CRIME FW: [Information_technology] Daily News 7/29/03

From: George Heuston (GeorgeH@private)
Date: Tue Jul 29 2003 - 14:55:12 PDT

  • Next message: Steven Nichols: "CRIME Hi all"

    -----Original Message-----
    From: InfraGard [mailto:infragard@private] 
    Sent: Tuesday, July 29, 2003 8:03 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 7/29/03
    
    July 28, National Journal
    Cybersecurity research essential to combat computer crime. Research and
    development into cybersecurity is essential to combat computer crime,
    said
    Andrew Macpherson of Dartmouth University's Institute for Security
    Technology Studies Monday, July 28. "There's not really any law on the
    books
    that tells companies to turn over [information about cyberattacks],
    except
    in California," said Trent Teyema, a supervisory special agent with the
    FBI's squad for criminal computer intrusions. But failing to address
    vulnerabilities can open networks to terrorism, Macpherson said.
    "Terrorists
    are well aware of our prosecutorial thresholds," he said. "They do minor
    frauds but [do] many of them." Source:
    http://www.govexec.com/dailyfed/0703/072803td2.htm
    
    July 27, Washington Post
    Safeguarding wireless networks too much trouble for many users. Experts
    say
    that wireless fidelity, or WiFi, vulnerability is now one of the most
    serious threats to computer security. Someone with a WiFi-enabled laptop
    could walk through an airport and launch a destructive computer virus at
    every unprotected laptop in the vicinity, because users who tap into a
    vulnerable network are just as exposed as its host. WiFi equipment comes
    with an encryption system, Wired Equivalent Privacy (WEP), but entering
    the
    required encryption codes can be confusing and can lead to connected
    systems
    not functioning properly with each other. Several companies and
    code-writing
    organizations are working on new encryption technology, but experts
    worry
    that it may take a while for improvements to cycle through product
    lines,
    and for consumers to upgrade their equipment. Source:
    http://www.washingtonpost.com/wp-dyn/articles/A51284-2003Jul26.html
    
    
    Internet Security Systems - AlertCon: 2 out of 4
    https://gtoc.iss.net/
    Last Changed 29 July 2003
    
    Security Focus ThreatCon: 2 out of 4
    www.securityfocus.com
    Last Changed 22 July 2003
    
    Current Virus and Port Attacks
    Virus: #1 Virus in USA: WORM_LOVGATE.G
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports: 80 (www), 445 (microsoft-ds), 137 (netbios-ns),
    1434
    (ms-sql-m), 139 (netbios-ssn), 4662 (eDonkey2000), 113 (ident), 0 (---),
    53
    (domain), 25 (smtp)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    



    This archive was generated by hypermail 2b30 : Tue Jul 29 2003 - 15:19:37 PDT