-----Original Message----- From: InfraGard [mailto:infragard@private] Sent: Wednesday, July 30, 2003 7:46 AM To: Information Technology Subject: [Information_technology] Daily News 7/30/03 July 29, InformationWeek New Jersey teams with the Army on intrusion detection. The Army will help New Jersey analyze the state's network as a step in developing an intrusion-detection system. The agreement with the U.S. Army Communications-Electronics Command Research, Development, and Engineering Center based at Fort Monmouth, NJ, is the first such collaboration between the center and a state. Charles Dawson, New Jersey's chief technology officer, says a comprehensive intrusion-detection program is a key component in the state's homeland security plans to protect its IT infrastructure from cyberterrorism. The technical components of the program include host-based intrusion-detection systems, network-based intrusion-detection systems, and security information-management systems. The state also will receive guidance in developing policies and procedures to effectively manage the program. Source: http://www.informationweek.com/story/showArticle.jhtml?articleID=1280340 0 July 29, IDG News Service Countries need to pass wide-ranging laws, cooperate openly. Countries that want to be able to tackle cybercrime need to pass wide-ranging laws and be prepared to openly cooperate with other countries, delegates of the APEC (Asia-Pacific Economic Cooperation) group said Monday, July 28. The statement came at the end of a conference organized by the APEC e-Security Task Group in Bangkok, Thailand, last week which sought ways to develop comprehensive legal frameworks to combat cybercrime and to build law enforcement units capable of investigating cybercrime. Delegates agreed that all APEC economies need to develop legal frameworks which include: laws that criminalize conduct such as unauthorized access to computer systems and causing damage to computer systems; laws allowing law enforcement authorities to collect electronic evidence; and laws and policies that allow economies to cooperate with each other in investigating and prosecuting cybercrime. APEC brings together 21 economies that border the Asia-Pacific region, including the United States. Source: http://www.infoworld.com/article/03/07/29/HNcombatcrime_1.html July 28, CNET News Cisco releases fix for Aironet flaw. Cisco Systems has released patches for a pair of security flaws that were discovered in its Aironet 1100 series wireless access points. One flaw would have allowed an attacker to use a "classical brute force" technique to discover account names, according to security troubleshooter Vigilante. Vigilante said the second flaw could freeze the access point and bring down the wireless access zone. Cisco posted advisories on the flaws Monday, July 28. "To date, Cisco is not aware of any active exploitations of the vulnerability," a Cisco representative said in a statement. The Cisco Aironet 1100 Wi-Fi access point creates a 300-foot radius zone where laptops can wirelessly connect to the Web or a corporate computer network. Additional information is available on the Vigilante Website: http://www.vigilante.com/inetsecurity/advisories/VIGILANTE-2003002.htm Source: http://news.com.com/2100-1039-5056416.html?part=dht&tag=ntop July 28, CNET News World nearing Web address crunch. Global momentum is growing for a new address system, known as Internet Protocol version 6 (IPv6) which promises to vastly expand the pool of unique numbers available for connecting PCs and other devices to the Net. Established five years ago, IPv6 creates enough IP addresses for every person on Earth to have 1,000 Web-enabled devices by quadrupling the size of the IP address. The standard is seen as a necessary successor to the current IPv4 system, which some fear could run short of addresses in Asia and Europe within the next few years. The U.S. may not see a shortfall because it was granted an enormous number of addresses in the original worldwide allotment. Shifting to the new standard means making changes to every Internet-connected device, router and switch on the network. And since fear of an address shortage is the single biggest argument in favor of a switch, the U.S. could stay on the sidelines as the rest of the world wrestles with the upgrade over the coming years, networking experts said. Source: http://www.msnbc.com/news/945119.asp Internet Security Systems - AlertCon: 2 out of 4 https://gtoc.iss.net/ Last Changed 29 July 2003 Security Focus ThreatCon: 2 out of 4 www.securityfocus.com Last Changed 22 July 2003 Current Virus and Port Attacks Virus: #1 Virus in USA: WORM_KLEZ.H Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 137 (netbios-ns), 80 (www), 445 (microsoft-ds), 1434 (ms-sql-m), 139 (netbios-ssn), 4662 (eDonkey2000), 113 (ident), 0 (---), 19479 (---), 25 (smtp) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Wed Jul 30 2003 - 08:50:48 PDT