Return-Path: <sentto-279987-5259-1030446190-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 27 Aug 2002 04:05:07 -0700 (PDT) Received: (qmail 19994 invoked by uid 510); 27 Aug 2002 11:01:23 -0000 Received: from n3.grp.scd.yahoo.com (66.218.66.86) by all.net with SMTP; 27 Aug 2002 11:01:23 -0000 X-eGroups-Return: sentto-279987-5259-1030446190-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.95] by n3.grp.scd.yahoo.com with NNFMP; 27 Aug 2002 11:03:11 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_1_0_1); 27 Aug 2002 11:03:10 -0000 Received: (qmail 9497 invoked from network); 27 Aug 2002 11:03:10 -0000 Received: from unknown (66.218.66.216) by m7.grp.scd.yahoo.com with QMQP; 27 Aug 2002 11:03:10 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 27 Aug 2002 11:03:10 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7RB3dW13185; Tue, 27 Aug 2002 04:03:39 -0700 Message-Id: <200208271103.g7RB3dW13185@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 27 Aug 2002 04:03:39 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 08/26/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: August 26, 2002 What are the real risks of cyberterrorism? In 1998, a 12-year-old hacker broke into the computer system that controlled the floodgates of the Theodore Roosevelt Dam in Arizona, according to a June Washington Post report. If the gates had been opened, the article added, walls of water could have flooded the cities of Tempe and Mesa, whose populations total nearly 1 million. There was just one problem with the account: It wasn't true. http://zdnet.com.com/2100-1105-955293.html http://www.msnbc.com/news/799234.asp Group promotes 'culture of security' In time for the first anniversary of the Sept. 11 attacks, the Organization for Economic Cooperation and Development has issued new guidelines for securing information systems and networks in anticipation of cyberterrorist attacks or intrusions. The OECD, an international organization composed of governments from around the world and charged with tackling the challenges of a global economy, hopes to develop a "culture of security" among government and businesses that increasingly depend on network connections across national borders. http://zdnet.com.com/2100-1105-955307.html http://news.com.com/2100-1001-955307.html DOD may pull key net from the Internet In an effort to secure one of its most widely used Internet networks, the Defense Department is considering constructing something more akin to an intranet. The Non-Classified Internet Protocol Router Network (NIPRNET) was created in 1995 as a network of government-owned IP routers used to exchange sensitive information. But DOD officials, increasingly uncomfortable with having NIPRNET reside on the Internet, want to put the network behind firewalls and create a "demilitarized zone" for services that need public access, said Keith Fuller, the Defense Information Systems Agency's chief engineer for information security, speaking last week at the Government Symposium on Information Sharing and Homeland Security in Philadelphia. http://www.fcw.com/fcw/articles/2002/0826/news-net-08-26-02.asp Hate groups find virtual haven in Argentina Argentina has emerged as the location of choice for Web sites set up by the world's ultra-nationalist and neo-Nazi political groups. In recent years, race- hate groups in Europe and in other Latin American countries have come under increasing pressure to curtail their online activities. Authorities have dismantled some extremist sites, or pressured Web- hosting companies to close sites temporarily for posting offensive or illegal content. Neo-Nazi groups experience few such problems in Argentina. Aided by inexpensive high-speed Internet access and an outdated anti-discrimination law, race-hate groups from all over the Spanish-speaking world are making Argentina their virtual home base. (NandoTimes article, free registration required) http://www.nandotimes.com/technology/story/510809p-4058953c.html Forty bucks buys total safety from hackers We're grateful to Reg reader Stephen Dowse, who pointed us to an important security announcement. A company called PathLock has finally put the kibosh on malicious hackers. Assuming that the only problem you'll ever face is a broad-band connection which lets the knowing and malicious play with your machine while you're catching REMs, they've got a solution for you. http://www.theregister.co.uk/content/54/26813.html Network Associates nabs "wiretap" tool Security company Network Associates said Monday that it had purchased a small start-up whose software lets corporations and others "wiretap" their computer networks. With its acquisition of Lindon, Utah-based Traxess, Network Associates adds a product complementary to its own Sniffer network-management system, said Sandra England, the company's executive vice president for business development, and the person who closed the deal. http://news.com.com/2100-1001-955392.html Bracelet-based tracking device helps locate missing children Given the recent spate of high-profile child abductions, Eric Wasman now double-bolts his front doors and shuts his windows even on hot nights. And soon, he'll arm his two young daughters, ages 4 and 2, with high-tech, satellite-linked bracelets he hopes will keep them safer and buy him some peace of mind. The bracelets, locked onto a child's wrist and worn like an oversized wristwatch, have built-in technology that lets parents track their children's whereabouts by Internet or phone. In a kidnapping or other worst-case scenario, the wearer can contact 911 by pressing two buttons. http://www.nandotimes.com/technology/story/510962p-4059777c.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/mG3HAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT