|


America's National Cybersecurity Strategy: Same Stuff,
Different Administration (InfoWarrior) - 10.01.2002
Today the White House releases its long-awaited "National
Strategy To Secure Cyberspace." This high-level blueprint
document (black/white
or
color), in-development for over a year by Richard Clarke's
Cybersecurity team, is the latest US government plan to
address the many issues associated with the Information Age.
Porn dialers and Trojans: the new face of malicious code
(The Register) - 10.01.2002
The profile of malicious code on the Internet is changing with
porn dialers and Trojan horses becoming more serious problems.
A study on the malicious code blocked last year by managed
services firm MessageLabs finds the spread of Trojan horses is
becoming more organized.
Mobile phone Java risks 'minimal' (The Register) -
10.01.2002
Is wireless Java at risk from malicious code attack? The
answer appears to be no - for vanilla Java 2 Micro Edition
(Java 2 ME). But vendors' proprietary extensions are more
problematic, according to Markus Schmall, of T-Mobile. He
recently conducted a study of the security of Java 2 ME, using
tests on a Siemens SL45 phone.
Secret
Service agents probe wireless networks in Washington
(SecurityFocus) - 09.29.2002
Secret Service agents are putting a high-tech twist on the
idea of a cop walking the beat. Using a laptop computer and an
antenna fashioned from a Pringles potato chip can, they are
looking for security holes in wireless networks in the
nation's capital.
New Net project aims to avoid hacking (CNN) - 09.29.2002
Scientists concerned about the vulnerability of the Internet
to failure or hacking envision a next-generation system that
would use the collective power of users' computers to become
more secure. Researchers exploring that vision at five major
U.S. universities got a $12-million grant from the National
Science Foundation (NSF) this week, as part of a program that
doled out $144 million to advance computer science.
Hacker groups declare war on US.gov (The Register) -
09.27.2002
A record number of malicious hacking attempts were made this
month, and anti-American groups are responsible. So says Mi2g,
the London-based security consultancy, which notes that US
government on-line computers belonging to the House of
Representatives, Department of Agriculture, Department of
Education, National Park Service, NASA and the US Geological
Survey were attacked in September.
FrontPage
flaw places servers in jeopardy (CNET) - 09.26.2002
Microsoft warned Web site administrators on Wednesday that a
flaw in its FrontPage extensions could allow an attacker to
take control of their servers or cause the computers to seize
up.

Sprint Cleared of Negligence in
Vice Hacks
By
Kevin Poulsen, Sep 12
2002 8:05PM
The Nevada Public Utilities
Commission pulled the plug Thursday on a Las Vegas adult
entertainment operator's claim that telephone calls meant for
his stable of private dancers are being blocked by hackers
with access to local phone company Sprint of Nevada's systems,
closing an eight-year-old legal battle that pitted the
vanquished brokers of Sin City's competitive sex trade against
the corporate legal muscle of a telecom giant.
Read more

Send Congress Back to School
By
Tim
Mullen Aug 19, 2002
So this aide walks into the office of
Jack Valenti, President and CEO of the Motion Picture
Association of America... "Sorry for the interruption, Mr.
Valenti" she says, "but it's about the Berman Bill. What
should we do about it?"
Valenti smiles and says, "Pay it."
Coverage of the "Hack Bill" has been so prominent that the
subject itself is almost hackneyed.
Fortunately, every intelligent human being with an ounce of
technical perception has denounced the bill for the utter
folly that it is. Unfortunately, most of those inhabiting a
seat on Capitol Hill will have to push away a pound of
obscurity before they can begin to address the issue.
That's the part that scares me.
Momentarily deferring elaboration, let me say that I am aware
that many are speciously equating the Berman Bill with my
"hack-back"
technology. It is a tangential argument at best. I call
for the use of neutralizing processes by qualified personnel
in response to definitively identified worm attacks, leaving
offending systems fully operational.
Read more
|