This Issue Sponsored By
Exchange & Outlook Administrator
http://list.winnetmag.com/cgi-bin3/DM/y/ed8D0CJgSH0CBw0BEf10Am
1. In Focus: Defending Against Online Fraud
2. Announcements
- InfoSec World Conference and Expo/2004, Orlando, FL
http://www.computerworld.com/securitytopics/security/story/0,10801,89062,00.html
Story by Linda Rosencrance
JANUARY 14, 2004
COMPUTERWORLD
Airlines Reporting Corp. (ARC), an airline-owned financial transaction
processing company, said yesterday that two computers, one of which
contained airline
http://www.thekansascitychannel.com/technology/2764780/detail.html
January 14, 2004
KANSAS CITY, Mo. -- A hacker broke into the University of
Missouri-Kansas City computer security system, compromising the
passwords of about 17,000 students, staff and faculty.
The school's Internet system was te
Forwarded from: Sarah Hollins <[EMAIL PROTECTED]>
http://www.iso17799-web.com/issue9.htm
This quarterly news bulletin covers developments exclusively with
respect to the international information security standard.
This latest issue covers the following topics:
1) Obtaining ISO17799
2) Establ
http://news.com.com/2100-7349_3-5141196.html
By Robert Lemos
Staff Writer, CNET News.com
January 14, 2004
Straddling the line between public service and marketing, Microsoft
and a handful of security companies are sponsoring a campaign to
heighten consumer security awareness and have declared Ja
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.fcw.com/fcw/articles/2004/0112/web-sade-01-14-04.asp
By Dibya Sarkar
Jan. 14, 2004
A senior Commerce Department official said funding will be poured into
information technology security this year, emphasizing that
contractors they
http://www.securitypipeline.com/news/showArticle.jhtml%3Bjsessionid=OB5UFEWRASQTMQSNDBGCKHQ?articleId=17301712
By Antone Gonsalves
TechWeb News
January 15, 2004
Dependence on the Internet for voice communications and data
distribution will increase the likelihood of cyberwarfare, a high-tech
re
http://www.informationweek.com/story/showArticle.jhtml?articleID=17301563
By Eric Chabrow
Jan. 15, 2004
The federal government has spent about $1 billion on 89 public key
infrastructure programs among 20 major agencies in recent years, but
the results of those programs are mixed, according to a
http://news.com.com/2100-7355-5141765.html
By Robert Lemos
Staff Writer, CNET News.com
January 15, 2004
Two years after Chairman Bill Gates called on Microsoft to redouble
its efforts to secure its software, the company is beginning to make
progress, according to customers--but much work remains
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.smh.com.au/articles/2004/01/14/1073877889610.html
By Sam Varghese
January 15, 2004
Georgi Guninski is a man who is respected on vulnerability mailing
lists. The Bulgarian security expert - and this is one instance when
the word can b
http://www.wired.com/news/politics/0,1283,61928,00.html
By Joanna Glasner
Jan. 16, 2004
A federal law intended to curb the scourge of junk e-mail appears to
have had little effect so far in discouraging spammers from deluging
inboxes.
In the two weeks since the Can-Spam Act, a U.S. law barring
http://www.abc.net.au/asiapacific/news/GoAsiaPacificBNP_1026658.htm
16/01/2004
ABC Radio Australia News
Computer hackers have targetted one of Papua New Guinea's largest
internet service providers.
A hacker named 'Red Eye' targetted web servers belonging to Datec,
which hosts a number of gover
http://www.computerworld.com/securitytopics/security/story/0,10801,89138,00.html
Story by Jennifer Tan
JANUARY 16, 2004
REUTERS
Computer virus attacks cost global businesses an estimated $55 billion
in damages in 2003, a sum that would rise this year, said Trend Micro
Inc., the world's third-larg
Forwarded from: security curmudgeon <[EMAIL PROTECTED]>
: http://news.com.com/2100-7355-5141765.html
:
: By Robert Lemos
: Staff Writer, CNET News.com
: January 15, 2004
:
: Two years after Chairman Bill Gates called on Microsoft to redouble
: its efforts to secure its software, the company is beg
++
| LinuxSecurity.comLinux Advisory Watch |
| January 16th, 2004Volume 5, Number 3a |
++
Editors: Dave Wreski
http://www.zyworld.com/brancatelli/bf2004/branc011504.htm
BY JOE BRANCATELLI
January 15, 2004
[EMAIL PROTECTED]
This has been on my mind a lot since September 11th, but it took the
events at Washington/Dulles airport this week to convince me to put it
out in the public domain.
