Return-Path: <sentto-279987-4410-1012453441-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 30 Jan 2002 21:07:07 -0800 (PST) Received: (qmail 10274 invoked by uid 510); 31 Jan 2002 05:03:44 -0000 Received: from n32.groups.yahoo.com (216.115.96.82) by all.net with SMTP; 31 Jan 2002 05:03:44 -0000 X-eGroups-Return: sentto-279987-4410-1012453441-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.162] by n32.groups.yahoo.com with NNFMP; 31 Jan 2002 05:04:02 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 31 Jan 2002 05:04:00 -0000 Received: (qmail 27114 invoked from network); 31 Jan 2002 05:04:00 -0000 Received: from unknown (216.115.97.167) by m8.grp.snv.yahoo.com with QMQP; 31 Jan 2002 05:04:00 -0000 Received: from unknown (HELO red.all.net) (12.232.72.98) by mta1.grp.snv.yahoo.com with SMTP; 31 Jan 2002 05:04:00 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g0V557917025 for iwar@onelist.com; Wed, 30 Jan 2002 21:05:07 -0800 Message-Id: <200201310505.g0V557917025@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 30 Jan 2002 21:05:06 -0800 (PST) Subject: [iwar] [NewsBits] NewsBits - 01/30/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit January 30, 2002 Confiscated PC Reveals Terrorist Focus On Water Supply The FBI's National Infrastructure Protection Center (NIPC) said it has uncovered evidence that terrorists may have planned attacks on water supply systems in the United States and abroad. According to a bulletin issued by the NIPC Tuesday and labelled as of "high" importance, a computer, owned by an individual with indirect links to Osama bin Laden, was found to contain several software programs used for structural engineering of "dams and other water-retaining structures." http://www.newsbytes.com/news/02/174079.html Australian Man Banned From Giving Advice On IRC In what is believed to be a world first, Australia's financial watchdog has taken a Brisbane man to court over his messages posted in real-time on an Internet relay chat (IRC) channel. In a display of Internet know-how, the financial services regulator also persuaded the court to halt the man's use of specific meta tags on his Web site. http://www.newsbytes.com/news/02/174054.html SEC: 'McWhortle' scam a hit with investors Securities and Exchange Commission officials said on Wednesday that their orchestrated Internet hoax campaign received 150,000 hits over three days in an investor awareness project that cost taxpayers about $50. Using tactics from actual online stock scams, SEC officials created a fictitious company called McWhortle Enterprises Inc. and wrote a press release hyping an initial public offering. http://www.siliconvalley.com/docs/news/reuters_wire/1747828l.htm http://news.com.com/2100-1017-826434.html http://www.govexec.com/dailyfed/0102/013002td1.htm http://www.cnn.com/2002/TECH/internet/01/30/investing.hoax.ap/index.html http://www.newsfactor.com/perl/story/16069.html http://www.usatoday.com/life/cyber/invest/2002/01/30/web-hoax.htm DVD hacker vows to keep challenging ruling Eric Corley, the central figure in the ``DVD Hacker'' case who was barred by a court from posting online how to make copies of DVDs, vowed Wednesday to keep fighting the copyright law the ruling was based on, and which he says oppresses more and more people each day. ``We have every intention of continuing to challenge this ruling because this is such a vital issue,'' Corley said. http://www.siliconvalley.com/docs/news/tech/037533.htm http://www.usatoday.com/life/cyber/tech/2002/01/30/dvd-hacker.htm Top Security Sites Easy Prey To Script Attacks Web sites operated by several leading Internet security organizations are vulnerable to an old but serious security flaw known as the cross-site scripting (CSS) attack. A cursory survey today revealed that the corporate home pages of security software vendors including Network Associates, Kaspersky Lab, Trend Micro, SonicWall, and Command Software, were all susceptible to CSS attacks. http://www.newsbytes.com/news/02/174076.html Software bug blamed for Australian radioactive spill Amec Engineering has laid the blame for a radioactive spill on faulty software, but refuses to name the company concerned. Amec Engineering, designer of the Beverly uranium processing plant in Western Australia, has blamed buggy software for a radioactive spill at the site last December, confirming early suspicions that computers played a role in the accident. http://news.zdnet.co.uk/story/0,,t269-s2103388,00.html http://zdnet.com.com/2110-1104-825848.html http://news.com.com/2100-1001-826124.html Watchdog: MS Passport lets crooks in A privacy group on Tuesday asked state law enforcement authorities to examine software giant Microsoft's Passport online identity service, saying it exposes consumers to fraud, junk electronic mail and identity theft. The Electronic Privacy Information Center sent a letter to all 50 state attorneys general, asking them to protect consumers against what it called Microsoft's unfair and deceptive trade practices because the federal government has failed to act. http://zdnet.com.com/2100-1106-825340.html Analyst: Microsoft Passport Investigation 'Premature' Microsoft said user information is not shared with any third parties and that the Passport system does not place personal information at risk. An Internet advocacy group has urged U.S. state attorneys general to take immediate investigative action against Microsoft's Passport suite of services, charging the software company with improperly collecting personal user information and placing that information at risk online. http://www.newsfactor.com/perl/story/16072.html Pentagon reviews responses to call for anti-terror technology Defense Department officials are reviewing more than 12,000 responses to their broad appeal last fall for new technological ideas to help combat global terrorism. The undersecretary of Defense for acquisition, technology and logistics and the interagency Technical Support Working Group jointly issued a Broad Agency Announcement (BAA) on Oct. 23, seeking concepts that could be developed within 12 to 18 months. http://www.govexec.com/dailyfed/0102/013002td2.htm Video Forensics: Grainy to Guilty The image is haunting: Two clean-cut, cool faced terrorists stride through an airport security checkpoint just hours before hijacking the first of two airplanes that crashed into the World Trade Center. Captured on a surveillance camera at the Portland, Maine, airport, the grainy analog image of Mohamed Atta and Abdul Aziz Al-Omari was digitized, enhanced and released to the public in hopes of jogging the collective memory for information about the infamous duo. http://www.wired.com/news/conflict/0,2100,50036,00.html Payback time! How to catch a hacker A new service from McAfee will soon let you discover whether anyone is hacking into your system, and if so, let you submit that information to the malicious user's ISP or local law enforcement officials. The project, known as HackerWatch.org, is an ambitious attempt by McAfee, a division of Network Associates best known for its antivirus products, to create an interactive anti-hacker community online. But will it make a difference? http://zdnet.com.com/2100-1107-825844.html Reject the Corporate Secrecy Grab Industry's push for new exemptions from the Freedom of Information Act is unnecessary and dangerous. In the name of improving cyber security, corporations are pushing for exemptions to the U.S. Freedom of Information Act (FOIA) that are unnecessary and dangerous. These will result in crucial information being suppressed without improving security. http://www.securityfocus.com/columnists/56 On a digital privacy crusade Newsmakers David Holtzman is on a crusade to change the way the digital world defines privacy. Best known as the former chief technology officer of Network Solutions, the 45-year-old former cryptographic analyst with the U.S. Navy during the Vietnam War oversaw the growth of the commercial Internet from 500,000 domain names to more than 20 million. He watched in amazement as technology made it easier for marketers to collect and distribute vast amounts of data--everything from the value of homes and stock options to arrest records and death certificates. http://news.com.com/2008-1082-826241.html Castles Built on Sand: Why Software is Insecure We have all heard reports of vulnerabilities being discovered in various software. But what actually makes software more or less secure than the rest of its competitors? Theoretically, all software starts in the same place - with the very first sketch on somebody's napkin over dinner. It grows from there; the environment in which it is developed, who controls the project and most importantly who works on the project all contribute to the outcome. http://www.securityfocus.com/infocus/1541 When a secured site is not so secure You probably won't find a bigger fan of PayPal than me. The company's financial intermediation service allows secure Internet transactions between strangers--such as eBay vendors and buyers--without an exchange of private financial information, such as credit card numbers. I think that's an excellent service. http://zdnet.com.com/2100-1107-825076.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Sponsored by VeriSign - The Value of Trust When building an e-commerce site, you want to start with a secure foundation. Learn how with VeriSign's FREE Guide. http://us.click.yahoo.com/oCuuSA/XdiDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST