CRIME FW: [Information_technology] Daily News 12.30.03

From: George Heuston (GeorgeH@private)
Date: Tue Dec 30 2003 - 08:49:38 PST


-----Original Message-----
From: information_technology-admin@private
[mailto:information_technology-admin@private] On Behalf
Of InfraGard
Sent: Tuesday, December 30, 2003 8:38 AM
To: information_technology@private
Subject: [Information_technology] Daily News 12.30.03

December 29, CNET News.com - Communication breakdown threatens VoIP.
Currently, about 11 percent of all phone calls use nationwide voice over
Internet Protocol (VoIP) services at some point in the connection. Most
of
this VoIP shuttling takes place in delivering international calls,
through
IP network providers. Calls are handed off to traditional
circuit-switched
networks at either end, but make long-distance jumps using cheaper
packet
switching, or IP, technology. As more calls shift to IP, these handoffs
will
grow in volume and complexity, raising significant technical issues for
carriers, experts said. The basic protocols used to signal VoIP
connections,
session initiation protocol and H.232 are evolving standards that have
been
implemented differently by equipment makers. As a result softswitches
and
Internet protocol gateways from one vendor may not interoperate with
equipment from another. And if the equipment sitting on each network
isn't
able to talk to each other, then the call can't be completed. A new
category
of product has been developed to help alleviate this issue. VoIP session
controllers can be deployed between two carrier networks to help
simplify
the protocol conversion. But even with session control technology
translating the protocols, carriers still need to test and tweak the
networks at the interconnection points.
Source: http://zdnet.com.com/2100-1105_2-5133196.html

December 29, CNETAsia - Terror warning conceals virus. A new virus is
spreading by e-mail in Malaysia, combining threats of terrorist plans
and a
Trojan horse virus. Victims receive an e-mail that claims to warn of
five
planned terrorist attacks, with the times and places leaked by an
anonymous
Malaysian government source. The e-mail's subject line is "Urgent
message to
all citizens of Malaysia," and the e-mail says it seeks to minimize the
number of terrorist victims by spreading the terrorist attacks
information,
reported the Star, a Malaysian daily. Inside the e-mail is an embedded
link
that purports to link to a site with important information regarding the
attacks. However, the Malaysian Computer Emergency Response Team
(myCERT)
said that clicking on the link instead installs three malicious files
that
appear to be Trojan horse virus files and adds a new key to the computer
registery. Then the virus attempts to connect to three Internet hosts
set by
the virus. MyCERT said that the three Internet hosts to which the virus
attempts to connect could have had their security compromised already.
They
have notified the three hosts' system administrators.
Source: http://news.zdnet.co.uk/software/applications/0,39020384,391
18800,00.htm

Current Virus and Port Attacks Virus: #1 Virus in the United States:
WORM_LOVGATE.G
Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
United States]

Top 10 Target Ports 6129 (dameware), 135 (epmap), 1434 (ms-sql-m), 80
(www),
17300 (Kuang2TheVirus), 137 (netbios-ns), 23 (telnet), 445
(microsoft-ds),
901 (realsecure), 53 (domain)
Source: http://isc.incidents.org/top10.html; Internet Storm Center

_______________________________________________
Information_technology mailing list
Information_technology@listserv



This archive was generated by hypermail 2b30 : Tue Dec 30 2003 - 09:32:07 PST