Return-Path: <sentto-279987-1160-988298461-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 26 Apr 2001 08:22:07 -0700 (PDT) Received: (qmail 26661 invoked by uid 510); 26 Apr 2001 14:22:18 -0000 Received: from hk.egroups.com (208.50.99.220) by 204.181.12.215 with SMTP; 26 Apr 2001 14:22:18 -0000 X-eGroups-Return: sentto-279987-1160-988298461-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by hk.egroups.com with NNFMP; 26 Apr 2001 15:21:01 -0000 X-Sender: fc@all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_1_2); 26 Apr 2001 15:21:00 -0000 Received: (qmail 82812 invoked from network); 26 Apr 2001 15:20:50 -0000 Received: from unknown (10.1.10.142) by l9.egroups.com with QMQP; 26 Apr 2001 15:20:50 -0000 Received: from unknown (HELO all.net) (65.0.156.78) by mta3 with SMTP; 26 Apr 2001 15:20:48 -0000 Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id IAA24355 for iwar@onelist.com; Thu, 26 Apr 2001 08:20:48 -0700 Message-Id: <200104261520.IAA24355@all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 26 Apr 2001 08:20:48 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit British defence ministry refuses comment on spy bugs report Britain's defence ministry on Monday refused to confirm or deny press reports which said that some 30 electronic listening devices had been discovered at ministry headquarters. "It is not our policy to comment on security," a ministry spokeswoman said. She also refused to comment on a report by the Daily Telegraph that implicated French firms in the bugging scandal, alleging that the bugs were planted for the purpose of industrial espionage. The bugs were discovered during a rearrangement of the office in the centre of London, according to information published by the Sunday Times. http://63.108.181.201/2001/04/23/ANA/0560-0498-Britain-security....html Army casts Internet filter The Army will field Internet filtering software at 100 facilities worldwide by June 1, possibly the largest such deployment in history, industry sources say. The software falls under a networking contract awarded in February. As part of the initial rollout, the Army will install Websense Inc.=92s Enterprise software to manage the Internet use of more than 500,000 employees in the United States, Europe and the Pacific region. The software can block workers from surfing undesirable Web sites gambling, pornography or personal shopping sites, for example. Sites can be blocked completely or just at certain times, such as during business hours. http://www.fcw.com/fcw/articles/2001/0423/news-army-04-23-01.asp SDMI cracks revealed The academic cracker crew led by Princeton University Computer Science Professor Edward Felten, which answered the HackSDMI public challenge of last September with 'unqualified' results, has received veiled threats of criminal prosecution under the Digital Millennium Copyright Act (DMCA) from the SDMI Foundation in hopes that the team will be cowed into withholding what it's learned from an upcoming computer science conference. "Any disclosure of information gained from participating in the Public Challenge....could subject you and your research team to actions under the Digital Millennium Copyright Act," SDMI Foundation mouthpiece Matthew Oppenheim warns in a letter to the Felten team. http://www.theregister.co.uk/content/8/18434.html A335,000 hacking challenge cracked Challenge backfire as hackers crack challenge within 24 hours, and Solaris gets the blame. A team of computer hackers has captured =A335,000 for hacking into a computer system just twenty-four hours after the competition began. The hack is likely to be a major embarrassment for the company behind the high-profile hacking comptetion, despite its assertion that the break in has highlighted a major new vulnerability in the Solaris operating system running on Intel x86 microprocessors. Argus Systems organised the competition -- to break into a Web server locked down using its security product called PitBull -- to promote its products and to coincide with the start of Infosec, the UK's premier computer security event. http://www.zdnet.co.uk/news/2001/16/ns-22388.html Will the Real Hackers Stand Up? http://www.wired.com/news/technology/0,1282,43190,00.html [FC - when the prizes start getting realistic, the attackers start winning.] Warning Issued Against Fast-Spreading Hacking Worm An information security institute reported a new hacking tool that is spreading quickly between companies and personal computers in Korea. The Korea Information Security Agency (KISA) said yesterday the worm, known as Carko, is similar in potency to last year's worm that severely damaged some high-profile websites such as Yahoo! and CNN. The agency's computer forensics experts expressed concern that cases of the new virus will increase just as distributed denial-of-service (DDoS) tools did last year. DDoS tools can flood a single website or Internet server with so much data, and from so many sources that the computer effectively would disappear from Internet. http://www.korealink.co.kr/kt_tech/200104/t2001042417422445110.htm FBI uses reverse hacking to catch Russians Two men have been indicted in what news reports described as a Russian computer hacking ring that victimized banks and other businesses through extortion and the theft of credit card numbers. Alexey Ivanov, 20, and Vasiliy Gorshkov, 25, were arrested after the FBI established a bogus Internet security firm called "Invita," let the men hack into it and then lured them to the United States to apply for jobs, according to a 20-count federal grand jury indictment. http://www.cnn.com/2001/TECH/internet/04/24/russia.hacking.ap/index.html http://www.msnbc.com/news/563379.asp Scientists detail Web-based terrorist surveillance Tracking system used at Democratic Convention As Democrats gathered in Los Angeles last summer to nominate Al Gore for president, health officials were quietly using a new, Web-based tracking system to watch for biological terrorism. The network linked 11 hospital emergency rooms, an airport and federal health officials, who checked a secure Internet site as often as every hour to detect signs of bacteria circulated to spread deadly disease. http://www.msnbc.com/news/563795.asp US and Chinese hackers plan to launch a cyberwar Despite the present impasse in diplomatic talks between China and the United States over the spy plane, computer-savvy citizens from both countries have begun to wage their own hacking war on the Internet. Chinese hackers are vowing to retaliate with a week -long attack on US-based websites and computer networks, starting May 1. American hackers are also advocating an assault on websites hosted in China, and claim that hundreds of Chinese websites have already been disrupted. Messages posted on some underground Internet chat rooms indicate that US hackers plan to continue the blitz they have dubbed the "China Killer." And Chinese hackers are promising to respond in kind. http://www1.chinadaily.com.cn/bw/2001-04-24/2147.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:09 PDT