[iwar] [NewsBits] NewsBits - 08/22/01 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2001-08-22 20:48:46


Return-Path: <sentto-279987-1633-998538594-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 22 Aug 2001 20:51:11 -0700 (PDT)
Received: (qmail 16059 invoked by uid 510); 23 Aug 2001 03:50:06 -0000
Received: from n29.groups.yahoo.com (216.115.96.79) by 204.181.12.215 with SMTP; 23 Aug 2001 03:50:06 -0000
X-eGroups-Return: sentto-279987-1633-998538594-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by b05.egroups.com with NNFMP; 23 Aug 2001 03:49:54 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_1); 23 Aug 2001 03:49:53 -0000
Received: (qmail 14428 invoked from network); 23 Aug 2001 03:48:47 -0000
Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 23 Aug 2001 03:48:47 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 23 Aug 2001 03:48:46 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA22097 for iwar@onelist.com; Wed, 22 Aug 2001 20:48:46 -0700
Message-Id: <200108230348.UAA22097@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 22 Aug 2001 20:48:46 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [NewsBits] NewsBits - 08/22/01 (fwd)
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

August 22, 2001

New Code Red II Variant Reported A new permutation of the Code Red II
worm is on the loose, but while security experts believe its impact will
be minimal, they say the appearance of the new worm could be a harbinger
of trouble.  The new variant, which has initially been dubbed CodeRed.d,
is nearly identical to its predecessor except for two minor pieces of
code, according to Roger Thompson, head of malicious code research at
TruSecure Corp.  http://www.newsbytes.com/news/01/169297.html

Code Red's collateral damage The worms affected Hewlett-Packard and
Xerox printers In the first few days of August, Code Red and Code Red II
scoured the Internet for Windows NT and 2000 systems that had
Microsoft's IIS 4.0 and 5.0 vulnerabilities.  While their scanning
failed to bring the Internet to a crawl, the Code Red worms did produce
some very interesting side effects beyond those warned about by
Microsoft and the government.  You may have heard about the problems
with Cisco routers, but did you know that Hewlett- Packard and Xerox
printers were also affected by these worms?
http://www.msnbc.com/news/617702.asp

Qwest won't credit Code Red victims The state attorney general has asked
Qwest to give refunds to customers who lost high-speed Internet
connections as a result of the "Code Red" computer worm attack, but the
Denver-based Internet access provider is refusing. 
http://news.cnet.com/news/0-1004-200-6950192.html

Top Computing Group ACM's Homepage Defaced By Attackers The Web site
operated by the Association for Computing Machinery, a leading society
for computer professionals, was defaced today, an ACM spokesperson
confirmed.  A hacking crew called World of Hell breached the security of
the site at acm.org and replaced the home page with its own, which bore
the message: "Owned by Messiah-X_ from WoH."
http://www.newsbytes.com/news/01/169279.html

Russian programmer's case on hold Prosecutors and defense attorneys for
the Russian computer programmer charged with circumventing e-book
copyright protections are negotiating a possible plea bargain.  In a
case that has generated worldwide protests, Dmitry Sklyarov, 26, is
charged in a criminal complaint with violating the 1998 Digital
Millennium Copyright Act (DMCA), though he has not yet been indicted. 
http://news.cnet.com/news/0-1005-200-6949933.html

Prosecutors, defense talking plea bargain in Sklyarov case
http://www.siliconvalley.com/docs/news/tech/000020.htm
http://www.usatoday.com/life/cyber/tech/2001-08-22-russian-hacker.htm
Lawyer for Russian programmer wants case dropped
http://www.siliconvalley.com/docs/news/reuters_wire/1428765l.htm
Lawyers Maneuver in Sklyarov Case
http://www.wired.com/news/politics/0,1283,46240,00.html

Warning over wiretaps People could be looking over your shoulder when
you surf.  Laws designed to catch computer criminals could result in a
huge increase in the amount of covert surveillance carried out on
British citizens by the police and intelligence services.  The
controversial Regulation of Investigatory Powers Act requires many
companies providing communication services to install technology that
allows up to one in 10,000 of their customers to be watched at the same
time. 
http://news.bbc.co.uk/hi/english/sci/tech/newsid_1500000/1500889.stm

Study says the Defense Department shouldn't share its airwaves The
Defense Department got some support Wednesday for its view that it
shouldn't give up its airwaves to make room for the communications
industry, as congressional auditors said changes now could pose a threat
to national security. 
http://www.siliconvalley.com/docs/news/tech/077838.htm

Sen.  Clinton Seeks $25M To Fight Net Crime Against Kids Sen.  Hillary
Rodham Clinton, D-N.Y., Monday said that she will introduce legislation
that seeks $25 million to help state law enforcement agencies fight
Internet child pornography and other online crimes against children.  In
a speech Monday in Great Neck on Long Island, Clinton said that the $25
million would help expand the Internet Crimes Against Children (ICAC)
task forces in every state by the end of 2002. 
http://www.newsbytes.com/news/01/169293.html

Government to fund technology projects focusing on speed, security Over
the next year, the federal government will be investing in multiple
technology-related research and development efforts, including
developing a faster Internet, more secure software and high- speed
computers, according to a new report issued by the National Coordination
Office (NCO) for Information Technology Research and Development. 
http://www.govexec.com/dailyfed/0801/082301td1.htm

Microsoft defends Passport Software giant heads to Capitol Hill
Microsoft on Wednesday descended on the nation's Capitol, trying to
quell concerns its Passport authentication service poses a threat to
consumers' privacy or security.  The Redmond, Wash.-based company is
here at the behest of the Center for Democracy & Technology (CDT), a
consumer advocacy group that wishes to hear directly from the software
maker on its plans, said Adam Sohn, Microsoft's manager for U.S.-.Net
platform strategy.
http://www.msnbc.com/news/617864.asp

DoubleClick Joins US-EU Safe Harbor Program - Update DoubleClick has
signed on to the EU-U.S.  Safe Harbor program, an agreement designed to
protect European users' privacy, something the company's chief privacy
officer said would help it have a baseline privacy system to use in all
of its international services.  The Safe Harbor agreement was drafted to
help U.S.  e-commerce companies and other corporations comply with an EU
policy that prohibits data transfers to companies that do not adhere to
EU-style privacy policies.
http://www.newsbytes.com/news/01/169300.html

VA to certify project security The new cybersecurity chief at the
Department of Veterans Affairs says program managers will be asked to
sign a contract certifying that they have installed security with every
project they build.  Bruce Brody, the associate deputy assistant
secretary for cybersecurity, said in an interview Aug.  20 that the new
policy is necessary because security is one issue that tends to "slip."
http://www.fcw.com/fcw/articles/2001/0820/web-va-08-22-01.asp

Web Security Market Worth $14 Billion By 2005 - IDC Worldwide demand for
Internet security products grew sharply from 1999 to 2000, and will
continue to climb for the next four years, according to a new study. 
The study by IDC, a research and advisory firm, said worldwide revenue
from Internet security software was $5.1 billion in 2000, a 33 percent
increase from the year before. 
http://www.newsbytes.com/news/01/169298.html

Report: No slump for security biz
http://www.zdnet.com/zdnn/stories/news/0,4586,2806762,00.html

HP to launch secure Linux today Hewlett-Packard has launched a secure
version of Linux later in a departure from the normal approach of
partnering with Linux distributors, such as Red Hat.  HP Secure OS
Software for Linux, which is based on the 2.4 kernel and costs about
$3,000, News.com reports.  According to HP, its OS prevents unauthorised
communication between programs, networks and files.  If the Linux-based
system is penetrated, the Secure OS Software containment feature locks
the program, which prevents damage to internal systems. 
http://www.theregister.co.uk/content/4/21206.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web
site for Business" and learn all about serious security. Get it Now!
http://us.click.yahoo.com/aihfLB/oT7CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:40 PDT