Return-Path: <sentto-279987-1633-998538594-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 22 Aug 2001 20:51:11 -0700 (PDT) Received: (qmail 16059 invoked by uid 510); 23 Aug 2001 03:50:06 -0000 Received: from n29.groups.yahoo.com (216.115.96.79) by 204.181.12.215 with SMTP; 23 Aug 2001 03:50:06 -0000 X-eGroups-Return: sentto-279987-1633-998538594-fc=all.net@returns.onelist.com Received: from [10.1.4.56] by b05.egroups.com with NNFMP; 23 Aug 2001 03:49:54 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_1); 23 Aug 2001 03:49:53 -0000 Received: (qmail 14428 invoked from network); 23 Aug 2001 03:48:47 -0000 Received: from unknown (10.1.10.142) by l10.egroups.com with QMQP; 23 Aug 2001 03:48:47 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 23 Aug 2001 03:48:46 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA22097 for iwar@onelist.com; Wed, 22 Aug 2001 20:48:46 -0700 Message-Id: <200108230348.UAA22097@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 22 Aug 2001 20:48:46 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 08/22/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit August 22, 2001 New Code Red II Variant Reported A new permutation of the Code Red II worm is on the loose, but while security experts believe its impact will be minimal, they say the appearance of the new worm could be a harbinger of trouble. The new variant, which has initially been dubbed CodeRed.d, is nearly identical to its predecessor except for two minor pieces of code, according to Roger Thompson, head of malicious code research at TruSecure Corp. http://www.newsbytes.com/news/01/169297.html Code Red's collateral damage The worms affected Hewlett-Packard and Xerox printers In the first few days of August, Code Red and Code Red II scoured the Internet for Windows NT and 2000 systems that had Microsoft's IIS 4.0 and 5.0 vulnerabilities. While their scanning failed to bring the Internet to a crawl, the Code Red worms did produce some very interesting side effects beyond those warned about by Microsoft and the government. You may have heard about the problems with Cisco routers, but did you know that Hewlett- Packard and Xerox printers were also affected by these worms? http://www.msnbc.com/news/617702.asp Qwest won't credit Code Red victims The state attorney general has asked Qwest to give refunds to customers who lost high-speed Internet connections as a result of the "Code Red" computer worm attack, but the Denver-based Internet access provider is refusing. http://news.cnet.com/news/0-1004-200-6950192.html Top Computing Group ACM's Homepage Defaced By Attackers The Web site operated by the Association for Computing Machinery, a leading society for computer professionals, was defaced today, an ACM spokesperson confirmed. A hacking crew called World of Hell breached the security of the site at acm.org and replaced the home page with its own, which bore the message: "Owned by Messiah-X_ from WoH." http://www.newsbytes.com/news/01/169279.html Russian programmer's case on hold Prosecutors and defense attorneys for the Russian computer programmer charged with circumventing e-book copyright protections are negotiating a possible plea bargain. In a case that has generated worldwide protests, Dmitry Sklyarov, 26, is charged in a criminal complaint with violating the 1998 Digital Millennium Copyright Act (DMCA), though he has not yet been indicted. http://news.cnet.com/news/0-1005-200-6949933.html Prosecutors, defense talking plea bargain in Sklyarov case http://www.siliconvalley.com/docs/news/tech/000020.htm http://www.usatoday.com/life/cyber/tech/2001-08-22-russian-hacker.htm Lawyer for Russian programmer wants case dropped http://www.siliconvalley.com/docs/news/reuters_wire/1428765l.htm Lawyers Maneuver in Sklyarov Case http://www.wired.com/news/politics/0,1283,46240,00.html Warning over wiretaps People could be looking over your shoulder when you surf. Laws designed to catch computer criminals could result in a huge increase in the amount of covert surveillance carried out on British citizens by the police and intelligence services. The controversial Regulation of Investigatory Powers Act requires many companies providing communication services to install technology that allows up to one in 10,000 of their customers to be watched at the same time. http://news.bbc.co.uk/hi/english/sci/tech/newsid_1500000/1500889.stm Study says the Defense Department shouldn't share its airwaves The Defense Department got some support Wednesday for its view that it shouldn't give up its airwaves to make room for the communications industry, as congressional auditors said changes now could pose a threat to national security. http://www.siliconvalley.com/docs/news/tech/077838.htm Sen. Clinton Seeks $25M To Fight Net Crime Against Kids Sen. Hillary Rodham Clinton, D-N.Y., Monday said that she will introduce legislation that seeks $25 million to help state law enforcement agencies fight Internet child pornography and other online crimes against children. In a speech Monday in Great Neck on Long Island, Clinton said that the $25 million would help expand the Internet Crimes Against Children (ICAC) task forces in every state by the end of 2002. http://www.newsbytes.com/news/01/169293.html Government to fund technology projects focusing on speed, security Over the next year, the federal government will be investing in multiple technology-related research and development efforts, including developing a faster Internet, more secure software and high- speed computers, according to a new report issued by the National Coordination Office (NCO) for Information Technology Research and Development. http://www.govexec.com/dailyfed/0801/082301td1.htm Microsoft defends Passport Software giant heads to Capitol Hill Microsoft on Wednesday descended on the nation's Capitol, trying to quell concerns its Passport authentication service poses a threat to consumers' privacy or security. The Redmond, Wash.-based company is here at the behest of the Center for Democracy & Technology (CDT), a consumer advocacy group that wishes to hear directly from the software maker on its plans, said Adam Sohn, Microsoft's manager for U.S.-.Net platform strategy. http://www.msnbc.com/news/617864.asp DoubleClick Joins US-EU Safe Harbor Program - Update DoubleClick has signed on to the EU-U.S. Safe Harbor program, an agreement designed to protect European users' privacy, something the company's chief privacy officer said would help it have a baseline privacy system to use in all of its international services. The Safe Harbor agreement was drafted to help U.S. e-commerce companies and other corporations comply with an EU policy that prohibits data transfers to companies that do not adhere to EU-style privacy policies. http://www.newsbytes.com/news/01/169300.html VA to certify project security The new cybersecurity chief at the Department of Veterans Affairs says program managers will be asked to sign a contract certifying that they have installed security with every project they build. Bruce Brody, the associate deputy assistant secretary for cybersecurity, said in an interview Aug. 20 that the new policy is necessary because security is one issue that tends to "slip." http://www.fcw.com/fcw/articles/2001/0820/web-va-08-22-01.asp Web Security Market Worth $14 Billion By 2005 - IDC Worldwide demand for Internet security products grew sharply from 1999 to 2000, and will continue to climb for the next four years, according to a new study. The study by IDC, a research and advisory firm, said worldwide revenue from Internet security software was $5.1 billion in 2000, a 33 percent increase from the year before. http://www.newsbytes.com/news/01/169298.html Report: No slump for security biz http://www.zdnet.com/zdnn/stories/news/0,4586,2806762,00.html HP to launch secure Linux today Hewlett-Packard has launched a secure version of Linux later in a departure from the normal approach of partnering with Linux distributors, such as Red Hat. HP Secure OS Software for Linux, which is based on the 2.4 kernel and costs about $3,000, News.com reports. According to HP, its OS prevents unauthorised communication between programs, networks and files. If the Linux-based system is penetrated, the Secure OS Software containment feature locks the program, which prevents damage to internal systems. http://www.theregister.co.uk/content/4/21206.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web site for Business" and learn all about serious security. Get it Now! http://us.click.yahoo.com/aihfLB/oT7CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:40 PDT