What if everything
Forwarded from: Chad W. Didier <[EMAIL PROTECTED]>
Why not quarantine individual computers or networks at the ISP level
then redirect them to a proxy that does nothing but tell the
users/admins their network is compromised and quarantined and will
remain so until the problem is solved? The ISP co
http://www.computerworld.com/securitytopics/security/story/0,10801,89302,00.html
Advice by Rob van Hoboken
Consul Risk Management
JANUARY 29, 2004
COMPUTERWORLD
Twenty years ago, mainframes sat in tight glass houses, accessed by a
limited list of select employees. Today, mainframes remain a ma
Forwarded from: DallasCon <[EMAIL PROTECTED]>
DallasCon Network Security Boot Camp
April 27-30 , 2004 - 4 Days of Intense Hands-on Network and Wireless
Security Training by Renowned Experts.
Come to Dallas 4-Days prior to DallasCon 2004 and take part in this
intense two-part, hands-on training d
http://www.canada.com/technology/story.html?id=6C29A5E1-9C5B-4EEC-BE98-0D3D5F0B434C
STEVE MERTL
Canadian Press
February 03, 2004
VANCOUVER (CP) - An assault on Microsoft Corp. web sites appears to
have fizzled because hackers used a poorly written virus, a Canadian
antivirus expert said Tues
Forwarded from: Vmyths.com Virus Hysteria Alert <[EMAIL PROTECTED]>
Vmyths.com Virus Hysteria Alert
{2 February 2004, 22:05 CT}
In our previous Hysteria Alert, we predicted "someone will soon
declare a 'guesstimate' damage value for the MyDoom virus/worm,
strictly for its PR value." Vmyths named
Forwarded from: Marjorie Simmons <[EMAIL PROTECTED]>
http://www.theregister.co.uk/content/55/35295.html
By Kevin Poulsen
SecurityFocus
3/2/04
Jerome Heckenkamp pleaded guilty Thursday to defacing the online
auction house eBay and penetrating systems at the San Diego-based
telecommunication equi
http://www.lifewithalacrity.com/2004/02/confirmed_email.html
Christopher Allen
Posted on February 1, 2004
Another Orkut user and I have confirmed a privacy hole in Orkut
whenever you send a message to someone via Orkut.
For instance, whenever I send a message to anyone in the system that
is f
Forwarded from: Gadi Evron <[EMAIL PROTECTED]>
For the past month or two we have been seeing more and more off-topic
message on the TH-Research (Trojan Horses Research) mailing list.
We decided to start a new mailing list to take off the "pressure".
The new mailing list is called appsec-research
http://news.com.com/2100-7355_3-5153534.html
By Robert Lemos
Staff Writer, CNET News.com
February 4, 2004
Some Web developers are complaining that an Internet Explorer patch
that's meant to foil Net scams is disabling some applications that
didn't put a premium on security.
Microsoft last week
http://www.lasvegassun.com/sunbin/stories/lv-other/2004/feb/04/516294521.html
By Jace Radke
February 04, 2004
<[EMAIL PROTECTED]>
LAS VEGAS SUN
The Nevada Cyber Crime Task Force has a new home in its hunt for
hackers and cyber criminals.
The new, larger "cyber-laboratory" is located in North L
http://www.washingtonpost.com/wp-dyn/articles/A12893-2004Feb4.html
By Jennifer Barrett
Newsweek
February 4, 2004
The Department of Homeland Security didn't have to wait long to test
out its new National Cyber Alert System. Hours after the system went
online Wednesday, it issued its first major
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://portal.telegraph.co.uk/news/main.jhtml?xml=/news/2004/02/05/npige05.xml
[I'll be honest here, there is little to no security information in
this article, I found it interesting in the context of last week with
all the spam I usually get,
This Issue Sponsored By
Be Proactive with Real-Time Monitoring
http://list.winnetmag.com/cgi-bin3/DM/y/eeUk0CJgSH0CBw0BFIl0AS
Free Download: Shavlik Security Patch Management
http://list.winnetmag.com/cgi-bin3/DM/y/eeUk0CJgSH0CBw0BDoF0AQ
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.eweek.com/article2/0,4149,1517369,00.asp
By Peter Coffee
February 5, 2004
Every few years, I find it worth my time to re-read Ken Thompson's
August 1984 article, "Reflections on Trusting Trust," based on his
1983 Turing Award lec
http://the.honoluluadvertiser.com/article/2004/Feb/05/ln/ln01a.html
By Peter Boylan
Advertiser Staff Writer
February 5, 2004
Agents with the Federal Bureau of Investigation's Cyber Crime Squad
have been approaching O'ahu computer-repair specialists, network
consultants and software developers
Forwarded from: US-CERT <[EMAIL PROTECTED]>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
HTTP Parsing Vulnerabilities in Check Point Firewall-1
Original release date: February 05, 2004
Last revised: --
Source: US-CERT
A complete revision history can be found at the end of this file
http://www.computerworld.com/securitytopics/security/story/0,10801,89897,00.html
By Paul Roberts
FEBRUARY 05, 2004
IDG NEWS SERVICE
E-mail users who were slow to update their antivirus software last
week may have been surprised to receive a flood of e-mail messages
containing .zip files from lo
http://news.com.com/2100-1029_3-5154321.html
By Robert Lemos
Staff Writer, CNET News.com
February 5, 2004
The U.S. Department of Defense on Thursday backed off plans for a
large-scale test of a voting system designed to let Americans who are
overseas cast ballots in the coming election over th
http://www.packetstormsecurity.org/
[I have verified this information as being the case, donations of
hosting space can be made to the e-mail address listed below. - WK]
On January 12, 2004, Packet Storm had its connectivity turned off
without any forewarning.
After the plug was pulled, it
The Secunia Weekly Advisory Summary
2004-01-29 - 2004-02-05
This week : 52 advisories
===
http://www.smh.com.au/articles/2004/02/05/1075853987198.html
Fort Worth, Texas
February 5, 2004
In 1990, Robert Morris Jr carved his name in cybercrime history when
he became the first person prosecuted under America's 1986 Computer
Fraud and Abuse Act.
There haven't been a lot of others since.
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.washingtonpost.com/wp-dyn/articles/A24053-2004Feb8.html
By Yuki Noguchi
Washington Post Staff Writer
Monday, February 9, 2004
Sitting at his laptop, Chris O'Ferrell types a few words into the
Google search engine and up pops a link
++
| LinuxSecurity.comLinux Advisory Watch |
| February 6th, 2004Volume 5, Number 6a |
++
Editors: Dave Wreski
http://www.theregister.co.uk/content/55/35393.html
By John Leyden
Posted: 06/02/2004
Busy or apathetic employees are accelerating the spread of viruses and
potentially costing UK businesses millions in clean-up charges,
according to a survey out today.
Two-thirds of the 1,000 people quizzed
http://www.computerworld.com/securitytopics/security/story/0,10801,89932,00.html
By Jaikumar Vijayan
FEBRUARY 06, 2004
COMPUTERWORLD
Dealing with a distributed denial-of-service attack such as the one
that took down The SCO Group Inc.'s Web site this week continues to be
a major challenge for c
http://www.theregister.co.uk/content/55/35434.html
By John Leyden
Posted: 09/02/2004
Powergen and a customer who highlighted a serious breach in consumer
security at the utility more than three years ago are still locked in
legal dispute.
John Chamberlain earned the enmity of the British util
just my 2 cents of ranting on this subject... thanks for
listening
Cheers,
Jimmy
InfoSec News wrote:
> http://www.computerworld.com/securitytopics/security/story/0,10801,89897,00.html
>
> By Paul Roberts
> FEBRUARY 05, 2004
> IDG NEWS SERVICE
>
> E-mail users who were slow to upda
http://www.reuters.co.uk/newsPackageArticle.jhtml?type=sportsNews&storyID=455399§ion=news
10 February, 2004
ATHENS (Reuters) - Security officials for the Athens Olympics are
working on plans to counter a possible hacker attack on key
infrastructure during the Games in August, a Greek newspaper
+-+
| LinuxSecurity.comWeekly Newsletter |
| February 9th, 2004 Volume 5, Number 6n |
| |
| Editoria
Forwarded from: Brian Reilly <[EMAIL PROTECTED]>
http://www.nytimes.com/2004/02/08/magazine/08WORMS.html
The New York Times Magazine
February 8, 2004
By CLIVE THOMPSON
This is how easy it has become.
Mario stubs out his cigarette and sits down at the desk in his
bedroom. He pops into his laptop
Forwarded from: "Marc Maiffret" <[EMAIL PROTECTED]>
Microsoft ASN.1 Library Length Overflow Heap Corruption
Release Date:
February 10, 2004
Date Reported:
July 25, 2003
Severity:
High (Remote Code Execution)
Systems Affected:
Microsoft Windows NT 4.0 (all versions)
Microsoft Windows 2000 (SP3
Forwarded from: Remco B. Brink <[EMAIL PROTECTED]>
> Forwarded from: KUIJPERS Jimmy <[EMAIL PROTECTED]>
>
> *.zip posses no real danger in my opinion. Winzip or similiar
> software was installed on many end user systems anyway. Embeding
> this functionality with Windows XP doesn't really increas
http://www.theregister.co.uk/content/55/35447.html
By Mark Rasch
SecurityFocus
Posted: 10/02/2004
Did Republican staffers commit a crime by clicking on the "My Network
Places" icon to access Democratic memos, asks SecurityFocus columnist
Mark Rasch.
Politics is dirty business, and rarely so muc
http://news.com.com/2100-7349_3-5156836.html
By Robert Lemos
Staff Writer, CNET News.com
February 10, 2004
A worm that started spreading on Sunday places the source code for the
original MyDoom virus on victims' hard drives, an action equivalent to
planting evidence, antivirus experts said Tuesd
Forwarded from: "Marc Maiffret" <[EMAIL PROTECTED]>
Microsoft ASN.1 Library Bit String Heap Corruption
Release Date:
February 10, 2004
Date Reported:
September 25, 2003
Severity:
High (Remote Code Execution)
Systems Affected:
Microsoft Windows NT 4.0
Microsoft Windows 2000
Microsoft Windows XP
Forwarded from: Cuadros Alvaro <[EMAIL PROTECTED]>
I woudn't consider that as a serious problem, Zipping ( Commpressing )
a file has its limits you can not compress beyond what the compression
algorithms allow you to. Just try to zip or rar a file 20 times , the
result is going to be the same at
http://www.computerworld.com/securitytopics/security/story/0,10801,90131,00.html
By John Blau
FEBRUARY 11, 2004
Be careful the next time you turn on your Bluetooth-enabled phone:
You could unknowingly be opening the door to a nasty intruder who
could steal confidential information such as your
http://www.theregister.co.uk/content/56/35516.html
By John Leyden
Posted: 12/02/2004
MyDoom-A is programmed to stop spreading today, marking the end of
arguably the worst email-borne viral epidemic to date.
MessageLabs, the email filtering firm, blocked the virus 43,979,281
times in the two week
Forwarded from: Dragos Ruiu <[EMAIL PROTECTED]>
On February 11, 2004 02:46 am, InfoSec News wrote:
> "It stands to reason that the author might be hiding his tracks,"
> said Craig Schmugar, virus research manager for Network Associates.
> "He might be trying
Forwarded from: "Julie JCH Ryan, D.Sc." <[EMAIL PROTECTED]>
http://www.ncisse.org/conferences.htm
8th Annual Colloquium: 7-10 June, 2004
Cyber Security Partnerships: Cooperation, Collaboration, and Teamwork
for Excellence in Information Assurance Education
Recognizing that the protection of i
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.fcw.com/fcw/articles/2004/0209/web-yoran-02-11-04.asp
By Florence Olsen
Feb. 11, 2004
A Homeland Security Department official said this morning that the
government's record of fostering public/private partnerships for
securing cy
The Secunia Weekly Advisory Summary
2004-02-05 - 2004-02-12
This week : 50 advisories
===
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.washingtonpost.com/wp-dyn/articles/A38314-2004Feb12.html
By Brian Krebs
Special to The Washington Post
Friday, February 13, 2004
Microsoft Corp. last night confirmed that portions of the source code
for two versions of its Windows o
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
On Thu, 12 Feb 2004 23:44, InfoSec News <[EMAIL PROTECTED]> wrote:
> Forwarded from: Cuadros Alvaro <[EMAIL PROTECTED]>
>
> I woudn't consider that as a serious problem, Zipping ( Commpressing
> ) a file has its
http://www.computerworld.com/securitytopics/security/story/0,10801,90163,00.html
By BOB BREWIN
FEBRUARY 12, 2004
Cisco Systems Inc. has developed a new wireless LAN security protocol
designed to defeat brute force dictionary attacks that capture a
user's passwords, and it submitted a draft of th
http://www.silicon.com/software/security/0,39024655,39118419,00.htm
by Will Sturgeon
February 16 2004
A female Belgian virus writer who has been waging a very public and
protracted war against Sophos anti-virus expert Graham Cluley has been
arrested and charged by the authorities.
Over the pas
http://www.nwfusion.com/news/2004/0213mainsoft.html
By John Fontana
Network World Fusion
02/13/04
The Windows 2000 source code that was leaked to the Internet
originated from a Microsoft partner and not the software giant itself,
according to the BetaNews.com Web site.
In addition, the NTBugt
+-+
| LinuxSecurity.comWeekly Newsletter |
| February 16th, 2004Volume 5, Number 7n |
| |
| Editoria
http://www.usatoday.com/tech/news/computersecurity/2004-02-13-calif-spam-hack_x.htm
2/13/2004
SACRAMENTO (AP) - Hackers broke into a state agency's server
containing the sensitive personal information of tens of thousands of
people who work as nannies, butlers, and gardeners, and those who
emplo
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.eweek.com/article2/0,4149,1528043,00.asp
By David Morgenstern
February 16, 2004
A security company on Monday alerted clients of a new vulnerability to
Internet Explorer 5, one attributed to the recent leak of Microsoft
Corp. Win
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
On Sat, 14 Feb 2004 01:20, InfoSec News <[EMAIL PROTECTED]> wrote:
> Forwarded from: William Knowles <[EMAIL PROTECTED]>
>
> http://www.washingtonpost.com/wp-dyn/articles/A38314-2004Feb12.html
>
> By Brian Krebs
Forwarded from: bill_neis_corp <[EMAIL PROTECTED]>
Greetings Everyone:
As many may already know, I am the International Association of
Counterterrorism & Security Professionals Chapter Director for New
York State. IACSP is holding its 12th Annual Symposium and to which I
have been an invited spea
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.eweek.com/article2/0,4149,1528843,00.asp
By David Morgenstern
February 17, 2004
Microsoft Corp. is warning the online community to keep its hands off
purloined Windows source code.
The company on Tuesday confirmed it had sent le
http://www.esj.com/security/article.asp?EditorialsID=860
By Mathew Schwartz
2/18/2004
Expect security spending to get a boost at many companies, says The
Yankee Group after surveying surveyed 404 "decision makers" at
medium-to-large companies.
Half of respondents see security budgets increasing
http://www.computerworld.com/securitytopics/security/recovery/story/0,10801,90226,00.html
By Bob Brewin and Patrick Thibodeau
FEBRUARY 16, 2004
A California law that mandates earthquake-proof hospitals is sparking
massive investments in IT infrastructure upgrades by health care
companies in the s
http://www.usatoday.com/tech/news/computersecurity/2004-02-16-zombie-menace_x.htm
[I've said it once, I'll say it again, the home and small business
users of high-speed broadband internet services need a financial
incentive to use firewalls and anti-virus.
The only way that's going to happen,
27;s fear they'd lose business over the issue it'll never
happen unless it is legislated.
Short of denying them access or a virus with a devastating payload
there will be no change in attitudes.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
This Issue Sponsored By
Be Proactive with Real-Time Monitoring
http://list.winnetmag.com/cgi-bin3/DM/y/eefA0CJgSH0CBw0BFg40Ab
Free Download: Shavlik Security Patch Management
http://list.winnetmag.com/cgi-bin3/DM/y/eefA0CJgSH0CBw0BDoF0Az
* In Focus: Will Lea
http://news.com.com/2100-7355_3-5161205.html
By Robert Lemos
Staff Writer, CNET News.com
February 18, 2004
Microsoft has sent several letters to people known to have posted
Windows source code on the Internet, warning them to stop offering the
files and erase any copies.
The letters explain
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.fcw.com/fcw/articles/2004/0216/web-dhs-02-18-04.asp
By Dibya Sarkar
Feb. 18, 2004
The private sector can voluntarily submit critical infrastructure
information to the Homeland Security Department with a new program
designed to prot
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
On Wed, 18 Feb 2004 20:56, InfoSec News <[EMAIL PROTECTED]> wrote:
> Besides the illegal receipt of copyrighted materials, persons
> downloading the source code-especially developers-could face other
> problems,, legal expe
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.carrierhotels.com/news/2004/Feb/19/fbi_shutters_web_host.shtml
By Rich Miller
Carrier Hotels Editor
Posted Feb 19, 2004
If FBI agents showed up at your data center bearing a warrant, would
you be able to provide them prompt access t
Forwarded from: "Marc Maiffret" <[EMAIL PROTECTED]>
ZoneLabs SMTP Processing Buffer Overflow
Release Date:
February 18, 2004
Date Reported:
February 13, 2004
Severity:
Medium (Local Privilege Escalation/Remote Code Execution)
Vendor:
ZoneLabs Inc.
Software Affected:
ZoneAlarm 4.0 and above
Z
http://www.fcw.com/fcw/articles/2004/0223/web-darpa-02-23-04.asp
By Matthew French
Feb. 23, 2004
The Defense Advanced Research Projects Agency last week awarded an
$8.7 million increment of a $13.2 million contract to Springfield,
Va.-based Computer Systems Center Inc. (CSCI) for work on dynam
+--+
| Linux Security: Tips, Tricks, and Hackery |
| Published by Onsight, Inc. |
| |
| 19-February-2004
The Secunia Weekly Advisory Summary
2004-02-12 - 2004-02-19
This week : 61 advisories
===
http://www.wthr.com/Global/story.asp?S=1656871&nav=9TahKyMs
Rich Van Wyk/Eyewitness News
Indianapolis, Feb. 20 - Hamilton County sheriff's deputies accustomed
to looking for burglars and speeders are now being trained to spot
roving cyber thieves, so called war drivers.
They roam neighborhoods w
+-+
| LinuxSecurity.comWeekly Newsletter |
| February 23rd, 2004Volume 5, Number 8n |
| |
| Editoria
http://www.fcw.com/fcw/articles/2004/0223/web-dodfbi-02-23-04.asp
By Frank Tiboni
Feb. 23, 2004
The Defense Department awarded a $21.4 million contract today to the
Knowledge Consulting Group to write a security plan for DOD's
Counterintelligence Field Activity and the FBI's Foreign Terrorist
Tr
http://www.haaretzdaily.com/hasen/spages/396688.html
By The Associated Press
February 21, 2004
BEIRUT - A Palestinian militant group accused American and Israeli
groups Saturday of hacking into its Web site and destroying it.
Islamic Jihad, which has carried out suicide bombings in Israel,
http://www.eetimes.com/story/OEG20040220S0046
[While not security related, and tips the nightly batch of mail to
eight messages, I thought you all would be interested in NASA's little
hack to get Spirit working again. Definately click the URL above and
print this one out for the office bulletin
http://news.bbc.co.uk/1/hi/technology/3513849.stm
23 February, 2004
The UK's hi-tech crime squad has confirmed it is looking into
blackmail attempts, thought to be by Eastern European hackers, to
betting websites.
The gangs have threatened to flood bookmakers' sites with data,
disabling them bef
http://www.theregister.co.uk/content/55/35720.html
[ http://www.amazon.com/exec/obidos/ASIN/0593051866/c4iorg - WK]
By John Leyden
Posted: 20/02/2004
Book review - It's rare to read a book about computer security that
captures the spills and thrills of hunting cyber-criminals.
Neil Barrett's
Forwarded from: Marjorie Simmons <[EMAIL PROTECTED]>
http://www.miami.com/mld/miamiherald/8019815.htm
Mon, Feb. 23, 2004
Associated Press
ST. LOUIS - State investigators are trying to pinpoint whether
Southern Commercial Bank perhaps compromised the privacy of more than
40,000 customers by e-mai
http://www.informationweek.com/story/showArticle.jhtml?articleID=18100201
By Laurie Sullivan
Feb. 23, 2004
A former employee at computer-monitor maker ViewSonic Corp. was
sentenced Monday to one year in prison for hacking into the company's
computer system and wiping out critical data centr
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.computerworld.com/securitytopics/security/story/0,10801,90384,00.html
By Paul Roberts
FEBRUARY 23, 2004
Security is a hot topic in technology circles these days. For proof of
that statement, one need look no further than the buzz sur
http://www.washingtonpost.com/wp-dyn/articles/A3455-2004Feb24.html
By Brian Krebs
washingtonpost.com Staff Writer
February 25, 2004
Eleven of the nation's top computer security companies are forming a
new organization to lobby on cyber-security issues in Washington,
breaking ranks with the broade
http://www.eweek.com/article2/0,4149,1538027,00.asp
By Mark Hachman
February 24, 2004
SAN FRANCISCO - Enhanced security can solve many issues, but it can't
improve the thing that sits between the keyboard and the chair - the
user - a cryptographers' panel concluded Tuesday.
The panel, a sta
Forwarded from: William Knowles <[EMAIL PROTECTED]>
http://www.computerworld.com/securitytopics/security/story/0,10801,90448,00.html
By Dan Verton
FEBRUARY 24, 2004
COMPUTERWORLD
WASHINGTON -- The CIA, working with the FBI, the Department of
Homeland Security and the Pentagon, this week will pu
http://www.infoworld.com/article/04/02/24/HNunderattack_1.html
By Scarlet Pruitt
IDG News Service
February 24, 2004
LONDON -- Businesses worldwide face increasing threats from cyber
criminals attempting extortion and fraud because the software running
their systems makes them vulnerable, Mic
http://www.internetnews.com/dev-news/article.php/3317331
By Sean Michael Kerner
February 24, 2004
Most stories about government deployments of Linux involve a
distributor helping various federal and municipal agencies install the
open source operating system. But in this case, a federal agency
Forwarded from: Russell Coker <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
On Wed, 25 Feb 2004 21:10, InfoSec News <[EMAIL PROTECTED]> wrote:
> http://www.infoworld.com/article/04/02/24/HNunderattack_1.html
>
> By Scarlet Pruitt
> IDG News Service
> February 24, 2004
http://www.eweek.com/article2/0,4149,1539058,00.asp
By Lisa Vaas
February 25, 2004
In an effort to make it more secure, Microsoft Corp.'s "Yukon" version
of its SQL Server database will ship with certain features turned off,
according to Microsoft Director of Product Management for SQL Server
To
http://www.theregister.co.uk/content/55/35816.html
[ http://www.amazon.com/exec/obidos/ASIN/0072227877/c4iorg - WK]
By Thomas C Greene in Washington
Posted: 25/02/2004
Computerworld columnist Dan Verton has covered the security beat for
several years. He has recently weighed in on the cyber-t
901 - 1000 of 5869 matches
Mail list logo