Return-Path: <sentto-279987-5267-1030543403-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 28 Aug 2002 07:05:10 -0700 (PDT) Received: (qmail 25916 invoked by uid 510); 28 Aug 2002 14:01:34 -0000 Received: from n1.grp.scd.yahoo.com (66.218.66.64) by all.net with SMTP; 28 Aug 2002 14:01:34 -0000 X-eGroups-Return: sentto-279987-5267-1030543403-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.193] by n1.grp.scd.yahoo.com with NNFMP; 28 Aug 2002 14:03:24 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_1_0_1); 28 Aug 2002 14:03:23 -0000 Received: (qmail 73863 invoked from network); 28 Aug 2002 14:03:20 -0000 Received: from unknown (66.218.66.216) by m11.grp.scd.yahoo.com with QMQP; 28 Aug 2002 14:03:20 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 28 Aug 2002 14:03:20 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7SE3uu24198; Wed, 28 Aug 2002 07:03:56 -0700 Message-Id: <200208281403.g7SE3uu24198@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 28 Aug 2002 07:03:55 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 08/27/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit August 27, 2002 Trojan Horse Poses as Antivirus Upgrade A Virus in Disguise Is on the Loose. An email claiming to be an antivirus program update instead contains a Trojan horse that automatically installs a virus. Kaspersky Labs is warning that an email that spoofs a Microsoft.com corporate email account and claims to be an upgrade to the Kaspersky virus- fighting program, contains a Trojan horse. Once clicked, the attachment installs a backdoor Trojan called Apher. The program gives a remote user access to affected computers, then automatically installs a virus called Backdoor.Death.25. http://abcnews.go.com/sections/scitech/TechTV/techtv_trojanvirus020827.html Experts warn of mobile viruses With 78 percent of Japanese mobile users accessing the Internet, analysts warn that the country is likely to be the first to experience mobile-phone attacks. Japanese mobile phone users have already had to contend with spam mail and technical glitches, but that could be nothing compared to the headaches they might get when computer hackers turn their attention to the wireless world. http://news.zdnet.co.uk/story/0,,t269-s2121340,00.html Hackers rally round Deceptive Duo Defacers threaten action if pair are jailed. As two of the most notorious hackers of the past year await trial for their 'patriotic' website defacement spree, other members of the hacker underground have threatened action if the pair go down. Last week vnunet.com was contacted by a hacker known as Splurge, an ex-member of the notorious Sm0ked Crew website defacement group. http://www.vnunet.com/News/1134600 Damning email haunts WorldCom Senior exec's mail reveals cover-up. A senior WorldCom executive tried to stop another member of staff discussing the company's books with auditors, according to a congressional committee. Investigators searching WorldCom's servers have found an email from former WorldCom controller David Myers, who was charged on 1 August with fraud for allegedly helping to hide billions in expenses. http://www.vnunet.com/News/1134598 Virus writers 'obsessed with sex and computer games' Virus writers are sados obsessed with sex and computer games, not the evil geniuses Hollywood and fear-mongering Washington politicians portray them as. That's the view of Graham Cluley, senior technology consultant at Sophos, who said "virus writers are much more likely to be teenage males than crack cyberterrorists bent on the annihilation of the internet." http://www.theregister.co.uk/content/55/26827.html EU Copyright Directive 'all bad news' Campaign for Digital Rights rips into new proposals UK digital rights activists last week published the first in-depth analysis of the proposed European Union Copyright Directive (EUCD) - and it's all bad news. The UK Patent Office published a consultation paper on what has been called the 'European Digital Millennium Copyright Act' on 7 August, responses to which must be submitted to the Patent Office by 31 October. http://www.vnunet.com/News/1134611 Copy-protection software thwarts felt-tip hackers A new version of CD copy-protection software from Israel's Midbar claims to have fixed an embarrassing flaw Midbar, the Tel Aviv, Israel- based company that makes copy-protection technology for audio CDs, said on Monday that its products are now to be found in more than 30 million CDs worldwide, with 10 million of those in Japan. Separately, the company said it has fixed a glitch that allowed consumers to circumvent its copy protection using a felt-tip pen http://news.zdnet.co.uk/story/0,,t269-s2121362,00.html Microsoft: WinXP Update Could 'Bomb' Some Computers In an attempt to reduce piracy of its software, Microsoft has announced protective changes to its Windows Product Activation (WPA) service, beginning with WinXP Service Pack 1. As veteran Microsoft watchers have expected, SP1 will not install if either of what the company calls "two well-known pirated product keys" has ever been used to activate the system. Such systems will also be denied access to Microsoft's Windows Update feature. http://www.newsfactor.com/perl/story/19188.html China=92s Internet war with dissidents Government crackdowns having impact, report says Chinese dissidents are doing their best to use the Internet to bring democratic change to their society, but government crackdowns and the nation=92s rural demographics mean that more freedoms are unlikely to come soon, says a private study. THE REPORT, =93You=92ve Got Dissent,=94 said that while dissidents use the Internet for liberation, the Chinese government uses the same tools to keep an eye on activists. http://www.msnbc.com/news/799842.asp http://www.wired.com/news/politics/0,1283,54789,00.html In China, Web used for both social change, government surveillance http://www.nandotimes.com/technology/story/513832p-4081893c.html Lamo Bumped from NBC After Hacking Them The helpful hacker demonstrates his techniques on camera for the NBC Nightly News, but lawyers kill the story when he cracks the broadcast network's own systems. How did a mediagenic hacker like Adrian Lamo get himself bumped last week from a scheduled appearance on the NBC Nightly News with Tom Brokaw? Perhaps with his impromptu on-camera intrusion into the peacock network's own computers. http://online.securityfocus.com/news/595 DoubleClick to Open Cookie Jar For years, ad-serving cookies have crept about the Web like silent, virtual stalkers -- tracking surfers as they hop from site to site in the name of targeted marketing. Now, Net users may finally get a glimpse of some of the data such tracking applications collect. As part of a settlement with regulators in 10 U.S. states, the Internet ad-serving firm DoubleClick said it will begin allowing Web users to view some of the records it compiles through the use of cookies. http://www.wired.com/news/business/0,1367,54769,00.html http://www.theregister.co.uk/content/6/26817.html Security at your service WHILE OUTSOURCING even part of an IT security operation still draws qualms, organizations are being forced to recognize that the level of in-house security expertise needed to run a full-time business is too difficult and costly to acquire and maintain. As a result, many are placing more trust in MSSPs managed security service providers). "There certainly was a lot of hesitancy. I wasn't too comfortable about the whole idea of outsourcing [security]," said Daniel Kesl, information security officer for Denver-based Newmont Mining. "But as we went further with the processes and controls in place, it's not as terrifying as I once viewed it." http://www.idg.net/ic_940090_1794_9-10000.html Justifying the Expense of IDS, Part Two: Calculating ROI for IDS This article is the second of a two-part series exploring ways to justify the financial investment in IDS protection. In part one of this series we discussed general IDS types and expanded on the impact that the logical location of a company's critical networked assets could have on the risk equations. To this end we introduced the Cascading Threat Multiplier (CTM) to expand on the Single Loss Expectancy (SLE) equation. We also reviewed implementation and management costs based on various support profiles and reviewed the commonly accepted risk equations. Finally, we left off with the basic formula for calculating ROI for security, otherwise commonly known as Return on Security Investment (ROSI). http://online.securityfocus.com/infocus/1621 Justifying the Expense of IDS, Part One: An Overview of ROI for IDS http://online.securityfocus.com/infocus/1608 kk ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/MVfIAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT