Loading ...
Sorry, an error occurred while loading the content.

news

Expand Messages
  • Fred Cohen
    Massive solar flare eruptions likely to disrupt telecommunications Telecommunications may be disrupted briefly and the northerly night skies will shimmer red
    Message 1 of 253 , Apr 1, 2001
    • 0 Attachment
      Massive solar flare eruptions likely to disrupt telecommunications
      Telecommunications may be disrupted briefly and
      the northerly night skies will shimmer red and
      green this weekend as intense storms rage on the
      sun, scientists say. The biggest sunspot cluster
      seen in at least 10 years has developed on the
      upper right face of the sun's disc, according to
      satellite readings. Researchers said the sunspot
      could persist for several days. The sunspot,
      which is a cooler, darker region on the sun's
      surface, is caused by temporarily distorted
      magnetic fields. It spawns tremendous eruptions,
      or flares, into the sun's atmosphere and hurls
      clouds of electrified gas toward Earth. NASA
      scientists said the most powerful flare erupted
      Thursday, rated a class X, the most potent
      category. The other flares were less intense.
      http://www.siliconvalley.com/docs/news/tech/026002.htm

      Study: Insiders pose main hacking threat
      While chief executives worry about external
      foes hacking into corporate networks, their
      real concerns should be the Trojan Horses--
      disgruntled employees with the inside
      knowledge to easily steal sensitive secrets--
      according to a study released on Thursday.
      Over 90 percent of global CEOs and chief
      information officers believe a breach of
      e-commerce systems would be perpetrated
      through the Internet or other external
      means, said survey of 1,283 companies by
      the accounting firm KPMG. And while the
      breach could come from outside the company
      walls, it is highly likely that the electronic
      fraudster will be an employee or consultant,
      as is the situation with more traditional
      forms of fraud, said Norman Inkster, president
      of KPMG Investigation and Security Inc.
      "Most security breaches are committed by
      individuals who possess intimate knowledge of
      the systems they are attacking," said Inkster.
      http://www.zdnet.com/zdnn/stories/newsbursts/0,7407,2702783,00.html

      Hacking 'is now bigger threat than terrorism'
      COMPUTER hacking could now cripple Britain more
      quickly than a military strike or terrorist
      campaign, Robin Cook, the Foreign Secretary,
      told the Commons last night. He said that the
      electronic technology controlling essential
      services such as water, power and transport had
      become a leading target for terrorists and other
      groups who wanted to disrupt the life of the
      nation.Mr Cook gave a graphic account of how
      terrorists or anti-capitalist protesters could
      wreak havoc in a modern economy such as Britain's
      if they managed to gain access to the computer
      systems of the key public services.
      http://www.telegraph.co.uk/et?ac=3D000114832908976&rtmo=3DqxeqJtd9&atmo=3D9=
      9999999=20
      &pg=3D/et/01/3/30/nhack30.html
      http://www.theregister.co.uk/content/8/17986.html
      http://thebusiness.vnunet.com/News/1119938

      Internet Crime-Fighting Plan May Open Door for Snoopers
      Governments this year are expected to approve
      a wide-ranging treaty to combat cybercrime,
      a document that some critics are describing
      as a potentially Orwellian threat to privacy
      and as a wish list for law enforcement agencies.
      The proposal has the laudable aim of preventing
      serious crimes, such as child pornography, and
      will be a weapon against hacking into computer
      systems and propagating electronic viruses. But
      critics contend that it contains no safeguards
      for privacy and due process and places few
      limits on government snooping. The document
      would require that all countries that sign the
      treaty make copyright infringement a crime,
      hold Internet service providers responsible
      for the content of their systems, and outlaw
      anonymity on the Internet. The treaty, known
      as the Convention on Cybercrime, has been
      drawn up by the Council of Europe, a 43-nation
      intergovernmental organization based in
      Strasbourg. The European Union and the United
      States, meanwhile, have been coordinating their
      actions against cybercrime within the Group of
      Seven industrialized countries plus Russia.
      http://www.iht.com/articles/14308.html

      Lawmakers To Probe Federal Cyber-Security
      A House Oversight and Investigations subcommittee
      Apr. 3 plans to hold a hearing examining cyber-
      security problems at federal agencies. The House
      Energy and Commerce Committee's oversight
      subcommittee under Chairman James Greenwood,
      R-Penn., will look into the issue, one that the
      Commerce Committee last year under former Chairman
      Thomas Bliley, R-Va., examined in meticulous
      detail. Witnesses scheduled to appear at the
      hearing include Ron Dick, director of the FBI's
      National Infrastructure Protection Center;
      Sallie McDonald, assistant commissioner in the
      General Services Administration's Office of
      Information Assurance and Critical Infrastructure
      Protection; John Tritak, director of the Commerce
      Department's Critical Infrastructure Assurance
      Office; Robert Dacey, director of information
      security issues at the General Accounting Office;
      Tom Noonan, president and CEO of Internet
      Security Systems Inc.; and Glenn Podonsky, the
      Energy Department's director of independent
      oversight and performance assurance.
      http://www.newsbytes.com/news/01/163895.html

      Companies tight-lipped over cyber breaches
      Almost one in 10 firms had a cyber-security breach
      in the past year, and most sought no legal action,
      according to a global survey. A poll of leading
      companies in 12 countries including Hong Kong by
      accounting firm KPMG showed gross under-reporting
      and ignorance among executives of security risks.
      Only 17 per cent of the companies that suffered a
      security breach took legal steps against the
      offenders. An equally bleak picture emerged in a
      separate KPMG survey on conventional fraud in Hong
      Kong, with 25 per cent of companies admitting they
      were victims. However, less than one in five
      reported the crime to law enforcers.
      http://www.zdnetasia.com/news/dailynews/story/0,2000010021,20193342,00.htm

      OpenHack: Did He Win or Not?
      A hacker is claming that he has won Argus'
      ballyhooed OpenHack III competition by cracking
      its much-vaunted PitBull security system. Argus
      concedes the crack, but isn't awarding the
      promised big cash prize. Systems running Argus'
      PitBull were offered up as a challenge to hackers
      in the OpenHack III competition in February.
      During the contest, 40,000 people attempted to
      crack the system and were unsuccessful. The same
      challenge was offered at the European technology
      conference CeBit this week. This time, one person
      says he was able to crack the system. But he
      evidently missed the deadline.
      http://www.wired.com/news/technology/0,1282,42747,00.html

      VeriSign certificate snafu highlights threat of human errors
      When VeriSign Inc. disclosed last week that
      it had issued two digital certificates to
      an individual who fraudulently claimed to
      be a Microsoft Corp. employee, the incident
      highlighted for corporate users how simple
      human error can undo technology-based security
      schemes. The mistaken issuance of the digital
      certificates, which led Microsoft to release a
      software update for all Windows releases dating
      back to 1995, also put companies on notice about
      the importance of having both preventive and
      reactive processes in place to deal with such
      security lapses. In addition, users and analysts
      said, VeriSign's goof points out some of the
      broader challenges associated with reliably
      establishing identities within public-key
      infrastructure (PKI) networks.
      http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88-93_STO59099,00.html
    • Glenn Williamson
      Fred and all, I understand the need for information as it relates to IWAR, but I do not see how a story that pertains to billions of burgers served at
      Message 253 of 253 , Sep 7, 2001
      • 0 Attachment
        Fred and all,

        I understand the need for information as it relates to IWAR, but I do not
        see how a story that pertains to billions of burgers served at
        establishments throughout the world involves IWAR. I may be wrong, but what
        one perceives as IWAR now encompasses burger joints and how they get their
        product to market. I am not in agreement with certain companies and the way
        they conduct business, but does it relate to IWAR, unless by generating this
        information across communication channels, one considers it Information
        Warfare and gaining support for Anti-McDonald's Day.

        Ok, that was my 2 cents, I will not say they are right, no offence to
        Mcd's but there will always be people who protest. Does it = IWAR or
        Information Propaganda.

        Glenn Williamson


        -----Original Message-----
        From: Fred Cohen [mailto:fc@...]
        Sent: Thursday, September 06, 2001 11:24 PM
        To: Information Warfare Mailing List
        Subject: [iwar] news



        ___________
        September 2001


        CALL FOR ACTION ON TUESDAY OCTOBER 16th - WORLDWIDE ANTI-McDONALD'S DAY
      Your message has been successfully submitted and would be delivered to recipients shortly.