[iwar] [NewsBits] NewsBits - 07/08/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-07-09 20:36:18


Return-Path: <sentto-279987-4961-1026272130-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 09 Jul 2002 20:45:07 -0700 (PDT)
Received: (qmail 14338 invoked by uid 510); 10 Jul 2002 03:42:28 -0000
Received: from n33.grp.scd.yahoo.com (66.218.66.101) by all.net with SMTP; 10 Jul 2002 03:42:28 -0000
X-eGroups-Return: sentto-279987-4961-1026272130-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.94] by n33.grp.scd.yahoo.com with NNFMP; 10 Jul 2002 03:35:30 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 10 Jul 2002 03:35:30 -0000
Received: (qmail 700 invoked from network); 10 Jul 2002 03:35:29 -0000
Received: from unknown (66.218.66.218) by m1.grp.scd.yahoo.com with QMQP; 10 Jul 2002 03:35:29 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 10 Jul 2002 03:35:29 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6A3aI924157 for iwar@onelist.com; Tue, 9 Jul 2002 20:36:18 -0700
Message-Id: <200207100336.g6A3aI924157@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 9 Jul 2002 20:36:18 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 07/08/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-1.8 required=5.0 tests=NEWSBITS,RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Cyberattacks against energy firms rise
State's power crisis may have drawn attention.
Power and energy companies have become targets
for computer hackers, who have managed to
penetrate their networks and other systems.
The Los Angeles Times reported Monday that
energy and power companies have been hit with
an average 1,280 significant attacks in the
last six months, far more than companies in
any other industry.
http://www.cnn.com/2002/TECH/internet/07/08/energy.hackers.ap/index.html

Internet Attacks On Companies Up 28 Percent, Report Says
Internet attacks against public and private
organizations around the world leapt 28 percent
in the past six months, with most targeting
technology, financial services and power
companies, according to an industry report due
out today. The report, conducted by the Internet
security firm Riptech Inc. of Alexandria,
indicated that the information backbone upon
which many countries rely remains vulnerable
to cyber-attacks. "The Internet is still an
extremely dangerous place and attack activity
is increasing at a significant pace," said
Elad Yoran, Riptech's executive vice president.
http://online.securityfocus.com/news/521
http://www.gcn.com/vol1_no1/daily-updates/19237-1.html
http://www.newsfactor.com/perl/story/18495.html

Cyber-Security Is Underplayed, Industry Says
Among the more contentious questions to arise
from President Bush's proposal last month for
a Department of Homeland Security is one it did
not explicitly address: How should the government
deal with threats in cyberspace? Bush proposed
merging various agencies, scattered around the
government, that oversee different aspects of
computer security. But the fact that the White
House's draft bill doesn't mention "cyber-
security" or its variations set off furious
lobbying on Capitol Hill.
http://www.washingtonpost.com/wp-dyn/articles/A21939-2002Jul3.html

The Clouds of Digital War
Will the Next Terrorist Attack Be Delivered Via Cyberspace?
Many security experts fear that the next big
terrorist strike against the United States
might be on =97 and through =97 the Internet and
other vital interconnected computer networks.
And the suspected attacks won't just deny Net
surfers access to their favorite Web site or
increase the risk of damaging computer viruses
through e-mail. Rather, experts say the next
cyber attack could actually lead to physical
damage to real-world targets.
http://abcnews.go.com/sections/scitech/DailyNews/cyberwar020708.html

Study: Israel, Hong Kong hotbeds for hacking attacks
Which part of the world has the dubious distinction
of being the most active hotbed of computer hacking?
Among the most highly wired economies, more cyber
attacks originate from Israel and Hong Kong on
a per-Internet-user basis than anywhere else,
while Kuwait and Iran top the list of the
category of countries with fewer Internet
users, according to a study released Monday.
http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3624610.htm

Mafia will hack entitlement cards
Cards valuable enough to be worth hacking
Government entitlement cards will be the target
of organised criminal gangs, according to privacy
and fraud experts. The Home Office has published
a consultation paper outlining options for the
cards, including the use of existing driving
licences and UK passports, and issuing new cards
to people who carry neither. The Home Office
confirmed that it has rejected the idea of
compulsory cards and any changes to police
powers.
http://www.vnunet.com/News/1133300

Are Apple's OS X updates poisoned?
A security mailing list has alerted Apple Computer
OS X users to a program that could let a hacker
piggyback malicious code on downloads from the
company's SoftwareUpdate service. According to
the BugTraq mailing list, a hacker named Russell
Harding has posted full instructions online for
how to fool Apple's SoftwareUpdate feature to
allowing a hacker to install a backdoor on any
Mac running OS X.
http://zdnet.com.com/2100-1105-942282.html
http://news.com.com/2100-1001-942265.html

