Return-Path: <sentto-279987-4961-1026272130-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 09 Jul 2002 20:45:07 -0700 (PDT) Received: (qmail 14338 invoked by uid 510); 10 Jul 2002 03:42:28 -0000 Received: from n33.grp.scd.yahoo.com (66.218.66.101) by all.net with SMTP; 10 Jul 2002 03:42:28 -0000 X-eGroups-Return: sentto-279987-4961-1026272130-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.94] by n33.grp.scd.yahoo.com with NNFMP; 10 Jul 2002 03:35:30 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 10 Jul 2002 03:35:30 -0000 Received: (qmail 700 invoked from network); 10 Jul 2002 03:35:29 -0000 Received: from unknown (66.218.66.218) by m1.grp.scd.yahoo.com with QMQP; 10 Jul 2002 03:35:29 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 10 Jul 2002 03:35:29 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g6A3aI924157 for iwar@onelist.com; Tue, 9 Jul 2002 20:36:18 -0700 Message-Id: <200207100336.g6A3aI924157@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 9 Jul 2002 20:36:18 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 07/08/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-1.8 required=5.0 tests=NEWSBITS,RISK_FREE,FREE_MONEY,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Cyberattacks against energy firms rise State's power crisis may have drawn attention. Power and energy companies have become targets for computer hackers, who have managed to penetrate their networks and other systems. The Los Angeles Times reported Monday that energy and power companies have been hit with an average 1,280 significant attacks in the last six months, far more than companies in any other industry. http://www.cnn.com/2002/TECH/internet/07/08/energy.hackers.ap/index.html Internet Attacks On Companies Up 28 Percent, Report Says Internet attacks against public and private organizations around the world leapt 28 percent in the past six months, with most targeting technology, financial services and power companies, according to an industry report due out today. The report, conducted by the Internet security firm Riptech Inc. of Alexandria, indicated that the information backbone upon which many countries rely remains vulnerable to cyber-attacks. "The Internet is still an extremely dangerous place and attack activity is increasing at a significant pace," said Elad Yoran, Riptech's executive vice president. http://online.securityfocus.com/news/521 http://www.gcn.com/vol1_no1/daily-updates/19237-1.html http://www.newsfactor.com/perl/story/18495.html Cyber-Security Is Underplayed, Industry Says Among the more contentious questions to arise from President Bush's proposal last month for a Department of Homeland Security is one it did not explicitly address: How should the government deal with threats in cyberspace? Bush proposed merging various agencies, scattered around the government, that oversee different aspects of computer security. But the fact that the White House's draft bill doesn't mention "cyber- security" or its variations set off furious lobbying on Capitol Hill. http://www.washingtonpost.com/wp-dyn/articles/A21939-2002Jul3.html The Clouds of Digital War Will the Next Terrorist Attack Be Delivered Via Cyberspace? Many security experts fear that the next big terrorist strike against the United States might be on =97 and through =97 the Internet and other vital interconnected computer networks. And the suspected attacks won't just deny Net surfers access to their favorite Web site or increase the risk of damaging computer viruses through e-mail. Rather, experts say the next cyber attack could actually lead to physical damage to real-world targets. http://abcnews.go.com/sections/scitech/DailyNews/cyberwar020708.html Study: Israel, Hong Kong hotbeds for hacking attacks Which part of the world has the dubious distinction of being the most active hotbed of computer hacking? Among the most highly wired economies, more cyber attacks originate from Israel and Hong Kong on a per-Internet-user basis than anywhere else, while Kuwait and Iran top the list of the category of countries with fewer Internet users, according to a study released Monday. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3624610.htm Mafia will hack entitlement cards Cards valuable enough to be worth hacking Government entitlement cards will be the target of organised criminal gangs, according to privacy and fraud experts. The Home Office has published a consultation paper outlining options for the cards, including the use of existing driving licences and UK passports, and issuing new cards to people who carry neither. The Home Office confirmed that it has rejected the idea of compulsory cards and any changes to police powers. http://www.vnunet.com/News/1133300 Are Apple's OS X updates poisoned? A security mailing list has alerted Apple Computer OS X users to a program that could let a hacker piggyback malicious code on downloads from the company's SoftwareUpdate service. According to the BugTraq mailing list, a hacker named Russell Harding has posted full instructions online for how to fool Apple's SoftwareUpdate feature to allowing a hacker to install a backdoor on any Mac running OS X. http://zdnet.com.com/2100-1105-942282.html http://news.com.com/2100-1001-942265.html Apple: Taking OS X security seriously--finally http://zdnet.com.com/2100-1107-941941.html http://news.zdnet.co.uk/story/0,,t269-s2118730,00.html Stealth tool makes big entrance Camera/Shy to launch at Hackfest. The internet underground is warming up for hackfest H2K2, which will take place next weekend (13 July) in New York. One of the most eagerly awaited features of the event will be the launch of a steganography tool that will allow information to be shared across the internet without fear of perusal from unauthorised eyes. http://www.vnunet.com/News/1133292 Ohio's spam ban damned Legislation has a fight on its hands. The US state of Ohio is attempting to ban spam, framing legislation that will require senders of spam to formally identify themselves. The antispam bill - which originated in the Ohio senate and was approved by a vote of 84 to 10 - also requires spammers to provide recipients with a procedure for declining additional email, and to keep to the antispam policies of ISPs. http://www.vnunet.com/News/1133288 Spam-Cramming Foils Vacationers Vacationers with a sudden yearning to get away from it all are discovering that cyberspace isn't an easy place to escape. After making a bold decision not to check e-mail frequently or at all during vacations, many find that when they do log on again they are greeted by a mailbox crammed with spam -- as well as a message from their Internet Service Provider informing them that their account has reached its allotted capacity and no further e-mail will be delivered until the box has been purged. http://www.wired.com/news/technology/0,1282,53669,00.html Web IDs 'could save the net' Without identification it's all over, says expert. In its current state the internet will die - and the only thing that can save it is an overhaul with security at its core, says antivirus expert Eugene Kaspersky. But his outline for a crime-free web may land him on the wrong side of the fence with the privacy pundits. Kaspersky, who heads up anti virus research at the 200-strong company in Moscow gives the internet as we know it two to four years before the amount of "bad information outweighs good information". http://www.vnunet.com/News/1133260 Show us the bugs - users want full disclosure End-users overwhelmingly support the full disclosure of security vulnerabilities, according to a recent survey by analysts Hurwitz Group, which demonstrates widespread frustration about vendor responsiveness to security issues. Based on interviews with more than 300 software security professionals, the report shows that end users overwhelmingly support full disclosure - announcing security vulnerabilities as soon as they are discovered. The end users surveyed for the report are clearly angry that vendors are releasing insecure applications, and then not responding when flaws are detected, Hurwtiz reports. http://online.securityfocus.com/news/520 http://www.theregister.co.uk/content/55/26090.html Web Server vulnerability reaches all time high The Web is more vulnerable to attack now than at any time previously. That's the stark conclusion of Netcraft's latest monthly survey of Web servers, which expresses concerns over the emergence of serious vulnerabilities in both Microsoft's IIS and Apache Web servers over the last month. http://www.theregister.co.uk/content/55/26049.html High-tech front in the war on terror Measures the energy emitted or reflected from an object. While United States soldiers press on with their mission in Afghanistan and domestic security agencies try to flush out potential attackers, the war on terror is also being fought on another, more subtle front: in the laboratory. New technology -- some of it still under development -- has the potential to increase the effectiveness of intelligence-gathering efforts. http://www.cnn.com/2002/TECH/industry/07/05/intelligence.technology/index.html Terrorism plays new role in Web, games Advertisements for suicide bombers, promotions of violence and "shoot-em-up" games have proliferated on the Internet since the Sept. 11 attacks, according to the Simon Wiesenthal Center. "Extremist groups are undoubtedly spending more of their efforts online," Rabbi Abraham Cooper told a news conference convened for the release of the center's annual report on the spread of racism and violent hatred on the Internet, "Digital Hate 2002." http://news.com.com/2100-1040-942098.html The Spy Inside Your Cell Phone Every new technology gives birth to new security and privacy fears. When mobile phones first started gaining popularity in the late '80s and early '90s, it seemed anyone who could navigate a Radio Shack could put together a little receiver to intercept random cell traffic from the air. Although carriers have made it a little harder to do that today, the sense that some conversations are better had in person, or over a wired line, has not disappeared. http://www.newsfactor.com/perl/story/18488.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/TPvn8A/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:31 PDT