March 5, 2002 Clock's ticking on Klez worm time bomb A new version of an old worm is set to trigger its destructive payload on March 6. Klez.E (w32.Klez.E@mm) is sometimes called The Twin Virus because the worm is used to spread an upgraded version of the ElKern virus (w32.elkern.b). The new version can now infect Windows 98, Me, 2000, and XP, attempting to corrupt files on these systems without changing their sizes. Klez.E is currently one of the fastest spreading worms on the Internet. - - - - - - - - Teen 'Sharpei' author combats sexism A hacker claiming to be a 17-year-old girl says she wrote a new worm targeting Microsoft's .NET Web services platform to prove women are capable of creating computer viruses and make a statement against sexism, a computer security company said Monday. Dubbed the "Sharpei" worm, it is believed to be the first virus written in C-sharp, the programming language which runs on .NET platforms, said UK-based Sophos, which received a copy of the virus from the programmer.,24195,3374763,00.html - - - - - - - - Stop Him Before He Hacks Again Adrian Lamo has made quite a name for himself by breaking into corporate networks. He has done no harm -- but that's not the issue. Readers of The New York Times's "op-ed" page regularly find columns written by a host of world leaders and celebrities, from Palestinian leader Yassir Arafat and former U.S. President Jimmy Carter to hip-hop star and talk-show host Queen Latifah. The contact information for these luminaries is a closely guarded Times secret, as is the contents of the op-ed section's Rolodex. - - - - - - - - CIA details found on Google Security firm proves ease of gaining sensitive info. Security experts demonstrated today just how effectively determined attackers can use freely and openly available information on the internet to gather intelligence about a target organisation. Security firm Matta this week released a white paper on internet-based counter intelligence using the CIA as the target. According to the firm, the results were "surprising". Without using port scans or direct probes of the CIA network, and employing methodologies entirely within the boundaries of UK and US law, Matta was able to "build a clear network map" of the CIA's infrastructure. - - - - - - - - Philippines: Anti-Piracy Group Intensifies Campaign Anti-piracy watchdog Business Software Alliance (BSA) last week said it is courting various Philippine government agencies seeking support in BSA's continuing bid to clamp down on illegal software users, particularly in the corporate sector. Tarun Sawney, a former member of the Royal London and Hong Kong Police who now is the Asia Pacific Enforcement Manager for BSA, said during a press briefing he is set to meet public officials in anticipation a major anti- piracy operation's launch by mid-March. - - - - - - - - Malicious code infection soars Over one million attacks in the past 20 months. Despite increased spending, the rate of malicious code infection continues to climb. A staggering 1.2 million incidents took place over a period of just 20 months, according to a new study. The number works out to roughly 113 attacks per 1,000 machines per month, said ICSA Labs, a division of web security specialist TruSecure. In addition, 28 per cent of companies were hit with a virus 'disaster', defined as an attack which affects 25 or more servers or PCs. - - - - - - - - Just Say Nyet to U.S. Net Laws? Is the Internet a physical space bound by the laws of its various locales, or does it transcend the mere physical, putting it beyond the reach of any one country's regulations? That's essentially the question U.S. District Court Judge Ronald Whyte will answer when he decides on a defense motion to dismiss U.S. v. Elcomsoft, the case that began last July with the arrest of the Russian programmer Dmitri Sklyarov.,1283,50832,00.html - - - - - - - - Net sex predators defy easy labels Online criminals prey on kids in 'astounding' numbers. They come for sex with girls and boys, and sometimes to kill. They travel to Colorado from as far away as London. These online predators are aggressive. Police say at least one child a day in Colorado Springs gets a sexual solicitation from them. "The population of people that is actually hunting kids is astounding to me," Colorado Springs police detective Rick Hunt said. - - - - - - - - Net lures predators with anonymous thrills The Internet has opened the world to sexual predators. They find child pornography. They find victims. They find others who think like them. "If you're at a dinner party and talk about wanting to have aggressive sex with an 8-year-old girl, you're likely going to get kicked out," Colorado Springs police detective Rick Hunt said. "You won't online." The major draw of the Internet is anonymity and the fantasy and excitement that follows, said Paul Isenstadt, a clinical social worker who evaluates sexual predators. - - - - - - - - Ford offers amnesty on Internet porn Workers at the car manufacturer have been given two weeks to remove Internet porn from their computers. Twenty thousand workers at Ford, including 5,500 at Dagenham have been told to clean up their computers and remove any offensive, including racist, material they have on their machines. They have been given a two week 'amnesty' to delete the offensive content and can get help from Ford's computer systems managers to remove the content during this period.,,t269-s2105566,00.html - - - - - - - - Federal e-gov efforts buttress homeland security, Lorentz says Can e-government help homeland security? At least four of the Office of Management and Budgets 24 Quicksilver projects will reinforce the Office of Homeland Securitys fight against terrorism, Norman E. Lorentz, OMBs chief technology officer said yesterday. The initiatives are the Interior Departments Geospatial Information One-Stop project, the Health and Human Services Departments eGrants project, the Treasury Departments Wireless Public Safety Interoperable Communications project, and the Federal Emergency Management Agencys Disaster Assistance and Crisis Response program. - - - - - - - - No 'Betamax defense' for file swappers A federal judge on Monday ordered a trio of popular file-swapping services to stand trial on copyright infringement charges, ending a bid to bring a quick end to their legal troubles with the entertainment industry. Attorneys for defendants Kazaa, StreamCast Networks and Grokster had hoped to convince the judge that their products demonstrated sufficient legitimate uses to qualify for the "Betamax defense"--a copyright safe harbor set by the U.S. Supreme Court in the 1980s that cleared the way for home videotape recorders. - - - - - - - - Microsoft finds, patches Java VM flaw A flaw in Microsoft's Java Virtual Machine could allow hackers to hijack a browser and redirect traffic, capturing sensitive data such as the person's passwords, Microsoft has revealed. The company disclosed the flaw Monday on its Web site and posted a patch intended to rectify the problem. Browser Makers Hid Java Proxy Flaw For A Year A critical security flaw in Java that could allow browser traffic hijacking was hidden from the public for almost a year, a security researcher said today. Patches that protect users of Microsoft's Internet Explorer and Netscape's Navigator browsers against the bug were released yesterday, nearly eleven months after the software makers learned of the vulnerability in their implementation of Sun Microsystem's Java Virtual Machine (JVM). - - - - - - - - Board proposes annual privacy report, coordination Federal privacy policies are so inconsistent from agency to agency that they need to be systematically documented through an annual report and by creating stronger relationships among government privacy officers, according to the draft report of a government advisory board on computer security and privacy released Tuesday. The draft report, whose details are being ironed out at the quarterly meeting of an advisory board chartered by the Commerce Department's National Institute of Standards and Technology, recommends an array of changes to federal privacy practices. - - - - - - - - Privacy group awards Big Brothers A proposal by the National Criminal Intelligence Service to store all UK Internet traffic for seven years in a single data warehouse won the Big Brother Award for Most Appalling Project on Monday night. The Big Brother Awards are presented annually by Privacy International to the companies and individuals that have done most to erode the privacy of the citizen, and are accompanied by the "Winstons", which are awarded to those who have done most to protect privacy.,,t269-s2105551,00.html - - - - - - - - Software maker offers privacy testing Security software maker Zero-Knowledge Systems on Tuesday introduced a Web-based tool that lets online businesses evaluate their digital privacy policies. The Montreal-based company's P3P Analyzer, a free beta service, lets companies test whether their Web sites comply with a privacy standard known as Platform for Privacy Preferences (P3P) and its implementation in Microsoft's Internet Explorer 6. The company plans to offer the tool free for 90 days; after that, it expects to charge a yet-to- be-determined fee for the service. - - - - - - - - Riding the Disinformation Superhighway 'The Web's growth has certainly created a new opportunity for people to set up scams,' FTC spokesman Derick Rill said. Dubbed the information superhighway in its infancy, the Internet has in many ways fulfilled its early promise of providing unprecedented access to information and communication. But for all its shady characters and dangerous alleys, the Net might just as well have been called the disinformation superhighway. According to experts, today's users often can spot scams and outright lies by using the Web to find multiple sources of information and perspectives. However, the cons and creeps of the cyber world have mastered the same powerful tool, and they use it skillfully to propagate schemes and spread misinformation. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.