September 20, 2002 British police arrest 21-year-old alleged hacker Police have arrested a 21-year-old man suspected of writing a virus that attacks Linux computer systems, Scotland Yard said Friday. The suspected computer hacker was arrested Tuesday at his home in southwest London on suspicion of writing the T0rn virus that masquerades as legitimate software to enter computer systems. Police seized computer equipment, which is being analyzed by officers from Scotland Yard's computer crime unit, a spokesman for the force said. - - - - - - - - Silicon Valley Concern Says It Thwarted Software Theft A Chinese software programmer was arrested Tuesday after a Silicon Valley company complained that he had tried to steal software used in seismic imaging of oil fields, company officials said today. The programmer, Shan Yanming, 32, has been in the United States since the end of April as part of a contract between the state-owned China National Petroleum Corporation and 3DGeo Development., a Mountain View, Calif., software company. Executives at the company said that the Chinese programmer, who had been training in the use of the company's software, was caught trying to use a company computer password to download company software to a portable computer last Thursday. - - - - - - - - Slapper worm slows to a crawl A Linux worm that started spreading a week ago has reached a plateau after infecting about 7,000 servers and turning the hosts into a peer-to-peer network that could be used to attack other computers. Known as Linux.Slapper.Worm, Slapper and Apache/mod_ssl, the worm's spread has fallen far short of the biggest attackers in recent times. For example, Code Red infected 400,000 servers last summer. And according to the National Strategy to Secure Cyberspace, the Nimda virus compromised 86,000 systems last fall. Perhaps most telling, security experts are already talking about Slapper in the past tense.,,t269-s2122610,00.html - - - - - - - - WorldCom ordered to shield Internet subscribers from child porn sites A judge's order requiring WorldCom to block five child-pornography Web sites is the first use of a Pennsylvania law that raises concerns about turning Internet service providers into government censors. The sites in question were not hosted by WorldCom but were accessible using WorldCom and other ISPs. According to an affidavit filed by an investigator, the sites showed nude males and females, believed to be under age 18, in sexual poses. - - - - - - - - Moussaoui's lawyers seek details on computer use Standby defense lawyers for Zacarias Moussaoui expressed skepticism Friday that government investigators thoroughly investigated the terrorist suspect's computer activity. The lawyers working on Moussaoui's behalf asked a federal judge to order the government to provide a more detailed account of its investigation and to look harder for evidence of an e-mail account apparently used by Moussaoui. - - - - - - - - Domain fraudsters in .eu con Don't be fooled by pre-registration charges, warns expert. Domain name registrar Internetters is warning people not be fooled into pre- registering for .eu domain names. It claims that internet fraudsters are already scamming people about the new .eu domain name, even though it has only just received endorsement from the European Parliament. Ken Sorrie, co-founder and director of Internetters, said that some registration companies are taking money for pre-registrations of .eu when there is not even a registry appointed, or rules defined. - - - - - - - - Comms traffic snooping breaks EU laws Telcos and ISPs fear legal repercussions. The Home Office wants internet service providers (ISPs) and telcos to store customers' communications traffic data on a voluntary basis, but by doing this companies could be breaking the law. The UK has already tried to get telecoms traffic data retained for up to two years under the European Union Communications Data Protection Directive, but has met with stiff opposition from other countries. - - - - - - - - Official: Cybersecurity not watered down A White House official is standing behind the administration's draft recommendations on cybersecurity, asserting that they have not been weakened by lobbying from technology companies. "The one (claim) I hear the most often is that it was watered down," Howard Schmidt, vice chairman of the White House's National Critical Infrastructure Protection Board, said here Thursday. "It is not watered down." On Wednesday, the White House formally introduced a 64-page draft proposal titled "National Strategy to Secure Cyberspace." Week in review: Securing the Net The White House released a draft this week of its long-awaited plan for cyberspace security, but the plan garnered criticism as not doing enough. The Bush administration's plan, a 64-page document called the "National Strategy to Secure Cyberspace," outlines a mainly hands-off approach to securing the Net, giving primary responsibility to individuals and corporations rather than the government. The report was widely praised by technology companies, but the focus on voluntary measures drew a tart response from a handful of critics. - - - - - - - - Calif. puts a lid on mobile phone spam California's mobile phones should soon be officially freed from unwanted text messages. On Thursday, Gov. Gray Davis signed a bill that would prohibit companies from spamming mobile phones and pagers with unwanted text messages. The law, sponsored by Assemblyman Tim Leslie, R-Tahoe City, goes into effect in January. Davis said he endorsed the plan because he didn't want unsolicited messages on mobile phones to reach the same level of mayhem that spam e-mails have. - - - - - - - - Internet cafe