[iwar] [NewsBits] NewsBits - 08/27/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-08-28 07:03:55


Return-Path: <sentto-279987-5267-1030543403-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 28 Aug 2002 07:05:10 -0700 (PDT)
Received: (qmail 25916 invoked by uid 510); 28 Aug 2002 14:01:34 -0000
Received: from n1.grp.scd.yahoo.com (66.218.66.64) by all.net with SMTP; 28 Aug 2002 14:01:34 -0000
X-eGroups-Return: sentto-279987-5267-1030543403-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.193] by n1.grp.scd.yahoo.com with NNFMP; 28 Aug 2002 14:03:24 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_1_0_1); 28 Aug 2002 14:03:23 -0000
Received: (qmail 73863 invoked from network); 28 Aug 2002 14:03:20 -0000
Received: from unknown (66.218.66.216) by m11.grp.scd.yahoo.com with QMQP; 28 Aug 2002 14:03:20 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 28 Aug 2002 14:03:20 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7SE3uu24198; Wed, 28 Aug 2002 07:03:56 -0700
Message-Id: <200208281403.g7SE3uu24198@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 28 Aug 2002 07:03:55 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 08/27/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

August 27, 2002

Trojan Horse Poses as Antivirus Upgrade A Virus in Disguise Is on the
Loose.  An email claiming to be an antivirus program update instead
contains a Trojan horse that automatically installs a virus.  Kaspersky
Labs is warning that an email that spoofs a Microsoft.com corporate
email account and claims to be an upgrade to the Kaspersky virus-
fighting program, contains a Trojan horse.  Once clicked, the attachment
installs a backdoor Trojan called Apher.  The program gives a remote
user access to affected computers, then automatically installs a virus
called Backdoor.Death.25. 
http://abcnews.go.com/sections/scitech/TechTV/techtv_trojanvirus020827.html

Experts warn of mobile viruses With 78 percent of Japanese mobile users
accessing the Internet, analysts warn that the country is likely to be
the first to experience mobile-phone attacks.  Japanese mobile phone
users have already had to contend with spam mail and technical glitches,
but that could be nothing compared to the headaches they might get when
computer hackers turn their attention to the wireless world. 
http://news.zdnet.co.uk/story/0,,t269-s2121340,00.html

Hackers rally round Deceptive Duo Defacers threaten action if pair are
jailed.  As two of the most notorious hackers of the past year await
trial for their 'patriotic' website defacement spree, other members of
the hacker underground have threatened action if the pair go down.  Last
week vnunet.com was contacted by a hacker known as Splurge, an ex-member
of the notorious Sm0ked Crew website defacement group. 
http://www.vnunet.com/News/1134600

Damning email haunts WorldCom Senior exec's mail reveals cover-up.  A
senior WorldCom executive tried to stop another member of staff
discussing the company's books with auditors, according to a
congressional committee.  Investigators searching WorldCom's servers
have found an email from former WorldCom controller David Myers, who was
charged on 1 August with fraud for allegedly helping to hide billions in
expenses.  http://www.vnunet.com/News/1134598

Virus writers 'obsessed with sex and computer games' Virus writers are
sados obsessed with sex and computer games, not the evil geniuses
Hollywood and fear-mongering Washington politicians portray them as. 
That's the view of Graham Cluley, senior technology consultant at
Sophos, who said "virus writers are much more likely to be teenage males
than crack cyberterrorists bent on the annihilation of the internet."
http://www.theregister.co.uk/content/55/26827.html

EU Copyright Directive 'all bad news' Campaign for Digital Rights rips
into new proposals UK digital rights activists last week published the
first in-depth analysis of the proposed European Union Copyright
Directive (EUCD) - and it's all bad news.  The UK Patent Office
published a consultation paper on what has been called the 'European
Digital Millennium Copyright Act' on 7 August, responses to which must
be submitted to the Patent Office by 31 October. 
http://www.vnunet.com/News/1134611

