[iwar] [NewsBits] NewsBits - 08/14/02 (fwd)

From: Fred Cohen (fc@all.net)
Date: 2002-08-15 07:37:37


Return-Path: <sentto-279987-5190-1029422205-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 15 Aug 2002 07:47:09 -0700 (PDT)
Received: (qmail 3867 invoked by uid 510); 15 Aug 2002 14:42:30 -0000
Received: from n33.grp.scd.yahoo.com (66.218.66.101) by all.net with SMTP; 15 Aug 2002 14:42:30 -0000
X-eGroups-Return: sentto-279987-5190-1029422205-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.95] by n33.grp.scd.yahoo.com with NNFMP; 15 Aug 2002 14:36:45 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 15 Aug 2002 14:36:45 -0000
Received: (qmail 23894 invoked from network); 15 Aug 2002 14:36:45 -0000
Received: from unknown (66.218.66.216) by m7.grp.scd.yahoo.com with QMQP; 15 Aug 2002 14:36:45 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 15 Aug 2002 14:36:44 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7FEbbw15126; Thu, 15 Aug 2002 07:37:37 -0700
Message-Id: <200208151437.g7FEbbw15126@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 15 Aug 2002 07:37:37 -0700 (PDT)
Subject: [iwar] [NewsBits] NewsBits - 08/14/02 (fwd)
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-5.0 required=5.0 tests=NEWSBITS,DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

August 14, 2002

U.S.  Aiding Asia-Pacific Anti-Cybercrime Efforts U.S.  law enforcement
officials will meet with representatives from a host of Asia-Pacific
countries this weekend as part of an international training program to
help developing nations combat computer crime and cyberterrorism. 
http://www.washingtonpost.com/wp-dyn/articles/A17801-2002Aug14.html

Cyber Corps funding boosted The government's Scholarship for Service
program is getting an infusion of new money, thanks to the supplemental
funding bill signed by President Bush Aug.  2.  The supplemental
included $19.3 million for the program, which offers scholarships to
under- graduate and graduate students studying information assurance in
exchange for two years of government service in the federal Cyber Corps. 
The program also funds capacity building programs. 
http://www.fcw.com/fcw/articles/2002/0812/web-cyber-08-14-02.asp

Mock cyberwar fails to end mock civilization A mock cyberwar enacted by
faculty of the US Naval War College and analysts from Gartner does not
appear to have fulfilled the Clancyesque predictions of mass devastation
envisioned by the leading security paranoiacs of the Clinton and Bush
Administrations.  The exercise, named "Digital Pearl Harbor," apparently
in tribute to US CyberSecurity Czar and Chief Alarmist Richard Clarke,
brought together a team of experts in several areas related to critical
infrastructure for a three-day hackfest. 
http://online.securityfocus.com/news/577
http://www.theregister.co.uk/content/6/26675.html

Treasury bolsters data security Entrust Inc.  announced Aug.  13 that it
has signed an $882,000 contract with the Treasury Department to provide
enhanced security for the department's Internet and intranet
communications.  The contract includes the implementation of Entrust's
Secure Web Portal, Secure VPN and other secure e-mail solutions, all of
which focus on identity-based access control through the use of digital
credentials. 
http://www.fcw.com/fcw/articles/2002/0812/web-treas-08-14-02.asp

Tech's 'dirty little secret'--cybersecurity In late July at a technology
conference in the nation's capital, President Bush's top cybersecurity
adviser, Richard Clarke, said the technology industry was acting
irresponsibly in selling computer network devices that remain remarkably
easy to attack.  "It is irresponsible to sell a product in a way that
can be so easily misused by a customer in a way that jeopardizes their
confidential and proprietary and sensitive information," Clarke said. 
http://zdnet.com.com/2100-1107-949714.html

Digital forgery attacks website security Counterfeit website security
certificates can be generated and used make sites appear secure when
they are not, says a US computer programmer.  The trick could tempt
surfers into handing over personal information, such as credit card
details.  The forgery technique relies on the way Microsoft's Internet
Explorer handles the security certificates that verify the identity of a
web site, says Mike Benham.  These certificates are used to establish an
encrypted connection to a web site so that private information can then
be safely handed over. 
http://www.newscientist.com/news/news.jsp?id=3Dns99992669

Hackers Everywhere White hats.  Black hats.  E-warfare.  Court-approved
hacking.  Drive-by hacking.  Princeton officials hacking Yale.  What's
next=97hackers for hire? Hacking duels? Hacking in 12 easy lessons?
Hackers Anonymous? Security threats are very serious, and I don=92t mean
to minimize the danger of malicious or criminal intrusion on
enterprises.  It=92s a real problem, one that appears to be escalating. 
http://www.techweb.com/tech/security/20020814_security

Is Now a Good Time To Be a Hacker? Aberdeen Group analyst Eric
Hemmendinger told NewsFactor that despite federal government egulations
and heightened awareness, hackers still stand a fair chance of avoiding
authorities.  If a recent speech by Bush cyber security advisor Richard
Clark is any indication, this is a great time to be a hacker -- at
least, in terms of the number of opportunities to discover and exploit
system vulnerabilities.  http://www.newsfactor.com/perl/story/19011.html

Wireless, yes, but with security strings attached Wireless networks are
a great benefit to roving workers but they bring with them unique
security problems that even the most vigilant business manager will find
difficult to counter.  The wireless Ethernet standards known as 802.11a
and 802.11b were designed with security in mind but technical flaws have
appeared since the standard was released. 
http://www.smh.com.au/articles/2002/08/13/1029113885260.html

------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/RN.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT