Return-Path: <sentto-279987-1415-994828696-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 10 Jul 2001 22:20:08 -0700 (PDT) Received: (qmail 307 invoked by uid 510); 11 Jul 2001 04:20:37 -0000 Received: from fg.egroups.com (208.50.144.70) by 204.181.12.215 with SMTP; 11 Jul 2001 04:20:37 -0000 X-eGroups-Return: sentto-279987-1415-994828696-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by fg.egroups.com with NNFMP; 11 Jul 2001 05:18:16 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_2_0); 11 Jul 2001 05:18:15 -0000 Received: (qmail 43511 invoked from network); 11 Jul 2001 05:18:15 -0000 Received: from unknown (10.1.10.26) by l8.egroups.com with QMQP; 11 Jul 2001 05:18:15 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 11 Jul 2001 05:18:15 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id WAA10137 for iwar@onelist.com; Tue, 10 Jul 2001 22:18:14 -0700 Message-Id: <200107110518.WAA10137@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 10 Jul 2001 22:18:14 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] news Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Mass attack on Chinese government sites The number of Chinese government sites defaced by various hacking groups has skyrocketed over the past week. Some attacks were aggressive, blatantly seeking to provoke a reaction from Chinese hackers. These incidents do not appear to have any ties to recent events, and are more likely the result of bored script kiddies on summer break. Of course, some of the big names are still involved, for example PoizonBOx. http://www.securitywatch.com/newsforward/default.asp?AID=3D8529 Banks meet match in hacker group Brazilian hacking crew, Perfect.br, has defaced itself an insane number of site in the past couple of days, most of which belong to banks worldwide. Two countries -- Germany and Greece -- sustained the brunt of the damage. A few of Perfect.br's victims include: www.firstnationalbanknh.com (First National Bank of New Holland -- hosted on Microsoft-IIS/5.0) www.digisafe.com.sq www.konzernstrukturdatenbank.de www.gatewaynationalbank.com www.metallbank.de www.bank1stnational.com http://www.securitywatch.com/newsforward/default.asp?AID=3D8528 Government payroll system open to hackers, report says A government payroll computer center in Denver is fraught with security problems, raising the possibility of criminals stealing or altering records, congressional investigators said Tuesday. The General Accounting Office, the investigative arm of Congress, faulted the National Business Center for not adequately securing its computer network, not investigating suspicious access patterns and having lax physical security. http://www.siliconvalley.com/docs/news/tech/076560.htm Once hacked, Mumbai cyber police get set to bite hard CYBERCOPS of Mumbai Police may have been taken in by the recent hacking of their website. But they are getting ready to take on cyber criminals in the future. Five policemen of the Cybercrime Cell are now undergoing an intensive four-month internet training. Every morning, five days a week, the five inspectors attend computer classes of internet guru Vijay Mukhi at Tardeo. There is no banter in the classroom as the police sit among other students to learn the intricacies of Java, C++, and the TCP/IP protocol. And they mean business. http://www.indian-express.com/ie20010710/nat2.shtml Security concerns prompt Safe Harbor Web site changes Because of security concerns, two features were removed last week from a U.S. government Web site designed to aid the flow of personal information and commerce between the U.S. and the European Union, according to a notice posted on the Web site. A self-certification form and the "Safe Harbor list" were removed last Thursday from Safe Harbor, a Web site operated by the U.S. Department of Commerce, "in order to review the security of the information submitted to the Department by U.S. organizations," according to a posting on the site. http://www.itworld.com/Man/2688/IDG010709safeharbor/ WinXP Product Activation decoded and analysed German techies Fully Licensed GmbH claim - convincingly - to have unravelled the Windows Product Activation (WPA) system used in the latest versions of Microsoft software, including Office XP and Windows XP. The bottom line, according to the company, is that WPA is not particularly intrusive, does not invade anybody's privacy, and is a lot more forgiving of hardware changes than has been speculated. http://www.theregister.co.uk/content/4/20282.html ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:37 PDT