May 16, 2002 13,000 Credit Reports Stolen by Hackers Hackers posing as employees of the Ford Motor Credit Company have in recent months harvested a trove of 13,000 credit reports a virtual one- stop shop for fraud and identity theft with data on consumers in affluent neighborhoods across the country. The company said in a letter to the victims that computer intruders used an authorization code from Ford Credit to get the credit reports from Experian, one of three major reporting agencies. "I've never seen anything of this size," a spokesman or Experian, Donald Girard, said. "Privacy is the hallmark of our business. We're extraordinarily concerned about the privacy issue here, and the trust factor." - - - - - - - - FBI searches home of 'Deceptive Duo' suspect The FBI searched the California home of a teenager suspected of being a member of the hacker group Deceptive Duo, which has claimed responsibility for hacking and defacing several government and public-sector Web sites. Andrew Black, a spokesman for the FBI's San Francisco office, said agents from his office executed the search warrant at the Pleasant Hill, Calif., home of 18-year-old Robert Lyttle on Monday at the request of the FBI's field office in Washington, which is coordinating the case.,10801,71230,00.html - - - - - - - - Man Posts Sexy Personal Ads In Ex-Wife's Name, Gets Jailed An Arizona man who placed sexually explicit personal ads on the Internet, but attributed them to his ex- wife, has been handed a year in jail for that and other computer-related crimes. The office of Arizona Attorney General Janet Napolitano said this week that a Glendale man was sentenced in Maricopa County Superior Court to jail time plus 10 years' probation following two separate incidents involving faked identity. - - - - - - - - Charges loom in IM harassment case A Boston-area teen has had his instant messaging wings clipped following charges that he used the medium to harass girls and their families. Under the terms of a pretrial probation agreement signed Monday by the unidentified teen and others involved in the case, the resident of North Reading, Mass., risks criminal prosecution if he engages in "unsupervised" use of IM and other computing applications, according to the North Reading Police Department. - - - - - - - - Virus hoax pulls in victims An e-mail hoax posing as a virus advisory is surfing across the Internet on a wave of PC user naivete. The fake advisory warns users of the file "jdbgmgr.exe," purportedly a virus that damages a victim's computer system two weeks after first infecting the PC. The hoax has been forwarded by users who believe they have been infected and need to tell other victims to clean out the virus. - - - - - - - - Teddy hoax virus looking to play Down An old hoax virus has donned a new disguise to test the unwary Windows XP user and it already has a few Australians jumping on the delete key. Teddy, a variant of the SULFNBK.EXE hoax that has been menacing e-mail users since early 2001, has identical social engineering principles as its predecessor. It warns users that they have a virus, instructing them to delete a Windows system file in order to remove it.,2000024985,20265296,00.htm - - - - - - - - 'Fortnight' Worm Changes Browser Start-Up Page To Porn Site Anti-virus companies have identified a mass mailer worm known as "JS.Fortnight" that changes an infected computer's Internet start-up page to an adult site. According to Symantec and F-Secure, JS.Fortnight makes changes in the infected computer's registry, including adding an HTML file into the default signature for messages sent with e-mail software program Outlook Express. The e-mail contains a hidden link to "" sites. - - - - - - - - Senate Committee OKs ID Theft Bills Identity theft victims could better repair their lives - and credit - under legislation approved today by a Senate committee. The Senate Judiciary Committee also made several changes to the Identity Theft Victims Assistance Act and the Social Security Number Misuse Prevention Act to make them easier on businesses. - - - - - - - - Senator Prevents Action on Online Privacy Bill Senator Trent Lott, the minority leader, forced the Senate Commerce Committee to adjourn this morning as it was on the verge of adopting an online privacy bill. The measure would require Internet service providers, online service providers and commercial Web sites to get customers' permission before they could disclose important personal information. That would include financial, medical, ethnic, religious and political information along with Social Security data and sexual orientation. - - - - - - - - UK firms fail e-security test Business leaders are offered advice on protecting themselves from cyberattack, as the UK government is urged to take a more active lead in IT security. Security experts have warned that e-security is dangerously poor in the UK, with most British firms failing to give enough attention to managing information risks.,,t269-s2110464,00.html - - - - - - - - Feds Out-Hack Russian Hackers Even for the FBI, it was an audacious sting, reports CBS News Correspondent Wyatt Andrews. With the help of some new computer spying software, FBI agents were able to out-hack a pair of Russian hackers who had stolen thousands of credit card numbers to make purchases on Ebay and then defraud Pay Pal, the leading online bill payer. - - - - - - - - 'Jello' threat sets security a-wobble Companies using fingerprint readers to increase security now have to worry about a new threat: the gummy finger. A Japanese researcher presented a study on Tuesday at the International Telecommunications Union's Workshop on Security in Seoul, Korea, showing that fingerprint readers can be fooled 80 percent of the time by a fake finger created with gelatin sporting prints lifted from a glass, for example.'