-----Original Message----- From: InfraGard [mailto:infragard@private] Sent: Thursday, August 07, 2003 7:29 AM To: Information Technology Subject: [Information_technology] Daily News 8/07/03 August 06, Wired Forums point the way to Jihad. With the Taliban out of Afghanistan and governments around the world restricting access to al Qaeda-linked websites, would-be militant Islamic holy warriors are turning to low-tech electronic message boards to find out where to fight. The message boards, hosted by such domains as Yahoo and Lycos in the UK, are proving a free, unrestricted and largely difficult-to-track forum for would-be fighters to hook up with those coordinating operations, say terrorism experts and intelligence officials. Whereas once Islamic militants needed to pass through training camps in Afghanistan to be groomed for jihad, now they are announcing their desire to fight in Muslim holy wars and martyr attacks from cybercafes and home computers in Malaysia, Pakistan, Saudi Arabia and the UK. Source: http://www.wired.com/news/culture/0,1284,59897,00.html August 06, Government Computer News Wireless network attacks get a public airing. Federal grants are funding research by investigators in the computer science departments of the nation's universities to probe the vulnerabilities of wired and wireless networks. Some of the results of that research were presented Wednesday at the Security Symposium in Washington sponsored by the USENIX Association of Berkeley, CA. A team from Stanford University, in one example, used a timing attack to extract a private encryption key from a server across a network. In another, researchers at the University of California at San Diego perfected denial-of-service attacks against 802.11 wireless networks. Both teams also demonstrated how to defend against the attacks. Source: http://www.gcn.com/vol1_no1/daily-updates/23053-1.html August 05, ComputerWeekly Companies' poor security policies hamper police investigations into computer crime. Police forces in the UK are having to abandon investigations into computer crimes committed by employees at work because employers are failing to enforce their security policies, a senior detective revealed last week. Steve Santorelli, detective sergeant at Scotland Yard's Computer Crime Unit, said a significant percentage of police investigations fail to get off the ground because employers have not spelt out to staff what is and is not acceptable. Cases where employees copy sensitive data by gaining unauthorized access to their employers' systems, or change the contents of web pages without permission, can be difficult to prosecute unless companies clearly lay down the boundaries. Many security policies do not warn staff of the dangers of social engineering attacks from hackers looking to bypass security systems by conning people in to revealing important company information that will allow the hackers to access systems. Source: http://www.computerweekly.com/articles/article.asp?liArticleID=123928 Internet Security Systems - AlertCon: 1 out of 4 https://gtoc.iss.net/ Last Changed 5 August 2003 Security Focus ThreatCon: 2 out of 4 www.securityfocus.com Last Changed 22 July 2003 Current Virus and Port Attacks Virus: #1 Virus in USA: JS_CBASE.EXP1 Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 445 (microsoft-ds), 80 (www), 137 (netbios-ns), 1434 (ms-sql-m), 139 (netbios-ssn), 113 (ident), 0 (---), 25 (smtp), 135 (epmap), 53 (domain) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Thu Aug 07 2003 - 10:00:37 PDT