******* You may leave the list at any time by sending an email to [EMAIL PROTECTED] with the text "SIGNOFF SECURITYPORTAL-L" in the body of the email. We will miss you! ******* Vendor Corner ******* Sponsored by VeriSign - The Internet Trust Company Secure all your Web servers now - with a proven 5-part strategy. The FREE Server Security Guide shows you how: * DEPLOY THE LATEST ENCRYPTION and authentication techniques * DELIVER TRANSPARENT PROTECTION with the strongest security without disrupting users. And more. Get your FREE Guide now: http://www.verisign.com/cgi-bin/go.cgi?a=n061210400003000 ******* What's New With SecurityPortal ******* The Coming Internet Sting - Counterfeit Ecommerce Sites The multitude of high profile virus outbreaks that have occurred since the Big Bang of Melissa over a year ago seem to prove that either users are not getting any more careful or that virus authors are getting even better at promoting their warez. While these viruses undeniably cause tremendous financial damage in terms of lost productivity and downtime, there has not been any monetary benefit to any sort of criminal group. These have been widespread acts of vandalism. The major spate of Distributed Denial of Service Attacks in February 2000 also demonstrated the ability of a small group or even a single person to control significant portions of Internet traffic for the purpose of creating havoc and nothing else. What seems inevitable is for more profit-oriented hackers to enter the fray, and combine the inherent weaknesses in both the Internet infrastructure and the people that use it to find lightning quick swindling opportunities. A likely candidate vulnerability that we have already seen a few examples of is the Counterfeit Ecommerce Site Scam. Read the full story here: http://securityportal.com/cover/coverstory20000911.html NEW FEATURE: Weekly Security Tools Digest This new digest contains a summary of the hottest new tools to come out during the week. It will be posted every Friday. If you would like to submit a tool for consideration please send it to: [EMAIL PROTECTED] You can find last weeks digest here. http://securityportal.com/topnews/weekly/tools20000908.html Ask Buffy Overflow Do you have questions about information security? Buffy has the answers. Every Thursday Buffy will post answers to your questions about security issues. Please send your questions to: [EMAIL PROTECTED] Want to read Buffy's answers to last week's questions? http://securityportal.com/topnews/buffy20000831.html ******* Vendor Corner ******* Entrust.net Inc. - We Bring Trust to e-Business(tm) WHY PAY MORE FOR 128-BIT SSL ENCRYPTION! Recent changes to U.S. export regulations have made 128-bit enabled browsers widely available. Expensive "step-up" Web server certificates are quickly becoming obsolete. Find out more about how Entrust.net web server certificates can enable security on your Web site at a price your business can afford: http://www.entrust.net/step-up ******* Top News ******* Welcome to SecurityPortal - The Focal Point for Security on the Net(tm) Recent postings in our top news http://www.securityportal.com/topnews: Sept 11, 2000 Weekly Axent Security Digest - The top story this week was all about preventing e-mail relaying off internal mail servers. Raptor addressed this issue by introducing anti-relay capabilities in the firewall two releases ago, but folks here share a wealth of information in locking down SMTP servers as well. Getting information through the firewall, whether creating VPNs or trying to get applications like RealPlayer working, continues to be the bane of many an administrator�s existence. Troubleshooting the problems and administering special rules gets notable mention this week. http://securityportal.com/topnews/weekly/axent20000911.html Weekly BSD Security Digest - There is a problem with screen (a local root hack depending how it was installed) and some advisories concerning ancient problems that are finally being fixed. NetBSD releases Netscape 4.74 to fix a bug. Too bad Netscape 4.75 is out, which solves another even more serious security bug. http://securityportal.com/topnews/weekly/bsd20000911.html Weekly Checkpoint Security Digest - It was a fairly light week for the Check Point mailing list. Although there were hundreds of posts, most topics of discussion surrounded typical administration tasks such as allowing various specific protocols through the firewall, configuring routing, and backing up and/or migrating important files. There were, however, a few very interesting posts, including one related to "tricking" Firewall-1 such that the exchange of firewall authentication information (putkeys) doesn't require firewall downtime. It is also becoming apparent that a very large portion of the list is running Firewall-1 version 4.1 SP1 or higher. Many of the new features of 4.1, such as support for hybrid-mode IKE, were also discussed this week. http://securityportal.com/topnews/weekly/checkpoint20000911.html Executive Weekly Security Digest - American Express announces disposable credit cards, RSA frees up their encryption 2 weeks early, a new Denial of Service tools are discovered in the wild, and security is making its way into PC hardware. Also, are your techies using encryption with your wireless devices? http://securityportal.com/topnews/weekly/exec20000911.html Weekly Linux Security Digest - More bad news this week with regard to glibc. A number of string related problems have been found. Chances are, if you updated glibc last week you will need to do it again. The good news is that people on the Linux audit list seem active, finding and fixing many problems in core Linux software. This means short term pain, but ignoring the problems won't make them go away either. Another popular utility, screen, has also been found to contain problems, if it is setuid you probably have a problem. Some good news is available: kernel 2.2.17 is now available, and fixes numerous problems. Upgrading is a good idea. http://securityportal.com/topnews/weekly/linux20000911.html Weekly Microsoft Security Digest - There has been more activity than last week from all sides. Microsoft released three new security bulletins/patches. NTBugtraq had postings on MSN Cookies, Alternate Data Streams, and WinZapper, a program to modify event logs. There has been more talk about Rootkit protection as well. See the tip of the week for info on keeping your IIS 5.0 installation as secure as possible. http://securityportal.com/topnews/weekly/microsoft20000911.html Weekly Solaris Security Digest - Vulnerabilities: Locale subsystem. 3rd Party Vulnerabilities: lpplus, imap/pine, xs4all ftp, screen, php, qnx, cgi script centre. Articles/News: Postfix, RBAC, strong encryption from Sun. Tool Updates: nmap, saint, sara, ssh. Discussions Summary: yassp & focus-sun. The Tip of the Week looks at using TSIG zone transfer authentication in BIND. http://securityportal.com/topnews/weekly/solaris20000911.html Sep 10, 2000 Openwall: Linux Security Enhancement Kernel Patch for 2.2.17 - This patch is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. http://www.openwall.com/linux/ AP: Western Union Web Site Hacked - Western Union warned thousands of online customers Saturday that hackers had broken into the money transferring company's Web site... http://dailynews.yahoo.com/h/ap/20000910/tc/western_union_hackers_1.html Sep 9, 2000 PGP 7.0 Desktop Security Released - PGP 7.0 has a number of new features including a plug-in for ICQ (instant messaging), a personal IDS, and a personal firewall. http://www.pgp.com/products/dtop-security/default-encryption.asp ZDNet: Two SuSE Linux Apache Vulnerabilities Identified - One vulnerability allows a malicious user to read passwords and discern network structure while the other allows a malicious user to create or browse file directories on a Web server. http://www.zdnet.com/zdhelp/stories/main/0,5594,2626044,00.html StarTribune: It's Not Easy to Fool Investigators With Phony e-Mail IDs - False identities may be a time-honored tradition on the Web, but as the case of the e-mail messages about DFL U.S. Senate candidate Mike Ciresi illustrates, fake isn't the same as anonymous. http://www.startribune.com/viewers/qview/cgi/qview.cgi?template=biz_a_cache& slug=isp09 Sep 8, 2000 The Register: Vodafone Upgrade Improves Voicemail Security - Ever vigilant cell phone operator Vodafone upgraded its voicemail software this week to provide improved security. Security was improved to the extent that a sizeable chunk of users found themselves locked out of their own voicemail. http://www.theregister.co.uk/content/5/13125.html Telekomnet.com: Symantec and DoCoMo in Talks on Virus Protection - Anti-virus software maker Symantec Japan, the Japanese unit of Cupertino, Calif.-based Symantec Corp, is in talks with NTT DoCoMo to supply the mobile phone operator with software to protect its i-mode Internet phones. http://www.telekomnet.com/news_security/9-8-00_symantec_docomo.asp Weekly Security Tools Digest - Favourite tools this week include OpenSSH 2.20p1, Nmap 2.54BETA4, Saint 2.2, and Sara v3.1.8. Tools for Windows include an event log management tool, a hotfix checker tool, and a web vulnerability scanner. UNIX based tools include PIKT - a multi-functional tool for monitoring systems, Pdump, a perl packet sniffer, and GASP, a protocol encoder/decoder. http://securityportal.com/topnews/weekly/tools20000908.html Lexis-Nexis: Hacker crashes military exercises, USA, Japan suspected - In June, a computer hacker single-handedly suspended a high-technology combat exercise using live ammunition that was held by the CCP [Chinese Communist Party], and triggered a lot of suspicions. It was reported that until today there is no result from the inspection, but it was suspected that the United States used satellite reconnaissance, and then-high-technology means to attack the central computer system in the command centre, or possibly could have been a hacking intrusion by Japanese spies who penetrated deep into the Chinese boundaries. Of course, it was also suspected that maybe an "insider ghost" in the army did the mischief. http://web.lexis-nexis.com/more/cahners-chicago/11407/6278307/1 Reuters: Fraudulent credit card charging for visiting web sites - A Federal Court judge has ordered three Los Angeles area residents to pay $37.5 million for billing 700,000 credit card holders for visits they never made to X-rated Web sites, the Federal Trade Commission said on Thursday. The FTC said that Kenneth and Teresa Taves and Dennis Rappaport and their businesses charged cardholders for visits to various Internet sites, even though many of the victims did not own computers. http://www.reuters.com/news_article.jhtml?type=internet&Repository=INTERNET_ REP&RepositoryStoryID=%2Fnews%2FIDS%2FInternet%2FNET-CRIME-WEBFRAUD-DC_TXT.X ML ZDnet Germany: Bulgarian bug hunter Georgi Guninski finds new ActiveX vulnerability in IE - Internet Explorer 5.5 suffers the so-called "Cross Frame Security Vulnerability", by which files on a user's PC can be read when a user visits a malicious web page. An explanation and demonstration of the vulnerability is available on Guninski's web site under http://www.nat.bg/~joro/webctrl2.html. Microsoft is developing a patch. Meanwhile, disabling active scripting is the only protection (in German). http://www.zdnet.de/news/artikel/2000/09/08008-wc.html Intern.de Germany: Vinton Cerf testifies for Carnivore in front of the US Senate - Sometimes called the "father of the Internet", Vinton Cerf offered an unexpected support to the FBI in his recent testimony to the US Senate. Giving the Carnivore surveillance software to ISPs would however be dangerous, he said, because ISPs are likely to be less familiar with legal constraints than law enforcement bodies. Original testimony under http://www.senate.gov/~judiciary/962000_vgc.htm. (article in German) http://www.intern.de/news/881.html 01net, France: Reaction to Amazon.com announcement about their new privacy policy - Amazon.com's modified privacy policy touches a very sensitive subject in Europe. For Amazon, customer data belongs to the company's assets, and could therefore be transferred to a possible buyer, should Amazon be acquired. The French law specifies that citizens must be offered a possibility to retract prior to transferring their data to a third party (in French). http://www.01net.com/rdn?oid=119440&rub=1643 SANS Flash Alert - Virus scanner inadequacies with NTFS - While the existence of data streams within the NT file system (NTFS) has been known for many years (Microsoft has released quite a bit of info on alternate streams), virus vendors have not taken steps to adequately check this area of the file system. This deficiency can be leveraged in order to hide malicious code or even cause the virus scanner itself to destroy critical system files. (See also related Top News postings of Sept 5th and 6th) http://securityportal.com/topnews/sans20000907.html HAL and Computer Security - The central character of Stanley Kubrick�s 2001: A Space Odyssey is HAL. An extremely intelligent computer that turns murderer, HAL understands standard English, reads lips, and possesses �common sense.� HAL�s motive in trying to kill the entire crew of the Jupiter probe is that he�s trying to protect the mission�s secret. HAL�s Legacy, edited by David Stork and published in 1997, discusses how far we�ve come since 1968 in creating such a machine. The book also raises the philosophical question, �When HAL kills, who�s to blame?� http://www.securityportal.com/topnews/hal20000908.html RSA Algorithm Released: Update - Yesterday, RSA formally announced that the RSA algorithm will be released into the public domain. This is definitely good news, but not too terribly significant, since it would have happened on September 20 anyway (when their patent expires). The release of the algorithm is a good thing because you can now create cryptographic software using one RSA implementation and distribute it worldwide without having to license anything from RSA. http://www.securityportal.com/topnews/rsa20000906.html Silicon.com: Rivals Celebrate as RSA Loses 'Anti Competitive' Encryption Patent - Rival security vendors promised greater competition in the ecommerce security market after a 20 year-old patent held by RSA Security for its encryption algorithm was lifted two weeks early. http://www.silicon.com/public/door?REQUNIQ=968370983&6004REQEVENT=&REQINT1=3 9521&REQSTR1=newsnow Wired: Digital Security for Free - In a surprise move following Wednesday's release of the patent on the main security algorithm used in digital security products, Baltimore Technologies will offer one of its key developer toolkit products for free from its website. http://www.wired.com/news/business/0,1367,38635,00.html InfoWorld.com: Palm Anti-Virus Product Previewed - Symantec has released a preview version of what it claims is the first antivirus product to scan applications for malicious code on Palm computers. http://www.infoworld.com/articles/hn/xml/00/09/07/000907hnpalmvirus.xml Newsbytes.com: FDA To Fork Over Docs On Web Site Security - In a last-minute response to a House Commerce Committee subpoena, the Food and Drug Administration (FDA) said today it would turn over more than 3,000 documents relating to online security. http://www.newsbytes.com/pubNews/00/154893.html Sep 7, 2000 CNet: Unix, Linux computers vulnerable to damaging new attacks - Security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers take full control of computers. http://news.cnet.com/news/0-1003-200-2719802.html?tag=st.ne.1002.tgif.ni Register: UK Govt warms to spam - The British Government has bottled out of plans to ban spam and has, instead, opted for a system of self-regulation. Britain's decision could be overturned if anti-spam legislation currently being discussed in Europe gets adopted. http://www.theregister.co.uk/content/1/13065.html ComputerWorld.com: Congress Takes up Bill Requiring Notice of e-Mail Monitoring - A bill proposed earlier this summer that would prohibit companies from secretly monitoring their employees' e-mail messages and Internet usage could get key congressional subcommittee approval next week as lawmakers rush to finish up business before adjourning early next month. http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49710,00.html VNUNet.com: Weak Security Found in Many Web Servers - One in three supposedly secure ebusiness servers are using software with known security weaknesses, and European sites are the worst offenders, according to a survey. Eric Murray, a consulting security architect based in the US, found that in a random sample of more than 8000 web servers running the SSL protocol, 32 per cent were "dangerously weak". http://www.vnunet.com/News/1110445 CNet: AmEx to offer "disposable" credit card numbers - Under the initiative, American Express cardholders will be able to log onto a secure Web site and receive a one-time-use credit card number for purchases over the Internet... http://news.cnet.com/news/0-1007-200-2716407.html?tag=st.ne.1002.thed.ni ZDNet: Feds improve online privacy policies - A new audit of federal government Web sites indicates some progress toward protecting user privacy. But some agencies fare better than others. http://www.zdnet.com/zdnn/stories/news/0,4586,2624995,00.html Salon: Put that silicon where the sun don't shine - Soon you can have a tracking chip implanted in your body. Is this a great technological breakthrough -- or Big Brother's last laugh? http://www.salon.com/tech/feature/2000/09/07/chips/index.html Ask Buffy - Do you have questions about information security? Buffy has the answers. "This week, I describe the pros and cons of one-time passwords and digital certificates. Also, Jasvire asked about adopting a network security system, and Jere inquired about blocking keyboard sniffers." http://securityportal.com/buffy/buffy20000906.html RSA Algorithm Released: So What? - Today, RSA formally announced that the RSA algorithm will be released into the public domain. This is definitely good news, and RSA should be applauded for their move. From an end consumer's point of view, however, this changes very little. http://securityportal.com/topnews/rsa20000906.html Human Factors in the Design of Security Web Pages - As more security monitoring systems become WWW-based, methods of evaluating their design becomes critical. Human Factors, as a research field, combines industrial psychology, ergonomics, cognitive psychology, and industrial engineering to produce goods and services that work well with the human body and senses. Proper design removes any ambiguity regarding what to do during an emergency. Also, good HF recognizes the problems involving boredom and fatigue affecting users and operators that may impede the detection of alarms or other system warnings. http://securityportal.com/topnews/human20000907.html Baltimore.ie: Baltimore Technologies Gains World First ITSEC E3 Certification for PKI-based e-Security - Baltimore Technologies announced that its certificate management system UniCERT v3.1.2 has become the first such system in the world to gain ITSEC E3 certification. ITSEC is a recognised global standard for the measurement of security products. http://www.baltimore.ie/news/press/pr20000905.html CNet: IE Security Bug Leaves Files Vulnerable - The bug is the latest in a long history of vulnerabilities involving the use of Web scripting languages to circumvent browsers' security restrictions. One of the most widely used of these scripting languages, which let Web sites execute one or more actions on visitors' computers, is JavaScript. http://news.cnet.com/news/0-1005-200-2710872.html?tag=st.ne.1430735..ni Telegraph.co.uk: Boot Camp Week 140: Windows Security - If you share your PC with others, you may want to protect your system settings. Rick Maybury introduces Windows Poledit, a powerful security facility. http://www.telegraph.co.uk/et?ac=003100565149417&rtmo=kN7JbCJp&atmo=99999999 &pg=/et/00/9/7/ecrcomp07.html CNet: IKEA Exposes Customer Information on Catalog Site - Home furnishings retailer IKEA closed its online catalog order site last night after a privacy breach made the personal information of tens of thousands of its customers available online. http://news.cnet.com/news/0-1007-200-2709867.html?tag=st.ne.1002.bgif.ni ZDTV.com: FBI Defends Carnivore Before Congress - The FBI vigorously defended its controversial "Carnivore" email spy tool Wednesday during Congressional hearings probing the balance between law enforcement needs and privacy rights. http://www.zdtv.com/zdtv/zdtvnews/politicsandlaw/story/0,3685,10194,00.html ComputerWorld: Wireless Insecurity - Pioneers in wireless e-commerce are finding that it's tough to ensure the security of wireless transactions. It can be done, they say - but first you have to overcome the lack of end-to-end encryption in today's wireless networks and the lack of authentication in wireless devices http://computerworld.com/cwi/story/0,1199,NAV47_STO49371,00.html Slashdot: GPG vs. PGP? - Slashdot poses an interesting debate, asking "what are the relative merits and drawbacks of using Gnu Privacy Guard vs. Network Associates' PGP?" http://slashdot.org/askslashdot/00/09/06/1653255.shtml Sep 6, 2000 CNet: Gaffe at Amazon leaves email addresses exposed - Update: Just days after Amazon.com tightened its privacy policy, a bug in one of its Web pages exposed numerous email addresses of the site's Affiliate members. Amazon spokesman Bill Curry acknowledged the flaw earlier today, and the company proceeded to fix the problem within several hours of being contacted by CNET News.com. http://news.cnet.com/news/0-1007-200-2711416.html?tag=st.ne.1002.thed.ni Cryptome.org: Software Backdoors, Courtesy of the NSA - The NSA engages in sabotage, much of it against American companies and products. One campaign apparently occurred at about the time when PGP's most serious vulnerability was added http://cryptome.org/nsa-sabotage.htm InfoWorld.com: IT Spending to Hit $2.6 Trillion - Global IT spending is expected to grow rapidly during the next five years from a projected $1.4 trillion this year to more than $2 trillion in 2003, according to the latest report from Strategic Planning Services (SPS)/Spectrum Economics, an economic consulting company in Palo Alto, Calif. By 2005, worldwide spending for IT products and services will reach $2.6 trillion. http://www.infoworld.com/articles/hn/xml/00/09/06/000906hnitspend.xml ZDTV.com: Dial E for Eavesdropping - Could cybersnoops be listening to you? Learn about the latest eavesdropping devices and find out how to protect yourself. http://www.zdtv.com/zdtv/cybercrime/privacy/story/0,9955,2123709,00.html RSASecurity: RSA Security Releases RSA Encryption Algorithm into Public Domain - RSA Security Inc. today announced it has released the RSA public key encryption algorithm into the public domain, allowing anyone to create products that incorporate their own implementation of the algorithm. This means that RSA Security has waived its rights to enforce the patent for any development activities that include the RSA algorithm occurring after September 6, 2000. http://www.rsasecurity.com/news/pr/000906-1.html Top 20 Virus Report - VBS.KakWorm has moved up the list as infections have become more prevalent. We wish to remind our readers that a patch exists to fix this security hole. Also, new variants of the VBS.LoveLetter Family and the W97M.Thursday Family have popped up more frequently this past week, worldwide. Troj.Pokey.A is not as pernicious as it first pretended to be. This one has been around for a month, is spreading slowly, and is easily detected. It attacks only through Outlook, and if you have installed the patch, it doesn't do any damage at all. http://securityportal.com/research/virus/virustop20.html ZDTV.com: Disappearing Email - Find out how to make an email disappear after you send it. From Call for Help http://www.zdtv.com/zdtv/callforhelp/answerstips/story/0,3650,9328,00.html AziaBizTech: Real hackers speak, reveal easy-to-target companies - A hacker can tell at just a single glance whether or not a company's computer network will be easy to break into -- that's the conclusion to be drawn from a face-to-face interview in which Nikkei Communications magazine brought together two real hackers familiar with the darker side of the Internet business. http://www.nikkeibp.asiabiztech.com/wcs/leaf?CID=onair/asabt/fw/111147 GNN Germany: Smart Card Watch for secure access control to Hongkong subway - IBM, Philips Semiconductors and Junghans produce Smart Card Watch for secure access control to Hongkong subway The new solar-powered JavaCard watch provides contactless access control with debit functionality. Hongkong subway company MTR have ordered 200000 watches (in German) http://www.gnn.de/0009/9625.html Edicom: A man is sentenced for having sold "recipes" to write viruses - For the first time in Switzerland, an IT expert has been fined (CHF 300) for selling a CD-Rom explaining how to program viruses (in French). http://www.edicom.ch/news/suisse/000904133823.mo.shtml NUA Internet Surveys: Australia's Department of Defense under attack - Top-secret computers at Australia's Department of Defense were attacked more than 20 times last year by hackers, according to recent reports. The trend of attacks will require defense to allocate more resources to protect their information systems, according to The Sunday Telegraph in Australia. http://www.nua.ie/surveys/?f=VS&art_id=905356020&rel=true Bernama: Singapore Search Engine Defaced - A Singapore Internet search engine was crippled by hackers who defaced the homepage with a picture of Adolf Hitler reviewing troops, a news report said Tuesday. http://www.bernama.com/bernama/world/wo0509_6.htm ZDNet: New virus hides behind old technology - A new virus from the Czech Republic has anti-virus software makers rushing to analyze the ability of so-called "files streams" to infect PCs. http://www.zdnet.com/zdnn/stories/news/0,4586,2624500,00.html VNUNet.com: Hacker insurance becomes a priority - Insurance firms are hoping for a boom in business as companies scramble to protect themselves against the rise in computer crime. http://www.vnunet.com/News/1110206 TechWeb.com: Coprocessors Move Security Onto PC Motherboards - Responding to industry demand for better built-in security, vendors of PC chips and smart-card ICs are racing to develop security coprocessors that mount on a PC motherboard. http://www.techweb.com/wire/story/TWB20000905S0019 InfoWorld.com: Government Invests in Security - NETWORK ASSOCIATES INC. (NAI) announced on Tuesday that it is receiving $11 million in contract funds to develop new technologies for information system security. http://www.infoworld.com/articles/hn/xml/00/09/05/000905hndarpa.xml Salon.com: Patriotic Hacker Attacks Guatemalan Site - The country's tax system took its internet web site out of service for several hours on Tuesday after an attack by hacker who claimed to be defending the country's honor. http://www.salon.com/tech/wire/2000/09/05/hacker/index.html Sep 5, 2000 China Online: China's Founder Develops New Net Security Product - China�s Founder Electronics Co. has developed a new method of Internet security and expects that it will become one of the world�s leading Internet security solutions. http://asia.internet.com/2000/9/0408-COL.html ZDNet: New DDoS attack targets chat, Linux machines - A new distributed denial of service tool has been discovered in the wild and is spreading, according to Internet Security Systems Inc.'s X-Force service. Reports of up to 400 hosts running the "Trinity v3" agent have been reported, including 50 compromised IRC (Internet Relay Chat) hosts... http://www.zdnet.com/eweek/stories/general/0,11011,2624180,00.html CNet: "Donald Duck" virus on the loose - There is a new virus propagating in the Philippines, but this time it is not as dangerous as the "Love" bug that plagued corporate computer systems earlier in the year. http://dailynews.yahoo.com/h/cn/20000905/tc/_donald_duck_virus_on_the_loose_ 1.html ZDNet: UK Government "tags" citizens - It has emerged that under the newly introduced RIP Act, police will be given powers to routinely monitor the movements of mobile phone users with a minimum of accountability. http://www.zdnet.com/zdnn/stories/news/0,4586,2623481,00.html ThisIsLondon: Hacking pays for Guardian iT - Hackers at Guardian iT's newest business claim they can break into 80% of all corporate websites within eight hours, writes Nick Goodway. http://www.thisislondon.co.uk/dynamic/news/business_story.html?in_review_id= 313445&in_review_text_id=257545 TheRegister: ABN Amro e-banking service hacked - An investigative programme for Dutch TV has exposed security flaws in national bank ABN Amro's e-banking service Home Net. Hackers managed to breach defences and divert payments into their own accounts. http://www.theregister.co.uk/content/1/13033.html ZDNet: PDA virus: More on the way - Maybe the Liberty Crack virus got too much hype. The PalmPilot Trojan horse, made public last week, was, after all, just a data-munching application disguised as a pirated game emulator that few, if anyone, downloaded. But while not widely distributed, Liberty Crack may be a sign of the future. Historically, malicious programs get more destructive as time goes on and computers gain popularity. And mobile computing is more popular than ever. http://www.zdnet.com/eweek/stories/general/0,11011,2623109,00.html Firewalls - Common Configuration Problems - There are many common configuration problems with firewalls, ranging in severity and scope. By far the most common problems relate to what should be blocked or allowed. This is often problematic because needs change; you may need to allow video-streaming, for example, and unless done properly, the addition of new firewall rules can seriously undermine the security provided by a firewall. http://securityportal.com/topnews/fw20000905.html ASP - Active Server Pages - While checking out URLs during a normal day of surfing the Web, you will note that a large number of pages end with �.asp.� The .asp stands for ASP (Active Server Pages). This scripting technology was developed by Microsoft to introduce dynamic qualities to otherwise static HTML pages. An ASP page is an HTML page that contains HTML code and possibly XML - Extensible Markup Language and COM - Component Object Model code. A typical ASP page will typically be an intermix of HTML/XML tags and VBScript. http://securityportal.com/topnews/asp20000905.html PC World: Feds to Net Criminals: You Can't Hide - Following arrest in Emulex hoax case, investigators tout their readiness to tackle Internet criminals http://www.pcworld.com/pcwtoday/article/0,1510,18331,00.html Civic.com: 12 states sign on for Medicare fraud prevention - A California-based information technology company was recently awarded a 5-year, $26.8 million contract to safeguard the Medicare program in several western states http://www.fcw.com/civic/articles/2000/0904/web-medcare-09-04-00.asp NAI: WNT/Stream Virus - This is a direct action virus which infects EXE files under Windows 2000. It replaces the original file with itself and stores the original file in a different stream of the same file. This virus is packed with the Petite executable compressor http://vil.nai.com/villib/dispvirus.asp?virus_k=98803 NTSecurity: Analyzing Security Fixes in Win2K Service Pack 1 - Microsoft recently released Windows 2000 Service Pack 1 (SP1), which fixes 17 security problems that that the company discovered since it released Win2k. To help you determine whether you need to install this latest service pack, let's take a look at Win2K�s history regarding security risks... http://www.ntsecurity.net/Articles/Index.cfm?ArticleID=15474 PCWorld: Norton AntiVirus Freezes Some PCs - Users of Norton AntiVirus 4.0 and later versions have reported a slew of problems with the product, including annoying computer freeze-ups. With these system hangs, pressing Ctrl-Alt-Delete produces the error message "Msgsrv32.exe (Not responding)." http://www.pcworld.com/heres_how/article/0,1400,17680+1+0,00.html Sep 4, 2000 KERNEL.ORG: Linux 2.2.17 - Linux 2.2.17 has been officially released. It is the same as 2.2.17pre20, just without the -pre20 suffix. There aren't any significant security updates associated with the new release, but there are some fixes for an IP Chains casting error and Keymap relaods now require root. http://www.linux.org.uk/VERSION/relnotes.2217.html Heise.de: Germany is giving signs but stands a long way from the E-Government - In Germany, the government is giving signals towards a major change of the administration. It should eventually become possible to order an identity card online, to submit a tax return form or to broadcast a civil wedding ceremony over the web. E-Government should bring the administration closer to the citizens. On August 16th, a draft law for electronic signatures was passed, it should become effective in 2001. [The original article is in German] http://www.heise.de/newsticker/data/chr-04.09.00-000/ NTRU claims faster, more flexible encryption - This interview is with Dan Lieman of NTRU, a company which recently made the news with a new public-key system that is considerably faster than any other previously known, and which has been reviewed by a number of independent experts who have not found any significant flaws in it. This makes the system of considerable interest, considering that other proposed rapid methods of public-key cryptography were found not to be secure after scrutiny. http://securityportal.com/cover/coverstory20000904.html SeattleTimes: When feeling secure is more important than progress - The stand-alone PC may not offer any time, anywhere computing. But it is an island of security when kept to itself. No greater a reason is needed to forecast its healthy future, even as its progenitors look to the New Way of the Internet. http://seattletimes.nwsource.com/news/business/html98/paul03_20000903.html ZDNet: New Philippines virus a low risk - The U.S. National Infrastructure Protection Center has issued a warning about a new computer computer virus originating from the Philippines which bears a resemblance to the now-infamous 'Love' bug. The virus was first detected on Friday, and has been infecting some computer users this Labor Day weekend. But anti-virus experts told MSNBC that there have not been any reports of widespread infections. http://www.zdnet.com/zdnn/stories/news/0,4586,2623456,00.html Net-Security: ICMP Usage in Scanning version 2.0 - The Internet Control Message Protocol is one of the debate full protocols in the TCP/IP protocol suite regarding its security hazards. This is a paper by Ofir Arkin where he has tried to outline what can be done with the ICMP protocol regarding scanning http://www.net-security.org/various/bookstore/ICMP_Scanning_v2.0.pdf ******* What's New With SecurityPortal ******* Why sulogin is Useless on Its Own OK, my article last week (Debian 2.2) wasn't really meant to bash Debian. It was more to point out that even when you plug security holes, you can still leave yourself wide open. And in some cases, what you think might plug a security hole is essentially useless and doesn't make a difference. Security is a procedure, not a solution or product. Even if you plug all the holes to the best of your ability today, new ones will pop up next week. This article is a micro case study in why computer security is complex and should be treated as a system and not an individual problem(s). I will be using the Linux boot process and sulogin as my examples. Read the full story at: http://securityportal.com/closet/closet20000906.html ******* New at SecurityPR.com, a Vendor Press Release Site ******** New Website �Lock� Hits Back At Hackers - The hacker who replaced the word �Intelligence� with the word �Stupidity� in the CIA�s website Home Page proves that even the most secure of websites can be altered. That was until today WebSiteLock is the world�s first software to provide byte-by-byte protection of a company�s website - it �locks� and protects the contents of the site. http://securityportal.com/pr/pr.20000905083915.html E-Secure-IT Global IT Security Vulnerability Early Warning Service - E-Secure-IT is a Secure Web Service with a Security Vulnerability Database and Alerting System. E-Secure-it operates from New Zealand, 12 hours ahead of GMT. It alerts registered corporates on newly discovered security vulnerabilities and exploits. Organisations can subscribe, as to only receive new vulnerability alerts that are of relevance to their organisation/environment. Once subscribed, they can flag those folders that contain vulnerabilities that are of relevance to them. As an example, an organisation can flag the folders Windows NT, IIS, Windows 2000, SQL-Server, Sun-Solaris, Oracle, Cisco Routers and Siemens PABX. They will then receive automatic alerts on those vulnerabilities only. E-Secure-IT has been designed to use different Alerting media, including Email, SMS, WAP and Pager. http://securityportal.com/pr/pr.20000908024604.html Live IPSEC VPN Interoperability Demonstration at Auto-Tech 2000 in Radguard Booth - Industry expert designs multi-vendor lab to demonstrate VPN interoperability http://securityportal.com/pr/pr.20000905090634.html Enter your own Press Releases directly at SecurityPR.com. http://securitypr.com ******************************************* You may leave the list at any time by sending an email to [EMAIL PROTECTED] with the text "SIGNOFF SECURITYPORTAL-L" in the body of the email. We will miss you! Tell us how we're doing. Send any other questions or comments to [EMAIL PROTECTED] Tony Chapman SecurityPortal -- The Focal Point for Security on the Net [EMAIL PROTECTED] -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
