Loading ...
Sorry, an error occurred while loading the content.


Expand Messages
  • Fred Cohen
    FBI, DOJ Issue List of Worst Net Threats No shocker: Opening e-mail attachments without checking the source or content is the No. 1 security mistake. The FBI,
    Message 1 of 196 , Jun 2, 2000
    • 0 Attachment
      FBI, DOJ Issue List of Worst Net Threats
      No shocker: Opening e-mail attachments without
      checking the source or content is the No. 1
      security mistake. The FBI, the Department of
      Justice and the System Administration, Networking
      and Security Institute are jointly releasing a
      list detailing the 10 most critical Internet
      security threats and how to eliminate them.

      Who Should Fight Cybercrime?
      As the world's top politicians, lawmakers, and
      business types argue and bleat over what must
      be done to stop the horrible, world-stopping
      threat known as cybercrime, a group of engineers
      who built and preside over the Internet's
      backbone are debating whether they should get

      Web hijackers pilfer Internet Domain names
      Cyberspace hijackers have stolen the Internet
      domain name Web.net, a hosting site for 700 charities,
      from its Canadian owners, exposing yet another of the
      Internet's security flaws and jeopardizing the Web's
      most valuable property -- your e-identity.

      Web security ups ante, goes nuclear
      British Internet companies are increasingly turning
      to complexes capable of withstanding a nuclear
      onslaught in the battle against computer hackers
      and other threats, according to one security
      consultant. Nuclear bunkers might sound excessive
      but, says Ian Johnston-Bryden, consultant with
      Firetrench Security, they are the ideal security
      solution. Johnston-Bryden says that these
      facilities not only provide unparalleled physical
      protection -- a site that his company is co-developing
      in Kent can withstand a near miss from a tactical
      nuclear weapon -- but also come with an abundance
      of power and connectivity. Many have backup generators
      as well as a backup satellite link.

      Pentagon envisions cyber-warfare rise
      The U.S. military by 2020 will develop the
      capability to conduct attacks on foreign computers
      and networks while defending its systems against
      strategic information warfare strikes, a Pentagon
      report on future war fighting made public yesterday
      says. Additionally, the military will seek to
      improve weaknesses uncovered during the Kosovo
      conflict last year to better conduct operations
      with allies in combat, the Joint Staff report
      "Joint Vision 2020" says.

      DOD redefining info ops
      Based on the lessons learned from the 78-day air
      war in Kosovo, Defense Department officials are
      seeking to redefine the emerging field of high-tech
      information operations, a senior DOD official said
      last week.

      Hacktivism in the Cyberstreets
      In early May an activist calling himself "Reverend
      Billy" called for thousands of computer owners to
      fire up their modems for an assault on Starbucks.
      From unseen corners of the globe, they'd converge
      on the company's Web site -- hoping to overload it.

    • Fred Cohen
      Terrorist Web Site Hosted by U.S. Firm The political ideology of the Hamas site, which refers to recent suicide attacks in Israel as the martyr brigade, is
      Message 196 of 196 , Apr 4, 2002
      • 0 Attachment
        Terrorist Web Site Hosted by U.S. Firm The political ideology of the
        Hamas site, which refers to recent suicide attacks in Israel as the
        'martyr brigade,' is not illegal, according to most analysts. A Web
        site glorifying recent suicide attacks in the Middle East that is hosted
        by a U.S. company is sparking legal and ethical questions about whether
        Internet service providers and hosting companies should be held
        accountable for content on their networks and Web pages.

        FBI will use 'electronic tripwires' to protect secrets Tighter security
        against possible spies inside the FBI will require sophisticated
        ``electronic tripwires'' activated when employees try to review
        off-limits secrets, says a former FBI and CIA director. The tripwires
        ``will make it more difficult (for spies) in a deterrent sense --
        knowing they'll be more apt to be observed,'' said William H. Webster,
        who led a commission of experts investigating security inside the FBI
        after the February 2001 arrest of agent Robert Hanssen.

        Securing the cyber front Last year=92s spate of hacker attacks, viruses
        and worms shed light on the nation=92s poor state of information
        security--and the government=92s inability to shore it up. After Sept.
        11, the state of the country=92s cyber security seemed even more
        vulnerable to an even wider range of threats, and the White House
        stepped forward with what seemed like a bright idea to secure the cyber
        front. http://www.govexec.com/dailyfed/0402/040202ti.htm

        Clarke: IT security is 3 to 5 years away The president=92s proposed
        fiscal 2003 budget puts much-needed money behind efforts to improve IT
        security, presidential cybersecurity adviser Richard Clarke told
        industry representatives at FOSE 2002. =93The history of government
        trying to achieve IT ecurity is a sad one,=94 Clarke said. =93We have
        to tart putting our money where our policy is.=94

        Army security expert emphasizes vigilance and training A computer
        scientist from the National Infrastructure Protection Center yesterday
        urged agency officials to return to the basics of security and guard
        against cyberattacks by IT insiders. Robert M. Wright, on loan to
        NIPC=92s Special Technology Application Unit from the Army, said
        today=92s insiders are the people who are allowed onto an agency=92s
        network. Such insiders bring in tools ranging from hard drives the size
        of key chains to anonymous remailers, steganography=97hiding messages
        within digital images=97peer-to-peer applications, and infrared and
        radio wireless devices.

        Better management key to fighting cyber attacks The greatest
        technologies in the world will not shield federal agencies from cyber
        attacks unless they require more involvement from their senior managers
        and improve on educating their employees about computer security,
        several high-ranking federal information technology officials said
        Wednesday. "IT security is really a question of accountability," said
        Daryl White, the Interior Department's chief information officer, during
        a conference sponsored by the National High Performance Computing and
        Communications Council. "You can't hold firewalls and intrusion
        detection systems accountable. You can only hold people accountable."

        Support For Government Surveillance Slips Support for expanded high-tech
        government surveillance gradually has diminished during the six months
        following the Sept. 11 terrorist attacks, new Harris Poll figures show.
        While a majority of Americans continue to favor expanded surveillance by
        law agents in the war against terror, the poll shows that support has
        declined modestly. In one category =96 expanded government surveillance
        of cell phone and e-mail traffic =96 supporters now are in the minority,
        the poll indicates. http://www.newsbytes.com/news/02/175641.html

        Death to Old Software We all know that outdated network software is
        security hazard. The solution: hard-wired expiration codes that
        self-destruct an ld program when it's past its prime. Software lives
        forever. This is its blessing and its curse. It's a blessing, of
        course, because it's what separates software from automobiles, houses,
        electron microscopes, and other marvels of engineering: no wind and rain
        to make code rust, and software has no moving parts to wear out.

        --This communication is confidential to the parties it is intended to serve--
        Fred Cohen Fred Cohen & Associates.........tel/fax:925-454-0171
        fc@... The University of New Haven.....http://www.unhca.com/
        http://all.net/ Sandia National Laboratories....tel:925-294-2087
      Your message has been successfully submitted and would be delivered to recipients shortly.