Return-Path: <sentto-279987-5150-1028988193-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 10 Aug 2002 07:05:10 -0700 (PDT) Received: (qmail 6261 invoked by uid 510); 10 Aug 2002 14:01:55 -0000 Received: from n6.grp.scd.yahoo.com (66.218.66.90) by all.net with SMTP; 10 Aug 2002 14:01:55 -0000 X-eGroups-Return: sentto-279987-5150-1028988193-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.97] by n6.grp.scd.yahoo.com with NNFMP; 10 Aug 2002 14:03:13 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 10 Aug 2002 14:03:13 -0000 Received: (qmail 64753 invoked from network); 10 Aug 2002 14:03:12 -0000 Received: from unknown (66.218.66.216) by m14.grp.scd.yahoo.com with QMQP; 10 Aug 2002 14:03:12 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 10 Aug 2002 14:03:12 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7AE3e314927; Sat, 10 Aug 2002 07:03:40 -0700 Message-Id: <200208101403.g7AE3e314927@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 10 Aug 2002 07:03:40 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 08/07/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-4.9 required=5.0 tests=NEWSBITS,PORN_10,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: August 7, 2002 U.S. Internet attacks barely detected, authorities say This Internet attack apparently fizzled. The federal government said that early Tuesday it detected a series of electronic attacks against U.S. Internet providers, launched hours after the FBI alerted technology companies and others of potential trouble. The alert, sent out Monday evening and based on information from Italian authorities, cited "credible but nonspecific information that wide-scale hacker attacks" were planned against U.S. Web sites and Internet providers, "possibly emanating from Western Europe," a U.S. official said, speaking on condition of anonymity. http://www.nandotimes.com/technology/story/491601p-3922263c.html Vietnam cracks down on 'harmful' Internet use Communist-ruled Vietnam has ordered local authorities to inspect Internet usage in its two biggest cities in a crackdown on "harmful information" from cyberspace, according to officials. A spokesman at the Directorate General of Posts and Telecommunications (DGPT) told Reuters on Wednesday that the scrutiny, which started last week, would be nationwide after initially targeting the capital city Hanoi and commercial hub Ho Chi Minh City. http://zdnet.com.com/2110-1105-948761.html http://news.zdnet.co.uk/story/0,,t269-s2120460,00.html Mobile porn scam enrages Japanese 'One ring' scammers are being called a threat to Japanese society, but laws may have to be strengthened to deal with them. Enemies of society, cyberterrorists, biker gangs of the telephone world -- all those nasty names and more are being thrown at a new breed of mobile telephone scammer that has been shocking polite Japanese society. http://news.zdnet.co.uk/story/0,,t269-s2120439,00.html Win32 API utterly and irredeemably broken Windows might possibly be the most insecure piece of viral code ever to infect a computer, according to Chris Paget who's found a fascinating hole in the Win32 Messaging System which he believes is irreprarable, and which he posted to the BugTraq security mailing list. The research leading to this discovery was inspired by MS Veep Jim Allchin, who testified to the effect that if flaws in the Windows Messaging System were sufficiently understood, national security would be deeply compromised, CRUISE missiles would be launched remotely, and /bin/laden would most likely find some novel way of raping your daughter with his big bad mouse. http://online.securityfocus.com/news/565 Time for Open-Source to Grow Up The OpenSSH backdoor demonstrates that the community must get pragmatic about package verification, and fast. It's time for the open-source community to grow up. For years we have acted like rowdy, self-confident teenagers demanding the keys to the car, with only occasional success. It's time for us to acknowledge the larger world, and our relationship with it. Our teenage solipsism must go if we hope to blossom into mature, respected grown-ups. http://online.securityfocus.com/columnists/101 Biometrics Unproven, Hard To Test Just how accurate are the face identification systems being rolled out around the country? It turns out, testing them is harder than it looks. James Bond technologies like face recognition, fingerprint sensors, hand geometry, and other biometric security systems may be impossible to accurately evaluate, unless researchers also measure the performance of the testers and the demographics of the subjects, a key researcher said Wednesday. http://online.securityfocus.com/news/566 New Japanese ID system reports first data leak just days after opening Personal data was leaked from Japan's new nation- wide identification system, officials said Wednesday, just two days after the program was launched amid widespread fear it would be prone to breaches of privacy. Personal information from as many as 2,584 people was sent to the wrong people, said Kaoru Okuhira, a spokesman for the Osaka regional government. He added that it was likely the first leak since Monday's kickoff of the new ID system. http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3816796.htm ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT