Return-Path: <sentto-279987-1564-997327823-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 08 Aug 2001 20:31:22 -0700 (PDT) Received: (qmail 5447 invoked by uid 510); 9 Aug 2001 02:32:31 -0000 Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 9 Aug 2001 02:32:31 -0000 X-eGroups-Return: sentto-279987-1564-997327823-fc=all.net@returns.onelist.com Received: from [10.1.4.55] by hh.egroups.com with NNFMP; 09 Aug 2001 03:30:23 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_1); 9 Aug 2001 03:30:23 -0000 Received: (qmail 98802 invoked from network); 9 Aug 2001 03:30:22 -0000 Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 9 Aug 2001 03:30:22 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 9 Aug 2001 03:30:22 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10567 for iwar@onelist.com; Wed, 8 Aug 2001 20:30:22 -0700 Message-Id: <200108090330.UAA10567@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 8 Aug 2001 20:30:22 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 08/03/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit August 3, 2001 Code Red no longer worst of worms The dreaded Code Red worm was fading from the spotlight Friday, as the pest found fewer Web servers to infect. After hogging headlines and fanning computer technicians' fears for several days, the rate of infection from the fast-spreading worm had plateaued and may be tapering off. Experts who monitor the potential impact of worms and viruses said Code Red has not slowed the overall speed of the Internet at all, in contrast to initial worries it could clog vast chunks of the Net. Security think tank the SANS Institute reported that servers responsible for 343,345 Web sites had been infected by a second wave of Code Red between Wednesday and 5 a.m. PDT Friday. But it had only infected about 20,000 servers in the most recent few hours--a relatively pokey rate that puts Code Red on the back burner for many security experts. http://news.cnet.com/news/0-1003-200-6772768.html Code Red Computer Worm Infestation Seen Peaking The spread of the Code Red computer worm showed signs of peaking on Friday, although security experts warned the Information Technology community not to drop its guard. "Basically, it's reaching its peak now," Andre Post, a senior research adviser for Dutch security software maker Symantec Corp, told Reuters on Friday. "I expect it to slow down a bit more." There still have been no confirmed reports of Code Red infesting computers in Europe. http://www.reuters.com/news_article.jhtml?type=3Dinternetnews&StoryID=3D145= 563 Code Red fails to impress jaded users While originally expected to at least shut down the Internet, if not actually obliterate the planet Earth, the Code Red worm laid pretty low this week -- doubtless waiting for the media coverage to die down before sneakily launching a global information meltdown. Despite a few insignificant effects, such as temporarily shutting down the Pentagon, the worm was regarded as pretty much a damp squib. http://news.zdnet.co.uk/story/0,,t269-s2092573,00.html Web worm gained information for future attacks The authors of the Code Red worm have collected a master database of many of the computers the worm infected, information that could be used for future virus or worm attacks. Even as federal authorities in Canada and the United States said the spread of the worm had largely ceased, computer-security experts were examining the code to determine who its authors might be and what, if any, further uses those authors might have for the worm. http://rtnews.globetechnology.com/servlet/RTGAMArticleHTMLTemplate/D/200108= 0=20 3/gtvirrr?tf=3DRT/fullstory_Tech.html&cf=3Dglobetechnology/tech-config-neut= ral&s=20 lug=3Dgtvirrr&date=3D20010803&archive=3DRTGAM&site=3DTechnology New vulnerability in wireless networks Researchers have discovered a way to quickly break through the security system that protects the leading corporate wireless networking system, a trade group said Friday. While computer security experts had previously uncovered weaknesses in Wi-Fi, a standard for wireless-data communication also known as 802.11b, the latest discovery is being treated with more concern, because it is more feasible and takes less time to carry out. The new attack allows a hacker to discover the "secret key" used to encrypt data before it goes into the air. The group that promotes the Wi-Fi standard, which briefed reporters and analysts prior to the publication of a paper that details the vulnerability, said it has long urged wireless network users to supplement Wi-Fi's built-in security system with stronger encryption tools. http://news.cnet.com/news/0-1004-200-6773189.html Ontrack to Investigate Alleged GOP ``War Room'' Computers Electronic Discovery Specialists to Inspect Hard Drives Used During Presidential Election Vote Recount. A group of news organizations has retained ONTRACK Data International, Inc. to perform computer forensics work on two hard drives used in what has been alleged to be the GOP "war-room" during the time of the Florida recount of votes in the presidential election last November. Florida Secretary of State Katherine Harris reversed her decision not to allow reporters to inspect the computer records, and work performed by Ontrack will attempt to reveal the hard drive contents to a group of more than 12 news organizations under what is commonly known as Florida's "Government in the Sunshine" law. Based on a recommendation by the Florida Department of Law Enforcement, the news organizations contracted with Ontrack(R) DataTrail(TM) electronic discovery services to provide an impartial evaluation of the hard drives in question. Under the agreement, Ontrack DataTrail consultants will capture and perform a full forensic analysis on the two mirror images of the drives based on the specifications provided by the group of news organizations. Typical computer forensic activity includes determining whether or not information has been deleted, as well as reviewing the times and dates of file modifications for details about formatting attempts. http://www.businesswire.com/cgi-bin/f_headline.cgi?bw.080101/212132395 6,000 attempted hacks a week gets home user a bit annoyed "Sh-tbox 2K" was trying - without much success - to get inside Wolfgang Mueller-Leydig's home computer. It was 8.47am on July 21, about an hour and a half since Leydig had logged the last hacking attempt on his PC. Although it made him angry, it wasn't a surprise. He was used to it by now. Since installing personal firewall software on his home PC a few years ago, he had watched the number of hacking attempts on his dial-up OptusNet account soar past 2,000 a week. Most visits appeared to be from scanners - automated programs searching the Internet for unprotected PCs. http://www.smh.com.au/news/0108/03/biztech/biztech19.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> The Nissan Sentra Everything but compact http://NissanDriven.com http://us.click.yahoo.com/3vsIKC/txlCAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT