CRIME FW: [Information_technology] Daily News 7/30/03

From: George Heuston (GeorgeH@private)
Date: Wed Jul 30 2003 - 08:35:01 PDT

  • Next message: Robert Johnston: "CRIME GNU Help IV"

    -----Original Message-----
    From: InfraGard [mailto:infragard@private] 
    Sent: Wednesday, July 30, 2003 7:46 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 7/30/03
    
    July 29, InformationWeek
    New Jersey teams with the Army on intrusion detection. The Army will
    help
    New Jersey analyze the state's network as a step in developing an
    intrusion-detection system. The agreement with the U.S. Army
    Communications-Electronics Command Research, Development, and
    Engineering
    Center based at Fort Monmouth, NJ, is the first such collaboration
    between
    the center and a state. Charles Dawson, New Jersey's chief technology
    officer, says a comprehensive intrusion-detection program is a key
    component
    in the state's homeland security plans to protect its IT infrastructure
    from
    cyberterrorism. The technical components of the program include
    host-based
    intrusion-detection systems, network-based intrusion-detection systems,
    and
    security information-management systems. The state also will receive
    guidance in developing policies and procedures to effectively manage the
    program. Source:
    http://www.informationweek.com/story/showArticle.jhtml?articleID=1280340
    0
    
    July 29, IDG News Service
    Countries need to pass wide-ranging laws, cooperate openly. Countries
    that
    want to be able to tackle cybercrime need to pass wide-ranging laws and
    be
    prepared to openly cooperate with other countries, delegates of the APEC
    (Asia-Pacific Economic Cooperation) group said Monday, July 28. The
    statement came at the end of a conference organized by the APEC
    e-Security
    Task Group in Bangkok, Thailand, last week which sought ways to develop
    comprehensive legal frameworks to combat cybercrime and to build law
    enforcement units capable of investigating cybercrime. Delegates agreed
    that
    all APEC economies need to develop legal frameworks which include: laws
    that
    criminalize conduct such as unauthorized access to computer systems and
    causing damage to computer systems; laws allowing law enforcement
    authorities to collect electronic evidence; and laws and policies that
    allow
    economies to cooperate with each other in investigating and prosecuting
    cybercrime. APEC brings together 21 economies that border the
    Asia-Pacific
    region, including the United States. Source:
    http://www.infoworld.com/article/03/07/29/HNcombatcrime_1.html
    
    July 28, CNET News
    Cisco releases fix for Aironet flaw. Cisco Systems has released patches
    for
    a pair of security flaws that were discovered in its Aironet 1100 series
    wireless access points. One flaw would have allowed an attacker to use a
    "classical brute force" technique to discover account names, according
    to
    security troubleshooter Vigilante. Vigilante said the second flaw could
    freeze the access point and bring down the wireless access zone. Cisco
    posted advisories on the flaws Monday, July 28. "To date, Cisco is not
    aware
    of any active exploitations of the vulnerability," a Cisco
    representative
    said in a statement. The Cisco Aironet 1100 Wi-Fi access point creates a
    300-foot radius zone where laptops can wirelessly connect to the Web or
    a
    corporate computer network. Additional information is available on the
    Vigilante Website:
    http://www.vigilante.com/inetsecurity/advisories/VIGILANTE-2003002.htm
    Source: http://news.com.com/2100-1039-5056416.html?part=dht&tag=ntop
    
    July 28, CNET News
    World nearing Web address crunch. Global momentum is growing for a new
    address system, known as Internet Protocol version 6 (IPv6) which
    promises
    to vastly expand the pool of unique numbers available for connecting PCs
    and
    other devices to the Net. Established five years ago, IPv6 creates
    enough IP
    addresses for every person on Earth to have 1,000 Web-enabled devices by
    quadrupling the size of the IP address. The standard is seen as a
    necessary
    successor to the current IPv4 system, which some fear could run short of
    addresses in Asia and Europe within the next few years. The U.S. may not
    see
    a shortfall because it was granted an enormous number of addresses in
    the
    original worldwide allotment. Shifting to the new standard means making
    changes to every Internet-connected device, router and switch on the
    network. And since fear of an address shortage is the single biggest
    argument in favor of a switch, the U.S. could stay on the sidelines as
    the
    rest of the world wrestles with the upgrade over the coming years,
    networking experts said. Source: http://www.msnbc.com/news/945119.asp
    
    
    Internet Security Systems - AlertCon: 2 out of 4
    https://gtoc.iss.net/
    Last Changed 29 July 2003
    
    Security Focus ThreatCon: 2 out of 4
    www.securityfocus.com
    Last Changed 22 July 2003
    
    Current Virus and Port Attacks
    Virus: #1 Virus in USA: WORM_KLEZ.H
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports: 137 (netbios-ns), 80 (www), 445 (microsoft-ds),
    1434
    (ms-sql-m), 139 (netbios-ssn), 4662 (eDonkey2000), 113 (ident), 0 (---),
    19479 (---), 25 (smtp)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    
    
    



    This archive was generated by hypermail 2b30 : Wed Jul 30 2003 - 08:50:48 PDT