CRIME FW: [Information_technology] Daily News 8/07/03

From: George Heuston (GeorgeH@private)
Date: Thu Aug 07 2003 - 09:33:33 PDT

  • Next message: Jim Wood: "CRIME Listserv problems?"

    -----Original Message-----
    From: InfraGard [mailto:infragard@private] 
    Sent: Thursday, August 07, 2003 7:29 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 8/07/03
    
    August 06, Wired
    Forums point the way to Jihad. With the Taliban out of Afghanistan and
    governments around the world restricting access to al Qaeda-linked
    websites,
    would-be militant Islamic holy warriors are turning to low-tech
    electronic
    message boards to find out where to fight. The message boards, hosted by
    such domains as Yahoo and Lycos in the UK, are proving a free,
    unrestricted
    and largely difficult-to-track forum for would-be fighters to hook up
    with
    those coordinating operations, say terrorism experts and intelligence
    officials. Whereas once Islamic militants needed to pass through
    training
    camps in Afghanistan to be groomed for jihad, now they are announcing
    their
    desire to fight in Muslim holy wars and martyr attacks from cybercafes
    and
    home computers in Malaysia, Pakistan, Saudi Arabia and the UK. Source:
    http://www.wired.com/news/culture/0,1284,59897,00.html
    
    August 06, Government Computer News
    Wireless network attacks get a public airing. Federal grants are funding
    research by investigators in the computer science departments of the
    nation's universities to probe the vulnerabilities of wired and wireless
    networks. Some of the results of that research were presented Wednesday
    at
    the Security Symposium in Washington sponsored by the USENIX Association
    of
    Berkeley, CA. A team from Stanford University, in one example, used a
    timing
    attack to extract a private encryption key from a server across a
    network.
    In another, researchers at the University of California at San Diego
    perfected denial-of-service attacks against 802.11 wireless networks.
    Both
    teams also demonstrated how to defend against the attacks. Source:
    http://www.gcn.com/vol1_no1/daily-updates/23053-1.html
    
    August 05, ComputerWeekly
    Companies' poor security policies hamper police investigations into
    computer
    crime. Police forces in the UK are having to abandon investigations into
    computer crimes committed by employees at work because employers are
    failing
    to enforce their security policies, a senior detective revealed last
    week.
    Steve Santorelli, detective sergeant at Scotland Yard's Computer Crime
    Unit,
    said a significant percentage of police investigations fail to get off
    the
    ground because employers have not spelt out to staff what is and is not
    acceptable. Cases where employees copy sensitive data by gaining
    unauthorized access to their employers' systems, or change the contents
    of
    web pages without permission, can be difficult to prosecute unless
    companies
    clearly lay down the boundaries. Many security policies do not warn
    staff of
    the dangers of social engineering attacks from hackers looking to bypass
    security systems by conning people in to revealing important company
    information that will allow the hackers to access systems. Source:
    http://www.computerweekly.com/articles/article.asp?liArticleID=123928
    
    
    Internet Security Systems - AlertCon: 1 out of 4
    https://gtoc.iss.net/
    Last Changed 5 August 2003
    
    Security Focus ThreatCon: 2 out of 4
    www.securityfocus.com
    Last Changed 22 July 2003
    
    Current Virus and Port Attacks
    Virus: #1 Virus in USA: JS_CBASE.EXP1
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports: 445 (microsoft-ds), 80 (www), 137 (netbios-ns),
    1434
    (ms-sql-m), 139 (netbios-ssn), 113 (ident), 0 (---), 25 (smtp), 135
    (epmap),
    53 (domain)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    
    
    



    This archive was generated by hypermail 2b30 : Thu Aug 07 2003 - 10:00:37 PDT