Return-Path: <sentto-279987-5190-1029422205-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 15 Aug 2002 07:47:09 -0700 (PDT) Received: (qmail 3867 invoked by uid 510); 15 Aug 2002 14:42:30 -0000 Received: from n33.grp.scd.yahoo.com (66.218.66.101) by all.net with SMTP; 15 Aug 2002 14:42:30 -0000 X-eGroups-Return: sentto-279987-5190-1029422205-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.95] by n33.grp.scd.yahoo.com with NNFMP; 15 Aug 2002 14:36:45 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_7_4); 15 Aug 2002 14:36:45 -0000 Received: (qmail 23894 invoked from network); 15 Aug 2002 14:36:45 -0000 Received: from unknown (66.218.66.216) by m7.grp.scd.yahoo.com with QMQP; 15 Aug 2002 14:36:45 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 15 Aug 2002 14:36:44 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7FEbbw15126; Thu, 15 Aug 2002 07:37:37 -0700 Message-Id: <200208151437.g7FEbbw15126@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 15 Aug 2002 07:37:37 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 08/14/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: August 14, 2002 U.S. Aiding Asia-Pacific Anti-Cybercrime Efforts U.S. law enforcement officials will meet with representatives from a host of Asia-Pacific countries this weekend as part of an international training program to help developing nations combat computer crime and cyberterrorism. http://www.washingtonpost.com/wp-dyn/articles/A17801-2002Aug14.html Cyber Corps funding boosted The government's Scholarship for Service program is getting an infusion of new money, thanks to the supplemental funding bill signed by President Bush Aug. 2. The supplemental included $19.3 million for the program, which offers scholarships to under- graduate and graduate students studying information assurance in exchange for two years of government service in the federal Cyber Corps. The program also funds capacity building programs. http://www.fcw.com/fcw/articles/2002/0812/web-cyber-08-14-02.asp Mock cyberwar fails to end mock civilization A mock cyberwar enacted by faculty of the US Naval War College and analysts from Gartner does not appear to have fulfilled the Clancyesque predictions of mass devastation envisioned by the leading security paranoiacs of the Clinton and Bush Administrations. The exercise, named "Digital Pearl Harbor," apparently in tribute to US CyberSecurity Czar and Chief Alarmist Richard Clarke, brought together a team of experts in several areas related to critical infrastructure for a three-day hackfest. http://online.securityfocus.com/news/577 http://www.theregister.co.uk/content/6/26675.html Treasury bolsters data security Entrust Inc. announced Aug. 13 that it has signed an $882,000 contract with the Treasury Department to provide enhanced security for the department's Internet and intranet communications. The contract includes the implementation of Entrust's Secure Web Portal, Secure VPN and other secure e-mail solutions, all of which focus on identity-based access control through the use of digital credentials. http://www.fcw.com/fcw/articles/2002/0812/web-treas-08-14-02.asp Tech's 'dirty little secret'--cybersecurity In late July at a technology conference in the nation's capital, President Bush's top cybersecurity adviser, Richard Clarke, said the technology industry was acting irresponsibly in selling computer network devices that remain remarkably easy to attack. "It is irresponsible to sell a product in a way that can be so easily misused by a customer in a way that jeopardizes their confidential and proprietary and sensitive information," Clarke said. http://zdnet.com.com/2100-1107-949714.html Digital forgery attacks website security Counterfeit website security certificates can be generated and used make sites appear secure when they are not, says a US computer programmer. The trick could tempt surfers into handing over personal information, such as credit card details. The forgery technique relies on the way Microsoft's Internet Explorer handles the security certificates that verify the identity of a web site, says Mike Benham. These certificates are used to establish an encrypted connection to a web site so that private information can then be safely handed over. http://www.newscientist.com/news/news.jsp?id=3Dns99992669 Hackers Everywhere White hats. Black hats. E-warfare. Court-approved hacking. Drive-by hacking. Princeton officials hacking Yale. What's next=97hackers for hire? Hacking duels? Hacking in 12 easy lessons? Hackers Anonymous? Security threats are very serious, and I don=92t mean to minimize the danger of malicious or criminal intrusion on enterprises. It=92s a real problem, one that appears to be escalating. http://www.techweb.com/tech/security/20020814_security Is Now a Good Time To Be a Hacker? Aberdeen Group analyst Eric Hemmendinger told NewsFactor that despite federal government egulations and heightened awareness, hackers still stand a fair chance of avoiding authorities. If a recent speech by Bush cyber security advisor Richard Clark is any indication, this is a great time to be a hacker -- at least, in terms of the number of opportunities to discover and exploit system vulnerabilities. http://www.newsfactor.com/perl/story/19011.html Wireless, yes, but with security strings attached Wireless networks are a great benefit to roving workers but they bring with them unique security problems that even the most vigilant business manager will find difficult to counter. The wireless Ethernet standards known as 802.11a and 802.11b were designed with security in mind but technical flaws have appeared since the standard was released. http://www.smh.com.au/articles/2002/08/13/1029113885260.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/RN.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT