-- Forwarded message --
Date: Mon, 16 Jun 2003 18:57:51 -0400 (EDT)
From: security curmudgeon <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [defaced-commentary] UK Labour Party web site ownx0red by allah
From: "Wanja Eric Naef [IWS]" <[EMAIL PROTECTED]>
Mirror of Defacement
mation made available to the author from vendors.
IPS vendors had a more convincing story. Shame on the vendors still
taking a responsible approach to IPS technologies for not having a
stronger, louder, and more relevant story and actively lobbying it to
the Gartner's of the world. You reap what yo
http://www.securityfocus.com/columnists/167
By Mark Rasch
June 16, 2003
A few odd cases show that you don't have be a digital desparado to be
accused of a cybercrime... particularly if you embarrass the wrong
bureaucrats.
Some recent (and not so recent) cases illustrate how computer security
pr
+--+
| Linux Security: Tips, Tricks, and Hackery |
| Published by Onsight, Inc. |
| |
| 16-June-2003
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.infoworld.com/article/03/06/16/HNhackertip_1.html
By Paul Roberts
IDG News Service
June 16, 2003
Confidential vulnerability information managed by the CERT
Coordination Center has again been leaked to the public, following a
flu
http://www.eweek.com/article2/0,3959,1128749,00.asp
By Dennis Fisher
June 16, 2003
Until recently, software security vulnerabilities were discovered
mostly by chance and by developers, security specialists or other
professionals. Once the flaw was discovered, news about it spread
slowly and typi
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
Gary's posting had many good points, however there is one issue that I query:
> An IPS, being in-line, does not have the indulgence of being able to
> be highly sensitive to everything an IDS can. Since it is making the
> decision to pass or not p
http://www.haaretzdaily.com/hasen/pages/ShArt.jhtml?itemNo=304489
By Galit Yemini
June 17, 2003
"About 70 to 80 percent of information security breaches in
organizations are caused by the firms' own employees, and not by
outside hackers," says Arie Danon, CEI of information security company
Syma
http://www.miami.com/mld/miamiherald/business/6109851.htm
TED BRIDIS
Associated Press
June 17, 2003
WASHINGTON - The chairman of the Senate Judiciary Committee said
Tuesday he favors developing new technology to remotely destroy the
computers of people who illegally download music from the Intern
sets the
stage for demonstrable negligence and fraud in the future.
Just some ideas.
Regards,
Pete
Pete Lindstrom, CISSP
Research Director
Spire Security, LLC
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of InfoSec News
Sent: Tuesday, June 17, 2003 3:14 AM
To
Forwarded from: Lance Spitzner <[EMAIL PROTECTED]>
-- Forwarded message --
Date: Tue, 17 Jun 2003 09:52:16 -0700
From: Patrick McCarty <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Honeynet Video Release
Greetings,
We've just released a short video explaining Honeynet and re
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.washingtonpost.com/wp-dyn/articles/A2428-2003Jun16.html
By Ellen McCarthy
Washington Post Staff Writer
Tuesday, June 17, 2003
When the office networks crash and work comes to a halt, there's
probably an irresponsible co-worker somew
http://www.computerweekly.com/articles/article.asp?liArticleID=122562
by John Kavanagh
17 June 2003
Expert BCS members have warned movie fans not to try to emulate the
realistic depiction of computer hacking seen in hit film The Matrix
Reloaded.
The society said many experts were sufficientl
t said "Deloitte Consultant" or "ISS Developer,"
doesn't qualify them as silver bullet product developers or security
saviors.
There's a lot of truth to the idea that something that works well
takes time to develop.
--- InfoSec News <[EMAIL PROTECTED]> wrote:
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
On Tue, 17 Jun 2003 17:14, InfoSec News wrote:
> By Mark Rasch
> June 16, 2003
[...]
> Professional penetration testers already know to get explicit
> authorization in writing before beginning work. But given the
> dramatic s
http://news.com.com/2100-1028_3-1018845.html
By Declan McCullagh
Staff Writer, CNET News.com
June 18, 2003
Sen. Orrin Hatch on Wednesday backpedaled slightly from his suggestion
a day earlier that copyright holders should be allowed to remotely
destroy the computers of music pirates.
In a brief
This Issue Sponsored By
Hewlett-Packard
http://list.winnetmag.com/cgi-bin3/DM/y/eRPA0CJgSH0CBw08fJ0Av
Windows & .NET Magazine
http://list.winnetmag.com/cgi-bin3/DM/y/eRPA0CJgSH0CBw06cX0A5
1. In Focus: Are IDSs Overrated?
2. Security Risks
===
The Secunia Weekly Advisory Summary
2003-06-12 - 2003-06-19
This week : 65 advisories
===
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.fcw.com/fcw/articles/2003/0616/web-dod-06-18-03.asp
By Dan Caterinicchia
June 18, 2003
The Defense Department is working with government officials at all
levels, as well as with the private sector, to ensure that the
nation's crit
http://newsobserver.com/24hour/technology/story/920816p-6411106c.html
By CHRISTINA DYRNESS
THE NEWS & OBSERVER OF RALEIGH
June 18, 2003
(MN) - An Iraqi attack on U.S. computer systems leaves government
agencies in disarray until a cybervigilante comes to the rescue. So
goes the plot line of a
http://www.eweek.com/article2/0,3959,1130754,00.asp
By Dennis Fisher
June 18, 2003
A new Trojan that has been making its way around the Internet in
recent weeks continues to baffle security experts, who have been
unable to get a good handle on its behavior.
The Trojan apparently made its fir
Forwarded from: "Bill Scherr IV, GSEC, GCIA" <[EMAIL PROTECTED]>
I couldn't let this pass...
On 18 Jun 2003 at 2:57, InfoSec News wrote:
> Forwarded from: Pete Lindstrom <[EMAIL PROTECTED]>
>
> To further my comments in the article:
>
> I think acti
http://www.wired.com/news/politics/0,1283,59305,00.html
By Leander Kahney
June 19, 2003
Sen. Orrin Hatch (R-Utah) suggested Tuesday that people who download
copyright materials from the Internet should have their computers
automatically destroyed.
But Hatch himself is using unlicensed software
http://www.eweek.com/article2/0,3959,1132253,00.asp
By Dennis Fisher
June 19, 2003
Security experts finally have a handle on mystery malware that was
generating loads of suspicious IP traffic over the last few weeks.
Researchers at Internet Security Systems Inc. say the culprit, which
was first
http://www.fcw.com/geb/articles/2003/0616/web-hipaa-06-18-03.asp
By Dibya Sarkar
June 18, 2003
Although most health organizations still have another 22 months to
comply with new federal security standards, securing wireless networks
may pose a problem as they near the deadline.
"There are so
http://www.theregister.co.uk/content/69/31297.html
By Kevin Poulsen,
SecurityFocus
19/06/2003
On Tuesday the organization responsible for the Bluetooth wireless
standard unveiled version 1.2 of its official spec at the Bluetooth
World Congress in Amsterdam. But for real evidence that that the
t
Wow, when it rains, it pours!
This is bound to be blocked by over a 100+ subscribers corporate
content filters, but...
The link mentioned below is down, but leave it to Internet Wayback
Machine to have archived a copy of this page.
http://web.archive.org/web/20021021011621/http://www.senate.gov
http://www.tribnet.com/24hour/technology/story/921846p-6419204c.html
By STEVEN K. PAULSON
Associated Press
COLORADO SPRINGS, Colo. (June 19, 8:33 a.m. PDT) - It's a task that
would challenge even the sharpest of computer geeks: set up a
hacker-proof computer network for 190,000 government worker
clients and prospects. George and several other E&Y ISAAS
personnel spent the better part of a year doing nothing but putting on
these training sessions.
Scott D. Ramsey
NAPD, TSS
Jefferson Wells International
216.535.2011 - Office
216.496.2432 - Cell
-----Original Message-
From: InfoSe
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.eprairie.com/news/viewnews.asp?newsletterid=4690
By ADAM FENDELMAN
Editor-in-Chief
[EMAIL PROTECTED]
6/20/2003
CHICAGO - Chicago caught "Catch Me If You Can" muse Frank Abagnale Jr.
on Thursday night at the Four Seasons.
A crimina
http://cbs11tv.com/national/HackerArrested-aa/resources_news_html
Saturday June 21, 2003
RIVERSIDE, Calif. (AP) A 21-year-old student was arrested for
allegedly hacking into a university computer system during student
elections to cast hundreds of votes for a made-up candidate he named
American N
http://www.theregister.co.uk/content/55/31353.html
By Mike Kemp
20/06/2003
WebcamNow, a streaming image service with more than 1.5 million users
a month, stores user ids and passwords in plain text in the registry
of users' computers.
The coding snafu, first spotted by bugwatcher Donnie Wern
++
| LinuxSecurity.comLinux Advisory Watch |
| June 20th, 2002 Volume 4, Number 24a |
++
Editors: Dave Wreski
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.computerworld.com/securitytopics/security/story/0,10801,82390,00.html
By DAN VERTON
JUNE 23, 2003
Computerworld
NEW ORLEANS -- The need for a more secure network infrastructure was
one of the driving forces behind the U.S. Navy's q
http://news.independent.co.uk/uk/this_britain/story.jsp?story=418476
[Just goes to prove the fact that you could have the BEST security
controls and experience money can buy, and it can be all fouled up
with a little social engineering. - WK]
By Jason Bennetto
Crime Correspondent
24 June 2003
+--+
| Linux Security: Tips, Tricks, and Hackery |
| Published by Onsight, Inc. |
| |
| 23-June-2003
Forwarded from: "Blair, Paul" <[EMAIL PROTECTED]>
> ``I think he made his point, but you might say he went about it in
> the wrong way,'' Duran said. ``An e-mail to the webmaster might have
> sufficed.''
If this guy made no attempt to contact the people in charge of
whatever system he compromised
http://www.cbsnews.com/stories/2003/06/23/attack/main559834.shtml
HILLSBORO, Ore.
June 23, 2003
(CBS/AP) Power plants, bridges and buildings aren't the only things
vital to national security computer networks also are crucial. And
the FBI can't keep an eye on everything.
So a unique partne
http://www.signonsandiego.com/news/computing/20030623-0003-ca-wevebeenhacked.html
By Rachel Konrad
ASSOCIATED PRESS
June 23, 2003
SAN JOSE - California consumers will learn next month whether their
favorite shopping sites are steeled against computer fraud - or haunts
of hackers and identity th
http://security.ziffdavis.com/article2/0,3973,1134336,00.asp
By Larry Seltzer
June 23, 2003
CVE gives users, vendors, and toolmakers a common vocabulary for
vulnerabilities. Unfortunately, the bad guys move quite a bit faster.
If you ever read security vulnerabilities you eventually run into a
http://www.fcw.com/fcw/articles/2003/0623/web-hire-06-24-03.asp
By Nancy Ferris
June 24, 2003
All executive branch agencies are free to hire their own information
technology professionals to bolster the security of their information
systems, the Office of Personnel Management has announced.
The
http://www.net4nowt.com/isp_news/news_article.asp?News_ID=1001
By Peter Harris
25 June 2003
United Kingdom
A very shocked and horrified Virgin.net customer has notified Net4Nowt
of a potential security flaw in the companies online signup procedures
for the companies 24/7 Internet pacakage.
Virgi
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.timesonline.co.uk/newspaper/0,,1-719525,00.html
Simon Jenkins
June 20, 2003
I am not paranoid. It is just that people out there are trying to
scare me and I am not sure who they are. Some have Semtex and ricin,
dirty bombs and di
http://www.abc.net.au/science/news/scitech/SciTechRepublish_887398.htm
[Nice to see the Swiss Guards have an information warfare component
working to secure the Pontiff's network. :) - WK]
Wednesday, 25 June 2003
The Vatican has revealed it has taken on a team of experts to protect
the Pope'
Forwarded from: Kurt Seifried <[EMAIL PROTECTED]>
http://security.ziffdavis.com/article2/0,3973,1134336,00.asp
Actually the hope is that vendors come to Mitre requesting CVE CAN
numbers, i.e. you find a vulnerability, you go to SANS/Mitre/etc,
start the process, get a CAN entry, that way when you
school prank in national media merely because it involves a computer.
--dr
On June 23, 2003 12:58 am, InfoSec News wrote:
> http://cbs11tv.com/national/HackerArrested-aa/resources_news_html
>
> Saturday June 21, 2003
>
> RIVERSIDE, Calif. (AP) A 21-year-old student was arre
http://www.informationweek.com/story/showArticle.jhtml?articleID=10800126
By Eric Chabrow
June 24, 2003
Since January, the State Department has wiped out more than 155,000
viruses on its IT systems. Between Oct. 1 and May 31, the first eight
months of fiscal year 2003, the department recorded mo
Forwarded from: Steve W. Manzuik <[EMAIL PROTECTED]>
> The Vatican has revealed it has taken on a team of experts to
> protect the Pope's website which is attacked by some 10,000 viruses
> a month and at least 30 mainly American hackers every day.
So they obviously mean the attacking IP was an Am
http://www.paloaltoonline.com/paw/paonline/weekly/thisweek/2003_06_25.wire25.html
by Rachel Metz
June 25, 2003
In the heart of Silicon Valley, where companies secure information as
tightly as a bank safeguards money, some student records on Palo Alto
school district computers have been as easy t
This Issue Sponsored By
SPI Dynamics
http://list.winnetmag.com/cgi-bin3/DM/y/eRWs0CJgSH0CBw0BA3h0Am
J.A. Korsmeyer, Inc.
http://list.winnetmag.com/cgi-bin3/DM/y/eRWs0CJgSH0CBw0BA3f0Ak
1. In Focus: Legalizing "Hacking Back": A Comedy of Errors
Forwarded from: Adam Shostack <[EMAIL PROTECTED]>
On Wed, Jun 25, 2003 at 02:39:50AM -0500, InfoSec News wrote:
| Forwarded from: Kurt Seifried <[EMAIL PROTECTED]>
| related to? etc.)then of course it will be "old". As for the CAN ->
| CVE process this isn't that
his time).
Jon Miller, CISSP, GSEC
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of InfoSec News
Sent: Wednesday, June 25, 2003 3:38 AM
To: [EMAIL PROTECTED]
Subject: Re: [ISN] Student arrested for allegedly hacking university
compu
http://www.nwfusion.com/news/2003/0625symtecflaw.html
By Paul Roberts
IDG News Service
06/25/03
It's shaping up to be a bad week for antivirus software company
Symantec after researchers raised alarms about security holes and
buggy code in two of the company's products.
On Monday, Symantec ackno
Forwarded from: Ejovi Nuwere <[EMAIL PROTECTED]>
It will be interesting to see how ISPs respond when the subpoenas go
out. I would also be curious in knowing how automated this process is
going to be? Manually tracking users connections (during file downloads)
would be awfully tedious. If you s
http://www.drudgereport.com/flash.htm
Jun 26 2003
ROLL CALL
Billionaire Bill Gates learned the hard way that the Secret Service
means business when it comes to checking identification at the White
House gates, ROLL CALL reports.
Gates showed up at the White House on Wednesday afternoon for
===
The Secunia Weekly Advisory Summary
2003-06-19 - 2003-06-26
This week : 45 advisories
===
http://www.globetechnology.com/servlet/story/RTGAM.20030626.gttwcybe/BNStory/Technology/
By CHRISTOPHER GULY
Special to The Globe and Mail
June 26, 2003
OTTAWA - Stepping up its war against on-line terrorism, the federal
government is launching an effort to anticipate and stop cyber-attacks
befo
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.infoworld.com/article/03/06/26/HNcybersecure_1.html
By Paul Roberts
IDG News Service
June 26, 2003
The atmosphere in the new U.S. Department of Homeland Security (DHS)
is one of chaotic energy, akin to a "dot com," but the new ag
Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <[EMAIL PROTECTED]>
I am, today, seeing an absolute flood of messages infected with the
Sobig.E worm. It may be an anomaly, but the numbers I am seeing in my
own mail would seem to warrant some kind of warning.
Sobig spoofs message h
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
On Thu, 26 Jun 2003 18:50, Jon Miller wrote:
> That this student chose to use his skills to exploit a university
> computer system (not well known for security in general) is
> troubling. It wasn't by accident that he did this, and unless he's
> be
http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/2003/06/27/national2105EDT0820.DTL
ROBERT GEHRKE
Associated Press Writer
June 27, 2003
WASHINGTON (AP) - A federal judge pulled the plug Friday on many of
the Interior Department's Internet systems -- the second time the
judge has ord
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.sundayherald.com/34961
Gabriel Ronay
29 June 2003
Several top American companies have been blackmailed to the tune of
$50,000 a head by Romanian hackers practising 'cyber- terrorism' from
the backwoods of Transylvania. Astonishingl
++
| LinuxSecurity.comLinux Advisory Watch |
| June 27th, 2002 Volume 4, Number 25a |
++
Editors: Dave Wreski
Officer
The City of New York, HRA
Management Information Systems
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of InfoSec News
Sent: Friday, June 27, 2003 2:37 AM
To: [EMAIL PROTECTED]
Subject: Re: [ISN] Student arrested for allegedly hacking unive
Forwarded from: Rob Rosenberger <[EMAIL PROTECTED]>
>>Liscouski was in Framingham, Mass., Thursday, speaking with
>>members of the press and discussing the government's plans
>>to fight cyberterrorism and protect the nation's critical
>>infrastructure.
I can't recall seeing any of these
http://www.vnunet.com/News/1141901
By Robert Jaques
27-06-2003
Suggestion that hackers control three million servers is 'nonsense'
Security expert Neil Barrett has poured scorn on research released
this week claiming that hackers are in control of at least three
million servers around the world
http://www.nwfusion.com/news/2003/0627trustmicrosoft.html
By John Fontana
Network World Fusion
06/27/03
When Microsoft completes development of Exchange 2003 next week it
will not only be the end of a three-year effort but the beginning of a
real-world gauntlet to test Microsoft's promise to de
With today the 1st of July, I have updated the C4I.org mainpage with a
new bunch of links, and updated the few dead links with content from
Archive.org. -- http://www.c4i.org
-=-
Call for donations for InfoSec News and C4I.org!
http://www.c4i.org/contribute.html
Richard Clarke once said
nch of third world kids. Geez, they much be something special -
'cyber terrorists'? What kind of 'protected' database was that then?
And how much had these "big US companies" spent on taking the most
elementary precautions? ROTFL!
-Original Message-
From: Info
+-+
| LinuxSecurity.comWeekly Newsletter |
| June 30th, 2003 Volume 4, Number 26n |
| |
| Editoria
http://www.nwfusion.com/news/2003/0630schwartau.html
By Winn Schwartau
Network World
06/30/03
Recently a reporter called the Pentagon's public affairs office and
asked for the location and itinerary of certain aircraft carriers and
their battle groups. He was told that this information is classif
Forwarded from: Lance Spitzner <[EMAIL PROTECTED]>
On Mon, 30 Jun 2003, InfoSec News wrote:
> But Barrett, technical director at Information Risk Management,
> questioned how any hacker could own 600 computers at any one time.
>
> From his experience working with the po
http://www.theregister.co.uk/content/55/31478.html
By Kevin Poulsen,
SecurityFocus
30/06/2003
Pet supply retailer PetCo.com plugged a hole in its online storefront
over the weekend that left as many as 500,000 credit card numbers open
to anyone able to construct a specially-crafted URL.
The pe
http://www.nytimes.com/2003/06/30/technology/30NECO.html
By STEVE LOHR
June 30, 2003
ROBERT LISCOUSKI left his job as the head of information security at
Coca-Cola three months ago to join a start-up. "I refer to it as
DHS.com, and that's probably a good way to think about it," he said.
The pac
http://www.c4i.org/contribute.html
First, we would like to thank those of you who stepped up to the plate
and donated a little something to InfoSec News and C4I.org, its
greatly appreciated!
If you tried to donate a $1.00+ via Paypal yesterday and were getting
a note about an additional $4
http://www.globeandmail.com/servlet/story/RTGAM.20030701.wmike71/BNStory/Technology/
Associated Press
July 1, 2003
Washington - Microsoft Corp. said Tuesday it has fixed another
security flaw in its popular Internet Passport service, which could
have allowed hackers to hijack some older accoun
Email: [EMAIL PROTECTED]
> -Original Message-----
> From: InfoSec News [mailto:[EMAIL PROTECTED]
> Sent: 01 July 2003 12:08
> To: [EMAIL PROTECTED]
> Subject: Re: [ISN] Expert slams outlandish hacker claims
>
> Forwarded from: Lance Spitzner <[EMAIL PROTECTED]>
&
Forwarded from: John <[EMAIL PROTECTED]>
Greetings,
Michiganwireless.org would like to announce a new mail list has been
created by Blackwave and audit of the Netstumbler Forums...
This list will be focused on wardriving in general, wardriving in the
media, wardriving ethics, and basically war
http://www.computerworld.com/securitytopics/security/story/0,10801,82646,00.html
By DAN VERTON
JUNE 30, 2003
Computerworld
PHILADELPHIA - Retired supreme allied commander Gen. Wesley K. Clark
said today that the insurance industry and tougher government
enforcement of security standards are key
Forwarded from: Robert G. Ferrell <[EMAIL PROTECTED]>
>Forwarded from: Lance Spitzner <[EMAIL PROTECTED]>
>
>On Mon, 30 Jun 2003, InfoSec News wrote:
>
> > But Barrett, technical director at Information Risk Management,
> > questioned how any hacker cou
http://www.forbes.com/home_asia/newswire/2003/07/01/rtr1016532.html
By Timothy Gardner
Reuters
07.01.03
NEW YORK (Reuters) - A federal judge has ordered the U.S. agency that
monitors energy platforms in the Gulf of Mexico to shut down its
Internet and email systems indefinitely to block hackers f
http://www.zone-h.org/en/news/read/id=2986/
SyS64738 - G00db0y
07/02/2003
Zone-H.org statement about the announced "defacement challenge" We at
Zone-H have been informed about the oncoming "defacement challenge", a
defacer contest that should happen July 6th in which defacers are
challenged to de
http://www.wired.com/news/wireless/0,1382,59460,00.html
By Xeni Jardin
July 02, 2003
Mike Outmesguine leans against a Chevy Suburban packed with Wi-Fi, GPS
and ham radio gadgets, gazing out at the necklace of hilltop radio
towers that surround Los Angeles' Chinatown.
"The cool thing about war dr
http://www.theregister.co.uk/content/55/31517.html
By John Leyden
Posted: 02/07/2003
A Kazakhstan man was jailed yesterday to 51 months in prison following
his conviction in February for an attempt to extort $200,000 from
Michael Bloomberg, founder of the Bloomberg financial news service.
Oleg
This Issue Sponsored By
Shavlik
http://list.winnetmag.com/cgi-bin3/DM/y/eRdu0CJgSH0CBw076e0Al
Panda Security
http://list.winnetmag.com/cgi-bin3/DM/y/eRdu0CJgSH0CBw0BBDp0AT
1. In Focus: Win2K SP4: A Few Things to Know
2. Security Risks
-- Forwarded message --
Date: Sun, 6 Jul 2003 20:49:35 -0400 (EDT)
From: security curmudgeon <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: [defaced-commentary] Web vandalism contest results unclear
[Visit treachery.net or attrition.org to see the spoof.]
