-----Original Message----- From: InfraGard [mailto:infragard@private] Sent: Wednesday, July 16, 2003 8:05 AM To: Information Technology Subject: [Information_technology] Daily News 7/16/03 July 14, Arab Times Hacker destroys ten Internet sites. A Sudanese hacker claimed to have destroyed the Internet websites of 10 major corporations, one of which is the Sudanese Airlines, Al-Sahafa newspaper said Sunday. The hacker sent an e-mail to Sudanese Airlines saying that by hacking the company webpage he is taking revenge for the families of victims of the plane crash that took place last Tuesday killing 115 passengers. The hacker claimed to have destroyed the websites of Khartoum University, Aptec Computers and the Sudanese Internet Company. He said he is working on the destruction of more websites. Source: http://www.ds-osac.org/view.cfm?key=7E445D42465D&type=2B170C1E0A3A0F1628 20 July 14, Reuters Program hijacks PCs to send porn ads. Close to 2,000 Windows-based PCs with high-speed Internet connections have been hijacked by a stealth program and are being used to send ads for pornography, computer security experts warned. It is unknown exactly how the trojan (dubbed "Migmaf" for "migrant Mafia") is spreading to victim computers around the world, whose owners most likely have no idea what is happening, said Richard M. Smith, a security consultant in Boston. The trojan turns the victim computer into a proxy server which serves as a middle man between people clicking on porn e-mail spam or Web site links, according to Smith. The victim computer acts as a "front" to the porn Web site, enabling the porn Web servers to hide their location, Smith said. Broadband Internet users should always use firewalls to block such stealth activity, he said. Computers with updated anti-virus software will also be protected, said Lisa Smith of network security company Network Associate's. Source: http://www.cnn.com/2003/TECH/internet/07/14/porn.backdoor.reut/index.htm l July 11, CNET News.com Survey sees tech divide on data disasters. According to a survey released Monday, only 14 percent of senior business executives felt their important data is very vulnerable to being lost in the event of a disaster, compared to 52 percent of senior IT executives. U.S. business and tech leaders also differ on how long it would take to resume normal business operations if a disaster struck, according to the survey. Only nine percent of business executives say they would need three days or more to resume, compared to 23 percent of technology executives. The survey was conducted by RoperASW, a marketing research and consulting firm, and sponsored by data storage company EMC. It polled 274 executives at major U.S. corporations and other large organizations. Source: http://news.com.com/2100-1009_3-1025121.html?tag=fd_topCNETNews.com Internet Security Systems - AlertCon: 1 out of 4 https://gtoc.iss.net/ Last Changed 10 June 2003 Security Focus ThreatCon: 1 out of 4 www.securityfocus.com Last Changed 11 June 2003 Virus: #1 Virus in USA: WORM_LOVGATE.F Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 80 (www), 137 (netbios-ns), 445 (microsoft-ds), 1434 (ms-sql-m), 113 (ident), 139 (netbios-ssn), 4662 (eDonkey2000), 0 (---), 25 (smtp), 53 (domain) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Wed Jul 16 2003 - 10:39:10 PDT