-----Original Message----- From: InfraGard [mailto:infragard@private] Sent: Monday, June 30, 2003 7:23 AM To: Information Technology Subject: [Information_technology] Daily News 6/30/03 June 26, National Journal Ridge: Centralized tech spending key to homeland security. Homeland Security Secretary Tom Ridge said Thursday that his agency will centrally control all information technology spending in its fiscal 2005 budget in order to guarantee that new computer systems deliver the right intelligence to the right people in a timely manner. The new department plans to spend $829 million on upgrades to information analysis and computer security in 2004. Ridge told a group of about 300 IT contractors in Alexandria, Virginia, that information compatibility is crucial in the fight against terrorism. He said Homeland Security is developing an IT roadmap to create a centralized data system accessible by federal, state and local law enforcement agencies. The plan will be complete in the fall, he said, and it will follow these five principles: All levels of government must be treated as one; information must be captured once at the source; all information must be accurate; systems will be secure and constantly updated; and civil liberties will be respected. Source: http://www.govexec.com/dailyfed/0603/062603td2.htm June 26, Pasadena Star News Cyber-thief nets 65,000 county Web addresses. An Internet hijacker stole 65,000 Web site addresses belonging to Los Angeles County between April 3 and May 1. The addresses were then sold and used to send pornographic material and junk e-mail, and to try to hack into other computers. No harm was done to the county during the scam. It apparently only took a phone call and follow-up e-mail to the American Registry of Internet Numbers for the hijacker to change ownership of the county's Web addresses into another name, according to the county's Chief Information Officer Jon Fullinwider. The registry, according to county officials, put the addresses into the name of Atriva, which turned out to be a bogus company. An investigation is continuing to find the hijacker. Source: http://www.pasadenastarnews.com/Stories/0,1413,206~22097~1479783,00.html June 25, SecurityFocus AT&T lets phone fraud victims off the hook. AT&T said Wednesday that it would forgive all of the outstanding long distance charges that the company had been trying to collect from victims of the so-called "Yes-Yes" voicemail subversion fraud. Last year fraudsters began cracking weak and default PINs on individual and small business voice mail boxes provided by local phone companies, then changing the outgoing messages to say "yes, yes, yes" over and over again. The newly-agreeable voice mail could then be used for third-party billings. The scam left scores of victims holding liable for thousands of dollars of long distance calls they never made-typically between $8,000 and $12,000. AT&T insisted that the victims pay up, arguing that it was the consumer's poor voice mail security that was at fault. When pressed, the company sometimes offered to absorb 35% of a fraudulent billing. The company announced Wednesday that it's will abandon those collection, but the amnesty offer only applies to past victims of this particular type of fraud. Source: http://securityfocus.com/news/6158 Internet Security Systems - AlertCon: 1 out of 4 https://gtoc.iss.net/ Last Changed 10 June 2003 Security Focus ThreatCon: 1 out of 4 www.securityfocus.com Last Changed 11 June 2003 Current Virus and Port Attacks Virus: #1 Virus in USA: WORM_LOVGATE.F Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 137 (netbios-ns), 80 (www), 445 (microsoft-ds), 1434 (ms-sql-m), 113 (ident), 0 (---), 139 (netbios-ssn), 41170 (---), 4662 (eDonkey2000), 4665 (eDonkey2000) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Mon Jun 30 2003 - 13:09:30 PDT