks Businesses have remained tight-lipped when it comes to reporting cyberattacks or other breaches of their security for fear that the bad publicity would also bombard their bottom lines. But the FBI has begun offering them anonymity and critical information in exchange for their much-needed cooperation in battling hackers and other terrorists. http://www.msnbc.com/news/774803.asp Report: Brace for new wave of attacks The Web is currently more vulnerable to attack than ever before, as a result of several serious security flaws for different server applications being published within a few days of one another, according to a survey from British network security firm Netcraft. Microsoft published a trio of security advisories on June 12 related to its Internet Information Server (IIS), and this was followed on June 17 by the publication of a bug in the Apache Web server application that leaves the software open to a buffer overflow attack. Together, Apache and IIS make up nearly 90 percent of active Web servers, according to Netcraft, although it has not yet been conclusively proven that the Apache flaw affects versions running on the Linux and Solaris operating systems. http://zdnet.com.com/2100-1105-940797.html Web ripe for massive worm attack http://news.zdnet.co.uk/story/0,,t269-s2118228,00.html Who's Protecting Cyberspace? Feds consider new organizations, policy to guard against cyberterrorist threat. Protecting the nation's cybersecurity is becoming a federal priority, as experts warn that cyberterrorists could target not only networks, but also many services and infrastructure operations controlled by computers. The Homeland Security Act is President Bush's solution, but as the plan makes its way through Congress, government officials are raising concerns and suggesting additional precautions. http://www.pcworld.com/news/article/0,aid,102356,00.asp Real-life hacker writing unreal account Barred by the terms of his probation from messing with computers, ex-convict hacker Kevin Mitnick has turned to writing about them, baring the tricks of his former trade in a forthcoming book. An advance copy of the book, The Art of Deception, describes more than a dozen scenarios where tricksters dupe computer network administrators into divulging passwords, encryption keys and other coveted security details. http://usatoday.com/life/cyber/tech/2002/07/01/hacking-manual.htm http://www.msnbc.com/news/774429.asp?0si=3D- http://www.cnn.com/2002/TECH/internet/07/01/hacking.manual.ap/index.html http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3576919.htm Boom time's over for security pros Despite the ongoing focus on security since the Sept. 11 attacks, computer security administrators are not immune to the current economic malaise, according to a study released Monday. Though they remain among the most highly paid tech workers, security professionals have seen their average raises drop more than 40 percent since December 2000--from increases of 11.6 percent to bumps of 7 percent. And trading up to better-paying jobs in the same field is a thing of the past, said Alan Paller, director of research and development for the System Administration Networking and Security (SANS) Institute, which produced the survey. http://zdnet.com.com/2100-1105-940916.html Wireless attacks: Wave a white flag? The major Internet backbone networks for the Pacific Northwest converge at a single location: the Westin building in Seattle, a 32-story structure that houses dozens of major and minor Internet service providers. It is also home to more than 50 wireless networks, most of which apparently have no security. http://zdnet.com.com/2100-1105-940820.html Cyberlaw: Cybersmart or cybersilly? Sketpics cast doubt on hot new legal field. Is there really a cyberspace full of =93cybercitizens=94 who need only be accountable to their own =93cyberlaws=94? A loose-knit group of law professors is bucking one of the big fads in the legal field by calling that whole idea =93cybersilly.=94 http://www.msnbc.com/news/774871.asp Cyberwar is Hell The campaign against cyber terrorism has at least one thing in common with genuine conflicts... wartime profiteers. Cyberwar is Hell! But it's never too hellish for feverish salesmanship. Take, for example, McAfee's recent botched attempt to sell the public on the merits of the fiendish "JPEG virus" said to be hanging over beloved digital stockpiles of family photos and Swedish pornography like the sword of Damocles. http://online.securityfocus.com/columnists/92 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/ztNCyD/zDLEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT