Return-Path: <sentto-279987-4628-1019795874-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 25 Apr 2002 21:43:09 -0700 (PDT) Received: (qmail 5786 invoked by uid 510); 26 Apr 2002 04:37:49 -0000 Received: from n27.grp.scd.yahoo.com (66.218.66.83) by all.net with SMTP; 26 Apr 2002 04:37:49 -0000 X-eGroups-Return: sentto-279987-4628-1019795874-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.194] by n27.grp.scd.yahoo.com with NNFMP; 26 Apr 2002 04:37:54 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_1); 26 Apr 2002 04:37:53 -0000 Received: (qmail 12582 invoked from network); 26 Apr 2002 04:37:53 -0000 Received: from unknown (66.218.66.218) by m12.grp.scd.yahoo.com with QMQP; 26 Apr 2002 04:37:53 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 26 Apr 2002 04:37:53 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g3Q4esq22873 for iwar@onelist.com; Thu, 25 Apr 2002 21:40:54 -0700 Message-Id: <200204260440.g3Q4esq22873@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 25 Apr 2002 21:40:54 -0700 (PDT) Subject: [iwar] [NewsBits] NewsBits - 04/25/02 (fwd) Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit April 25, 2002 CIA Warns of Chinese Plans for Cyber-Attacks on U.S. Analysts fear government and private efforts to sabotage federal Internet sites. U.S. intelligence officials believe the Chinese military is working to launch wide-scale cyber-attacks on American and Taiwanese computer networks, including Internet-linked military systems considered vulnerable to sabotage, according to a classified CIA report. http://www.latimes.com/la-042502china.story http://www.msnbc.com/news/743518.asp China not thought capable of hacking sensitive U.S., Taiwanese documents http://www.siliconvalley.com/mld/siliconvalley/news/editorial/3136610.htm Is a ban on Net access fair punishment? The 2nd U.S. Circuit Court of Appeals in the case, United States v. Sofsky, on March 28 reversed part of a child pornography conviction that prohibited computer and Internet use without probation officer approval. The 2nd Circuit held that such a prohibition would unfairly encroach on the convict's liberties. Of course, one could argue that such liberties were sacrificed by virtue of the criminal conduct at issue. http://www.usatoday.com/life/cyber/ccarch/2002/04/25/sinrod.htm Workers fired for racy e-mails Six workers at the state labor department have been fired and at least 14 others are being investigated for excessive use of work computers for personal e-mail, much of it sexual in nature, officials said. Hundreds of sexually explicit messages ranging from banter to planning for a sex party were found, agency officials said. "We have very clear policies that we don't tolerate this kind of behavior. It's a level of abuse that I didn't expect," said Eva Santos, the department's deputy director for operations. http://www.usatoday.com/life/cyber/2002/04/25/racy-email.htm Klez Infection Spreading Across The Net The W32.Klez virus and its variants still are loose in the wild, and Symantec today upgraded it to a "level 4" virus threat. The company rates viruses on a scale of 1 to 5, with 5 being the most dangerous. Symantec said it is receiving more than 3,000 submissions a day regarding W32.Klez and its variants. At the peak of the SirCam virus, the company received about 1,500 submissions per day. http://www.newsbytes.com/news/02/176151.html Help & HowTo: Klez.H The latest Klez worm is continuing to spread fast across the Internet and attempts to disable antivirus software when activated. Another member of the Klez worm family is spreading fast across the Internet. Klez.H (w32.klez.h@mm, also known as Klez.g and Klez.k) is a significant variation of existing worms Klez.e and Klez.a. http://news.zdnet.co.uk/story/0,,t269-s2109157,00.html More cybercrime laws will be counter-productive, says thinktank An influential thinktank says current cybercrime law is in urgent need of updating, but this time the industry must be involved. More laws to fight cybercrime are likely to be counter-productive, but existing laws must be urgently updated if cyber-crime is to be effectively tackled, according to a leading IT thinktank. http://news.zdnet.co.uk/story/0,,t269-s2109136,00.html HHS awards contract to iDefense for cyberthreat protection The Health and Human Services Department has awarded a $100,000, one-year contract to iDefense Inc. to help safeguard its systems from threats such as viruses, worms and hackers. http://www.gcn.com/vol1_no1/daily-updates/18454-1.html Microsoft Yanks Office Tools After Security Report Microsoft has removed a collection of tools for its Office suite following an independent report that the tools may open security vulnerabilities. According to a series of April 8 advisories from Israel's GreyMagic Security, the latest versions of Microsoft's Office Web Components (OWC) can enable malicious Web sites or e-mails to perform several attacks. http://www.newsbytes.com/news/02/176138.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> SALE --> Wireless Video Cameras for Home Surveillance! VERY TINY! PRICE BREAKTHROUGH - $79.99! http://us.click.yahoo.com/W0toNC/7o6DAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT