CRIME FW: [Cyber_threats] Daily News 09/26/02

From: George Heuston (GeorgeH@private)
Date: Fri Sep 27 2002 - 16:57:03 PDT

  • Next message: Seth Arnold: "Re: Identity Theft (was: CRIME Computers vulnerable at Oregon department)"

    -----Original Message-----
    From: NIPC Watch [mailto:nipcwatch@private] 
    Sent: Friday, September 27, 2002 7:01 AM
    To: Cyber Threats
    Subject: [Cyber_threats] Daily News 09/26/02
    
    September 25, Federal Computer Week
    Sharing called key to cyber plan. The sharing information and responsibility
    is key to the success of the public/private partnership envisioned in the
    Bush administration's draft National Strategy to Secure Cyber Space, experts
    said Sept. 24. Security experts came together at a forum sponsored by the
    Cato Institute to share their views on how government and industry should
    share responsibility for securing the Internet, information technology
    products, and networks across the country and around the world. There is
    widespread agreement that government cannot be solely responsible for the
    cybersecurity of the critical infrastructure, such as the telecommunications
    and banking sectors. But, said Scott Charney, chief security strategist at
    Microsoft Corp., the question remains: How can government encourage
    companies to meet their responsibility to secure what they own and operate?
    Source: http://www.fcw.com/fcw/articles/2002/0923/web-cato-09-25-02.asp
    
    September 24, VNUNET
    Third slapper worm hits the street (Slapper C). Hackers eye virus as base
    for development. Barely 24 hours after the Slapper B worm started to show up
    on antivirus monitoring stations, a new variant has cropped up. According to
    security specialist ISS, Slapper C has infected 1,500 servers already and is
    spreading, although a source point has not been identified at this time. The
    company warned that the source code for Slapper has spread quickly among the
    underground community, and will be the development platform of choice for
    future attacks. Slapper and its variants exploit a vulnerability in the
    Secure Sockets Layer 2.0 of Apache web servers using distributions from Red
    Hat, Mandrake, SuSE, Gentoo and Slackware. Source:
    http://www.pcw.co.uk/News/1135304
    
    September 24, The Australian
    Cybercrime code ready. Internet service providers are preparing for a new
    cybercrime code of conduct that will detail how much data they should keep
    on subscribers in order to co-operate with police and other law enforcement
    agencies. The Internet Industry Association (IIA) is about to release the
    draft of its Cybercrime code of conduct, chairman Justin Milne said. The
    draft code is the result of more than a year of collaboration between the
    internet industry and representatives from police and crime authorities. It
    represents an apparently successful attempt by the internet industry to
    avoid specific new laws being introduced to specify compliance with
    authorities. Source:
    http://www.news.com.au/common/story_page/0,4057,5153729%255E15306,00.html
    
    
    
    _______________________________________________
    Cyber_Threats mailing list
    Cyber_Threats@listserv
    http://listserv.infragard.org/mailman/listinfo/cyber_threats
    



    This archive was generated by hypermail 2b30 : Fri Sep 27 2002 - 17:39:25 PDT