Web vandalism conte
http://www.theregister.co.uk/content/69/31567.html
By Kevin Poulsen
SecurityFocus
Posted: 04/07/2003
Think you've heard more than enough about war driving and Wi-Fi
insecurity? Two days of electronic eavesdropping at the 802.11 Planet
Expo in Boston last week sniffed out more evidence that most
Forwarded from: Dave Dittrich <[EMAIL PROTECTED]>
On Tue, 1 Jul 2003, InfoSec News wrote:
> Forwarded from: Lance Spitzner <[EMAIL PROTECTED]>
>
> On Mon, 30 Jun 2003, InfoSec News wrote:
>
> > But Barrett, technical director at Information Risk Management,
>
+--+
| Linux Security: Tips, Tricks, and Hackery |
| Published by Onsight, Inc. |
| |
| 03-July-2003
++
| LinuxSecurity.comLinux Advisory Watch |
| July 4th, 2002 Volume 4, Number 26a |
++
Editors: Dave Wreski
===
The Secunia Weekly Advisory Summary
2003-06-26 - 2003-07-03
This week : 45 advisories
===
http://www.extremetech.com/article2/0,3973,1179181,00.asp
By Mark Hachman
July 3, 2003
A spokeswoman for firewall manufacturer Zone Labs said the company has
reconsidered a previous decision and will upgrade its free ZoneAlarm
firewall software to address a vulnerability found this week.
A pat
http://www.wired.com/news/infostructure/0,1377,59473,00.html
By Michelle Delio
July 03, 2003
One of the Web's best FUD-fighting sites may not be around much
longer.
FUD -- which stands for Fear, Uncertainty and Doubt -- is a marketing
technique. Stir up enough FUD about some scary threat and
+-+
| LinuxSecurity.comWeekly Newsletter |
| July 7th, 2003Volume 4, Number 27n |
| |
| Editoria
http://www.koreaherald.co.kr/SITE/data/html_dir/2003/07/05/200307050052.asp
The Korea Herald
[EMAIL PROTECTED]
July 7, 2003
Samsung Electronics, the world's largest chipmaker, yesterday said it
would block employees and visitors from bringing their camera phones
into semiconductor, flat-panel an
http://www.eweek.com/article2/0,3959,1185275,00.asp
By Jim Rapoza
July 7, 2003
Security has become a very big business in IT over the past few years.
You'd think its growth as a commercial market would have made all our
information more secure. It hasn't. Aside from the vendors that
provide sc
Forwarded from: Steve W. Manzuik <[EMAIL PROTECTED]>
http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/1057534596427_8//
OMFG!!
"Hackers disrupt Internet during online battle
Associated Press
WASHINGTON - Parts of the Internet erupted Sunday in a battle among
ha
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.washingtonpost.com/wp-dyn/articles/A23689-2003Jul7.html
By Laura Blumenfeld
Washington Post Staff Writer
Tuesday, July 8, 2003
Sean Gorman's professor called his dissertation "tedious and
unimportant." Gorman didn't talk about it wh
http://www.nytimes.com/2003/07/07/technology/07BLOW.html
By JOHN MARKOFF
July 7, 2003
Sitting at his laptop computer in a hotel near Toronto one day last
October, Gregory Gabrenya was alarmed by what he discovered in the
sales-support database of his new employer, Platform Software: the
names
http://security.ziffdavis.com/article2/0,3973,1185262,00.asp
By Dennis Fisher
eWEEK
July 7, 2003
Internet Security Systems Inc. last week unveiled its first
Catastrophic Risk Index, a compilation of the 31 most serious current
vulnerabilities and attacks.
The index is designed to give admini
101 - 200 of 5869 matches
Mail list logo