/2100-1105-916135.html - - - - - - - - DOD tightening security buys In an effort to improve the security of the commercial software it buys, the Defense Department beginning in July will restrict its purchase of information assurance products to those certified by the National Information Assurance Partnership. - - - - - - - - Internet gambling poses questions for Nevada regulators Nevadans won't be able to legally gamble from their home computers any time soon, state regulators said Thursday. That's because Internet gambling poses too many legal, technical and public policy questions to determine how it should be regulated, said Dennis Neilander, chairman of the Nevada Gaming Control Board. - - - - - - - - Tech giants back file-swapper Kazaa Powerful computer and telecommunications companies are allying with upstart file-swapping service Kazaa in a bid to overhaul the way record labels are paid for music and other content distributed on the Net. Stung by legislative proposals that could force computer companies and Internet service providers to become anti- piracy cops, Verizon Communications and an influential technology trade association are beginning to push a copyright proposal that could make downloading a song online as legal as listening to the radio. - - - - - - - - Microsoft issues patch for six flaws in Web browser Microsoft Corp. has warned that its Internet Explorer software contains six flaws, some of which could give hackers access to -- and even potentially change -- personal information about computer users. The Redmond company, which called the severity of some of the flaws ``critical,'' advised users of Explorer versions 5.01, 5.5 and 6.0 to download a patch for the software from the Microsoft Web site at Experts Rip New Microsoft Browser Patch - - - - - - - - World leaders use terror card to watch all of us. Forever Pronouncements from this week's G8 Justice and Interior Ministers meeting about data protection and the retention of Internet traffic data have created concern among privacy activists. Controversy centres around whether blanket retention of traffic data on the entire population should be permitted (effectively making every Internet user susceptible to continuous surveillance of their online activity), or whether data should only be recorded on specifically designated targets or groups. Although the G8 refers to September 11 and terrorism as justification for data retention, there is no proposal to limit the use of data to terrorist cases. - - - - - - - - Could Hackers Derail Wireless LANs? Gartner research director John Pescatore told Wireless NewsFactor that despite improvements in WLANs, the fact that the technology is still in the emerging phase makes it vulnerable. 'They've been rushed out to market,' he said, which is 'usually a good recipe for security holes.' - - - - - - - - Trustworthy Computing -- Microsoft White Paper While many technologies that make use of computing have proven themselves extremely reliable and trustworthy computers helped transport people to the moon and back, they control critical aircraft systems for millions of flights every year, and they move trillions of dollars around the globe daily they generally havent reached the point where people are willing to entrust them with their lives, implicitly or explicitly. Many people are reluctant to entrust todays computer systems with their personal information, such as financial and medical records, because they are increasingly concerned about the security and reliability of these systems, which they view as posing significant societal risk. If computing is to become truly ubiquitous and fulfill the immense promise of technology we will have to make the computing ecosystem sufficiently trustworthy that people dont worry about its fallibility or unreliability the way they do today. - - - - - - - - Facial recognition put to the test Facial-recognition security systems installed at Boston's Logan Airport, where two of the Sept.11 hijacked flights originated, worked more than 90 percent of the time in a recently concluded test, two companies behind the systems said Thursday. While official data has not yet been released, Visionics and Viisage Technology said their systems were able to identify individuals from a pre-selected group passing through the airport more than nine out of 10 times. Face Recognition Technology Fails Again, ACLU Claims *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.