Apple: Taking OS X security seriously--finally
http://zdnet.com.com/2100-1107-941941.html
http://news.zdnet.co.uk/story/0,,t269-s2118730,00.html

Stealth tool makes big entrance
Camera/Shy to launch at Hackfest. The internet
underground is warming up for hackfest H2K2,
which will take place next weekend (13 July)
in New York. One of the most eagerly awaited
features of the event will be the launch of a
steganography tool that will allow information
to be shared across the internet without fear
of perusal from unauthorised eyes.
http://www.vnunet.com/News/1133292

Ohio's spam ban damned
Legislation has a fight on its hands. The US
state of Ohio is attempting to ban spam, framing
legislation that will require senders of spam to
formally identify themselves. The antispam bill
- which originated in the Ohio senate and was
approved by a vote of 84 to 10 - also requires
spammers to provide recipients with a procedure
for declining additional email, and to keep to
the antispam policies of ISPs.
http://www.vnunet.com/News/1133288

Spam-Cramming Foils Vacationers
Vacationers with a sudden yearning to get away
from it all are discovering that cyberspace
isn't an easy place to escape. After making
a bold decision not to check e-mail frequently
or at all during vacations, many find that
when they do log on again they are greeted
by a mailbox crammed with spam -- as well
as a message from their Internet Service
Provider informing them that their account
has reached its allotted capacity and no
further e-mail will be delivered until
the box has been purged.
http://www.wired.com/news/technology/0,1282,53669,00.html

Web IDs 'could save the net'
Without identification it's all over, says expert.
In its current state the internet will die - and
the only thing that can save it is an overhaul
with security at its core, says antivirus expert
Eugene Kaspersky. But his outline for a crime-free
web may land him on the wrong side of the fence
with the privacy pundits. Kaspersky, who heads
up anti virus research at the 200-strong company
in Moscow gives the internet as we know it two
to four years before the amount of "bad
information outweighs good information".
http://www.vnunet.com/News/1133260

Show us the bugs - users want full disclosure
End-users overwhelmingly support the full disclosure
of security vulnerabilities, according to a recent
survey by analysts Hurwitz Group, which demonstrates
widespread frustration about vendor responsiveness
to security issues. Based on interviews with more
than 300 software security professionals, the report
shows that end users overwhelmingly support full
disclosure - announcing security vulnerabilities
as soon as they are discovered. The end users
surveyed for the report are clearly angry that
vendors are releasing insecure applications,
and then not responding when flaws are detected,
Hurwtiz reports.
http://online.securityfocus.com/news/520
http://www.theregister.co.uk/content/55/26090.html

Web Server vulnerability reaches all time high
The Web is more vulnerable to attack now than at
any time previously. That's the stark conclusion
of Netcraft's latest monthly survey of Web servers,
which expresses concerns over the emergence of
serious vulnerabilities in both Microsoft's IIS
and Apache Web servers over the last month.
http://www.theregister.co.uk/content/55/26049.html

High-tech front in the war on terror
Measures the energy emitted or reflected from an
object.  While United States soldiers press on with
their mission in Afghanistan and domestic security
agencies try to flush out potential attackers, the
war on terror is also being fought on another, more
subtle front: in the laboratory. New technology --
some of it still under development -- has the
potential to increase the effectiveness of
intelligence-gathering efforts.
http://www.cnn.com/2002/TECH/industry/07/05/intelligence.technology/index.html

Terrorism plays new role in Web, games
Advertisements for suicide bombers, promotions
of violence and "shoot-em-up" games have proliferated
on the Internet since the Sept. 11 attacks,
according to the Simon Wiesenthal Center.
"Extremist groups are undoubtedly spending more
of their efforts online," Rabbi Abraham Cooper
told a news conference convened for the release
of the center's annual report on the spread of
racism and violent hatred on the Internet,
"Digital Hate 2002."
http://news.com.com/2100-1040-942098.html

The Spy Inside Your Cell Phone
Every new technology gives birth to new security
and privacy fears. When mobile phones first
started gaining popularity in the late '80s and
early '90s, it seemed anyone who could navigate
a Radio Shack could put together a little receiver
to intercept random cell traffic from the air.
Although carriers have made it a little harder
to do that today, the sense that some conversations
are better had in person, or over a wired line,
has not disappeared.
http://www.newsfactor.com/perl/story/18488.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Free $5 Love Reading
Risk Free!
http://us.click.yahoo.com/TPvn8A/PfREAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT