CRIME FW: [Information_technology] Daily News 4/30/03

From: George Heuston (GeorgeH@private)
Date: Wed Apr 30 2003 - 14:00:27 PDT


-----Original Message-----
From: NIPC Watch [mailto:nipc.watch@private] 
Sent: Wednesday, April 30, 2003 7:30 AM
To: Information Technology
Subject: [Information_technology] Daily News 4/30/03

April 29, Wired
Licensed to war drive in New Hampshire. New Hampshire could become the
first
in the United States to provide legal protection for people who tap into
insecure wireless networks. House Bill 495 defines an operator's failure
to
secure a wireless network as a form of negligence. According to the
proposed
amendment, "the owner of a wireless computer network shall be
responsible
for securing such computer network." What's more, if an alleged intruder
can
prove he gained access to an insecure wireless network believing it was
intended to be open, the defendant may be able to get off the hook using
an
"affirmative defense" provision of the existing law. As a result, some
legal
experts contend that New Hampshire's proposed amendment to its computer
laws
could make it harder to throw the book at criminals who take advantage
of
insecure wireless systems. Source:
http://www.wired.com/news/wireless/0,1382,58651,00.html

April 28, The Korea Herald
Korea's MIC takes measures to prevent online attacks. The massive
Internet
shutdown caused by the SQL Slammer computer virus on January25 caused
chaos
for Korea's 10 million high-speed Internet users. Now, Korea's Ministry
of
Information and Communication (MIC) has announced that it will take an
active role in promoting security countermeasures aimed at creating fast
and
accurate communication routes where fixing and preventing network
attacks
will take only a matter of minutes. The MIC plans to create an
information
security base, develop information security related technology and
standardization, and train manpower in the sector. It will build a
support
center dealing with attacks and security breaches on the Internet that
will
run 24 hours per day. MIC is also working on introducing rights to
request
information and investigate the scene of the crime. Other preventative
measures involve working and communicating with multiple online
businesses
and service providers to make sure that each complies with standards in
prevention. Source:
http://www.koreaherald.co.kr/SITE/data/html_dir/2003/04/28/200304280007.
asp

April 27, The Associated Press
Spread of buggy software raises questions. Last year, a study
commissioned
by the National Institute of Standards and Technology found that
software
errors cost the U.S. economy about $59.5 billion annually. Developers
say
defects stem from several sources: software complexity, commercial
pressure
to bring products out quickly, the industry's lack of liability for
defects,
and poor work methods. Programmers typically spend half their time
writing
code and the other half looking for errors and fixing them. That
approach
may have worked in the infancy of computers, when programs were small,
says
Watts Humphrey, of Carnegie Mellon University's Software Engineering
Institute. Now, most programs in testing have five to 10 defects per
1,000
lines of code, or up to 10,000 bugs in a million-line program. It would
take
50 people a year to find all those bugs, Humphrey says. Source:
http://www.washingtonpost.com/wp-dyn/articles/A45781-2003Apr27.html


Internet Security Systems - AlertCon: 1 out of 4
https://gtoc.iss.net/
Last Changed 8 April 2003

Security Focus - ThreatCon: 1 out of 4
www.securityfocus.com
Last Changed 18 April 2003

Current Virus and Port Attacks
Virus: #1 Virus in USA: WORM_LOVGATE.F
Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
United States]

Top 10 Target Ports: 137 (netbios-ns), 80 (www), 1434 (ms-sql-m), 25
(smtp),
445 (microsoft-ds), 4662 (eDonkey2000), 113 (ident), 139 (netbios-ssn),
11310 (---), 41170 (---)
Source: http://isc.incidents.org/top10.html; Internet Storm Center

_______________________________________________
Information_technology mailing list
Information_technology@listserv



This archive was generated by hypermail 2b30 : Wed Apr 30 2003 - 14:53:55 PDT