Security Storm
Thursday, October 3, 2002

Satire Site Shut Down by Police Lives Again
The Register   - September 30, 2002
Maryland Law Targets Spammers
September 30, 2002
Federal No-Fly Blacklist Snares Peace Protesters
September 27, 2002
Link to FARC may Violate the Patriot Act
September 27, 2002
Shredding the Paper Tiger of Cyberterrorism
September 27, 2002
Software Engineer Rigged Bingo and Killed Himself
September 27, 2002
China Accused of Dalai Lama Hacking Plot
September 26, 2002

SecurityFocus Online

Razor BindView

PacketStorm Security

Computer Security Now

RedHat Security

Help Net Security

Microsoft Security

Security Tracker








Center for Internet Sec

Neohapsis Archive

Netscape Security Center

Internet Security Alliance

X-Force (ISS)

NT Security Toolbox





'T0rn' Arrest Alarms White Hats, Advocates
A raid on the alleged author of a well-known hacker toolkit is raising eyebrows among electronic civil libertarians....
Read more

Slapper worm spanks Apache servers
A virulent Linux worm is creating an attack network on the Internet, security clearing house CERT warned this weekend...
Read more


America's National Cybersecurity Strategy: Same Stuff, Different Administration (InfoWarrior) - 10.01.2002
Today the White House releases its long-awaited "National Strategy To Secure Cyberspace." This high-level blueprint document (black/white or color), in-development for over a year by Richard Clarke's Cybersecurity team, is the latest US government plan to address the many issues associated with the Information Age.

Porn dialers and Trojans: the new face of malicious code (The Register) - 10.01.2002
The profile of malicious code on the Internet is changing with porn dialers and Trojan horses becoming more serious problems. A study on the malicious code blocked last year by managed services firm MessageLabs finds the spread of Trojan horses is becoming more organized.

Mobile phone Java risks 'minimal' (The Register) - 10.01.2002
Is wireless Java at risk from malicious code attack? The answer appears to be no - for vanilla Java 2 Micro Edition (Java 2 ME). But vendors' proprietary extensions are more problematic, according to Markus Schmall, of T-Mobile. He recently conducted a study of the security of Java 2 ME, using tests on a Siemens SL45 phone.

Secret Service agents probe wireless networks in Washington (SecurityFocus) - 09.29.2002
Secret Service agents are putting a high-tech twist on the idea of a cop walking the beat. Using a laptop computer and an antenna fashioned from a Pringles potato chip can, they are looking for security holes in wireless networks in the nation's capital.

New Net project aims to avoid hacking (CNN) - 09.29.2002
Scientists concerned about the vulnerability of the Internet to failure or hacking envision a next-generation system that would use the collective power of users' computers to become more secure. Researchers exploring that vision at five major U.S. universities got a $12-million grant from the National Science Foundation (NSF) this week, as part of a program that doled out $144 million to advance computer science.

Hacker groups declare war on (The Register) - 09.27.2002
A record number of malicious hacking attempts were made this month, and anti-American groups are responsible. So says Mi2g, the London-based security consultancy, which notes that US government on-line computers belonging to the House of Representatives, Department of Agriculture, Department of Education, National Park Service, NASA and the US Geological Survey were attacked in September.

FrontPage flaw places servers in jeopardy (CNET) - 09.26.2002
Microsoft warned Web site administrators on Wednesday that a flaw in its FrontPage extensions could allow an attacker to take control of their servers or cause the computers to seize up.

Sprint Cleared of Negligence in Vice Hacks

By Kevin Poulsen, Sep 12 2002 8:05PM

The Nevada Public Utilities Commission pulled the plug Thursday on a Las Vegas adult entertainment operator's claim that telephone calls meant for his stable of private dancers are being blocked by hackers with access to local phone company Sprint of Nevada's systems, closing an eight-year-old legal battle that pitted the vanquished brokers of Sin City's competitive sex trade against the corporate legal muscle of a telecom giant.
Read more

Send Congress Back to School

By Tim Mullen Aug 19, 2002

So this aide walks into the office of Jack Valenti, President and CEO of the Motion Picture Association of America... "Sorry for the interruption, Mr. Valenti" she says, "but it's about the Berman Bill. What should we do about it?"

Valenti smiles and says, "Pay it."

Coverage of the "Hack Bill" has been so prominent that the subject itself is almost hackneyed.

Fortunately, every intelligent human being with an ounce of technical perception has denounced the bill for the utter folly that it is. Unfortunately, most of those inhabiting a seat on Capitol Hill will have to push away a pound of obscurity before they can begin to address the issue.

That's the part that scares me.

Momentarily deferring elaboration, let me say that I am aware that many are speciously equating the Berman Bill with my "hack-back" technology. It is a tangential argument at best. I call for the use of neutralizing processes by qualified personnel in response to definitively identified worm attacks, leaving offending systems fully operational.

Read more

Copyright 1998-2002 Security StormSM. Security Storm is a service of SLP, Ltd.