Return-Path: <sentto-279987-4919-1025208698-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 27 Jun 2002 13:14:09 -0700 (PDT) Received: (qmail 880 invoked by uid 510); 27 Jun 2002 20:11:31 -0000 Received: from n17.grp.scd.yahoo.com (66.218.66.72) by all.net with SMTP; 27 Jun 2002 20:11:31 -0000 X-eGroups-Return: sentto-279987-4919-1025208698-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.192] by n17.grp.scd.yahoo.com with NNFMP; 27 Jun 2002 20:11:38 -0000 X-Sender: cpreston@gci.net X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_0_7_3); 27 Jun 2002 20:11:38 -0000 Received: (qmail 26640 invoked from network); 27 Jun 2002 20:11:37 -0000 Received: from unknown (66.218.66.218) by m10.grp.scd.yahoo.com with QMQP; 27 Jun 2002 20:11:37 -0000 Received: from unknown (HELO mta-2.gci.net) (208.138.130.83) by mta3.grp.scd.yahoo.com with SMTP; 27 Jun 2002 20:11:37 -0000 Received: from mmp-2.gci.net ([208.138.130.81]) by mta-2.gci.net (Netscape Messaging Server 4.15) with ESMTP id GYDS3B01.OED for <iwar@yahoogroups.com>; Thu, 27 Jun 2002 12:11:35 -0800 Received: from graywolf3.gci.net ([24.237.10.246]) by mmp-2.gci.net (Netscape Messaging Server 4.15) with ESMTP id GYDS3B02.748 for <iwar@yahoogroups.com>; Thu, 27 Jun 2002 12:11:35 -0800 Message-Id: <5.1.0.14.2.20020627121018.024e9cd8@127.0.0.1> X-Sender: cpreston@mail.gci.net@127.0.0.1 X-Mailer: QUALCOMM Windows Eudora Version 5.1 To: iwar@yahoogroups.com X-eGroups-From: Charles Preston <cpreston@gci.net> From: Charles Preston <cpreston@sinbad.net> X-Yahoo-Profile: cpreston_2000 Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 27 Jun 2002 12:11:23 -0800 Subject: [iwar] Tech managers targeted by cyber criminals Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=3.2 required=5.0 tests=RISK_FREE,FREE_MONEY version=2.20 X-Spam-Level: *** http://news.bbc.co.uk/hi/english/sci/tech/newsid_2068000/2068276.stm Thursday, 27 June, 2002, 09:44 GMT 10:44 UK Tech managers targeted by cyber criminals Could tech managers be lending a hand to cyber criminals? The head of the UK's cyber police unit has warned that tech managers could become victims of kidnappers and organised crime. Len Hynds, from the National Hi-Tech Crime Unit (NHTCU), has told Computing magazine that computer bosses could be vulnerable to attack in the same way as bank managers were targeted in the past. Mr Hynds said that the NHTCU had already seen cases of criminal gangs blackmailing companies after discovering weaknesses in their computer systems. The next step could well be physical risk to technology managers, he said Tech recruits "Organised criminals will intimidate people with access to information," he told Computing. He warned companies to improve recruitment and to be careful about the people they employed in positions with access to computer data. Criminal gangs were also likely to start hiring more people with technological know-how as computers increasingly become an important tool in crime, he said. Computer forensic firm Datasec conducts investigations of criminal or industrial computer crime and has had cases in which individuals within organisations have been targeted for their knowledge about sensitive data. Distributed responsibility Managing director Adrian Reid believes employees with responsibility for technology should exercise caution when talking about their work. "If someone was going to target the IT manager, he or she will find out as much about that individual as they can," he said. "Employees in sensitive areas need to be careful about what they say about themselves and what information about them is in the public arena," he said. Nearly three-quarters of UK companies have sensitive data on their computer networks and they too must do more to make sure that one person does not have sole responsibility for such information. "Companies should consider distributing responsibilities," said Mr Reid. "It is harder to corrupt a group of people than it is one individual." ------------------------ Yahoo! Groups Sponsor ---------------------~--> Free $5 Love Reading Risk Free! http://us.click.yahoo.com/3PCXaC/PfREAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:33 PDT