fights back in piracy dispute EasyInternetCafe has been threatened with a gagging order as the ongoing piracy dispute between the company and the British music industry remains unresolved. Lawyers acting on behalf of the British Phonographic Industry (BPI) contacted EasyInternetCafe earlier this week, warning that they plan to apply for an injunction that would stop EasyInternetCafe talking to the press about the row. - - - - - - - - Identity theft: Fact and fiction In Shakespeare's Othello, Iago laments that "he that filches from me my good name/Robs me of that which not enriches him/And makes me poor indeed." In the modern world, by contrast, filching someone else's good name through identity theft can significantly enrich the criminal and impoverish the victim. Some federal cases within the last year suggest why identity theft has become one of the fastest-growing forms of white-collar crime. - - - - - - - - Spam-fighter invades the inbox Users who install MailFrontier's anti-spam package are finding that it adds a line of advertising to every email they send. Free Web-based email services have long used customers as marketing mules, adding an unobtrusive tag line at the end of each message to tout their products. Now, an anti-spam company is drawing fire for using the same tactic.,,t269-s2122607,00.html - - - - - - - - Sun donates cryptography tech to OpenSSL project The server company has given its latest elliptic curve technology to an open-source security project Sun Microsystems has donated new cryptography technology to an open-source project at the heart of many secure transactions on the Internet. Sun's "elliptic curve" technology is involved in the process of using keys to encrypt and decrypt information for electronic transactions. Such encryption lets people buy products online, for example, while shielding their credit card number from prying eyes.,,t269-s2122616,00.html - - - - - - - - Transparent token is cryptographic key A transparent token the size of a postage stamp and costing just a penny to make can be used to generate an immensely powerful cryptographic key. Current cryptographic systems use mathematics to generate the numerical "keys" that lock up the protected data. These are produced using "one-way functions", formulas that take simple secret data and generate long keys. The trick is that it is extremely hard to reverse the process and work back to the secret data when given only the key. - - - - - - - - The State of E-Commerce Security Gartner research director Richard Stiennon told NewsFactor that recent SSL vulnerabilities were neither serious nor frequent enough to tarnish the protocol. Most e-commerce transactions currently are secured by the SSL (secure sockets layer) protocol, which is designed to encrypt data exchanges over the Internet. While SSL is generally viewed as effective, an increasing number of vulnerabilities and other issues have spurred some e-commerce players to think about more secure standards. - - - - - - - - Home LANs risk accidental hacks Small businesses and home networkers are at risk from hackers - but some intrusions into a wireless network may be unintended. You are at home late one night, upgrading some software on your wireless LAN. There is no one else in the house, and the neighbour's driveway is empty. You reboot your laptop and wait for it to come back to life. Suddenly the light on your wireless log begins flashing wildly with your laptop rebooting. There shouldn't be any traffic to register, yet it's blinking like Andromeda.,,t269-s2122516,00.html - - - - - - - - Legal guru: We don't need cyberlaws For a law professor specializing in the Internet, David Sorkin takes a pretty dim view of cyberlaw. An associate professor at the John Marshall Law School in Chicago, David Sorkin in 1995 was one of the first academics to offer a course on cyberlaw. But when it comes to legislating our way to Internet nirvana, Sorkin remains a skeptic. In fact, he says the law governing the offline world is equipped to handle most online disputes, and cautions that attempts to address Internet problems such as spam are only going to make matters worse. - - - - - - - - Are you ready? Find out. Hackers. Thieves. Cyberterrorists. Angry ex-employees. They're out there. And they want in--to steal your data, to sabotage your business, to turn your world upside down. They can unleash their havoc at anytime, from anywhere. Are you ready for them? Can you be better prepared? Where are your biggest vulnerabilities? What can you do to safeguard your most precious assets-- your systems, your databases, your trade secrets? How can you harden existing defenses?,14622,6023353,00.html - - - - - - - - UK firm creates GPS tracker for kids Parents in the UK will soon be able to track the whereabouts of their children using a GPS device that can be partly disguised as a badge. The product, called Kidcontact, is due to be released before Christmas and uses both GPS and mobile technology to monitor the location of the child wearing it. Kids can also alert their parents in an emergency with the click of a button, its makers have claimed. When released, it will cost PS495 plus VAT. - - - - - - - - Emphasis on homeland security spurs high-tech sales pitches Companies hawking portable decontamination howers, technology to identify anthrax and plague, and 1,500-pound boulders to guard against truck bombs vied Thursday for a piece of the growing homeland security market. Law officers, military officials and federal security workers buzzed around some 300 exhibits at a trade fair catering to the government's increased security needs since the Sept. 11 attacks. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.