Copy-protection software thwarts felt-tip hackers A new version of CD
copy-protection software from Israel's Midbar claims to have fixed an
embarrassing flaw Midbar, the Tel Aviv, Israel- based company that makes
copy-protection technology for audio CDs, said on Monday that its
products are now to be found in more than 30 million CDs worldwide, with
10 million of those in Japan.  Separately, the company said it has fixed
a glitch that allowed consumers to circumvent its copy protection using
a felt-tip pen http://news.zdnet.co.uk/story/0,,t269-s2121362,00.html

Microsoft: WinXP Update Could 'Bomb' Some Computers In an attempt to
reduce piracy of its software, Microsoft has announced protective
changes to its Windows Product Activation (WPA) service, beginning with
WinXP Service Pack 1.  As veteran Microsoft watchers have expected, SP1
will not install if either of what the company calls "two well-known
pirated product keys" has ever been used to activate the system.  Such
systems will also be denied access to Microsoft's Windows Update
feature.  http://www.newsfactor.com/perl/story/19188.html

China=92s Internet war with dissidents Government crackdowns having
impact, report says Chinese dissidents are doing their best to use the
Internet to bring democratic change to their society, but government
crackdowns and the nation=92s rural demographics mean that more freedoms
are unlikely to come soon, says a private study.  THE REPORT,
=93You=92ve Got Dissent,=94 said that while dissidents use the Internet
for liberation, the Chinese government uses the same tools to keep an
eye on activists.  http://www.msnbc.com/news/799842.asp
http://www.wired.com/news/politics/0,1283,54789,00.html

In China, Web used for both social change, government surveillance
http://www.nandotimes.com/technology/story/513832p-4081893c.html

Lamo Bumped from NBC After Hacking Them The helpful hacker demonstrates
his techniques on camera for the NBC Nightly News, but lawyers kill the
story when he cracks the broadcast network's own systems.  How did a
mediagenic hacker like Adrian Lamo get himself bumped last week from a
scheduled appearance on the NBC Nightly News with Tom Brokaw? Perhaps
with his impromptu on-camera intrusion into the peacock network's own
computers.  http://online.securityfocus.com/news/595

DoubleClick to Open Cookie Jar For years, ad-serving cookies have crept
about the Web like silent, virtual stalkers -- tracking surfers as they
hop from site to site in the name of targeted marketing.  Now, Net users
may finally get a glimpse of some of the data such tracking applications
collect.  As part of a settlement with regulators in 10 U.S.  states,
the Internet ad-serving firm DoubleClick said it will begin allowing Web
users to view some of the records it compiles through the use of
cookies.  http://www.wired.com/news/business/0,1367,54769,00.html
http://www.theregister.co.uk/content/6/26817.html

Security at your service WHILE OUTSOURCING even part of an IT security
operation still draws qualms, organizations are being forced to
recognize that the level of in-house security expertise needed to run a
full-time business is too difficult and costly to acquire and maintain. 
As a result, many are placing more trust in MSSPs managed security
service providers).  "There certainly was a lot of hesitancy.  I wasn't
too comfortable about the whole idea of outsourcing [security]," said
Daniel Kesl, information security officer for Denver-based Newmont
Mining.  "But as we went further with the processes and controls in
place, it's not as terrifying as I once viewed it."
http://www.idg.net/ic_940090_1794_9-10000.html

Justifying the Expense of IDS, Part Two: Calculating ROI for IDS This
article is the second of a two-part series exploring ways to justify the
financial investment in IDS protection.  In part one of this series we
discussed general IDS types and expanded on the impact that the logical
location of a company's critical networked assets could have on the risk
equations.  To this end we introduced the Cascading Threat Multiplier
(CTM) to expand on the Single Loss Expectancy (SLE) equation.  We also
reviewed implementation and management costs based on various support
profiles and reviewed the commonly accepted risk equations.  Finally, we
left off with the basic formula for calculating ROI for security,
otherwise commonly known as Return on Security Investment (ROSI). 
http://online.securityfocus.com/infocus/1621

Justifying the Expense of IDS, Part One: An Overview of ROI for IDS
http://online.securityfocus.com/infocus/1608 kk


------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/MVfIAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT