September 23, 2002 Arrest for Slapper author But a new variant is already out there. A suspect has been arrested on suspicion of authoring the Slapper worm. But although the threat of the worm seems to have been shortlived, a new variant is already set to take up where its predecessor left off. David Morgan, senior consultant for Internet Security Systems (ISS), revealed the news of the arrest. "Slapper mailed the addresses of infected machines back to an email address in the Ukraine," he said. "This email was checked from a traceable location and, as a result, a 21-year-old male has been arrested by the authorities." - - - - - - - - Adelphia founder, four others indicted Adelphia Communications Corp. founder John J. Rigas, his sons and two other former executives were indicted Monday for allegedly stealing hundreds of millions of dollars from the nation's sixth-largest cable television company. The 24-count indictment, handed up in Manhattan federal court, charges the men with conspiracy, securities fraud and wire fraud, and seeks $2.5 billion in forfeited assets for the alleged large-scale accounting fraud and corporate looting. - - - - - - - - Woman falls for Nigerian scam, steals $2.1m from law firm A bookkeeper for Michigan law firm Olsman Mueller & James has been taken for $2.1m by Nigerian 419 fraudsters, the Detroit Free Press reports. The 59-year-old woman received a fax from one Dr. Mbuso Nelson of the Ministry of Mining in Pretoria, South Africa, asking for help in getting a cool $18m transferred to the US. We all know what comes next: the hapless victim set up a bank account, only to be told that certain expenses had to be met. Fuelled by greed and stupidity in equal measure, the woman dutifully wired huge sums to accounts in South Africa and Taiwan. Cue popping champagne corks in expensive Lagos restaurants. - - - - - - - - Greece enters web Dark Ages again Government reinstates online games ban. The Greek government's ban on web-based computer games has been reinstated by an appeals court meaning that two cyber cafe owners and their employee could go to prison. A lower court decision earlier this month rejected the case against two Thessaloniki cyber cafe owners and a member of staff, describing the law as unconstitutional. But the appeals court judge disagreed and ordered a retrial. A date has yet to be set for the new hearing. - - - - - - - - Energy agency says Web info poses threat Citing the threat of terrorism, the Federal Energy Regulatory Commission (FERC) is proposing new rules to limit the public's access to information about power plants, pipelines and other components of the energy infrastructure. Only those with "a need to know" will have access to the information, and they might be required to sign an agreement that prohibits them from revealing what they have learned. - - - - - - - - FBI cyber chief heralds interagency cooperation Ron Dick, the director of the FBI's National Infrastructure Protection Center, said the FBI's new effort to partner with the Secret Service on investigating cyber crimes is aimed at marshalling resources. At the launch of the national cybersecurity protection plan last week, the FBI and Secret Service announced a new pilot program where several field offices of both agencies agreed to work together on investigating cyber crimes to determine who is behind a particular attack. Justice Department formalizes information sharing guidelines - - - - - - - - Join Cyber Corps, get paid to go to school You can get a master's degree at UNC Charlotte or N.C. A&T State University in one of the hottest fields around for free -- free books, free tuition, free room and board. There's a stipend too: $1,000 a month. That's on top of a summer internship with benefits and pay. And when you're finished, you're practically guaranteed a job. - - - - - - - - Online Gaming Illegal (Wink Wink) Despite the defection of several big-name credit card issuers and a recent Justice Department "advisory" declaring all Internet gambling illegal, many watchers of online casino operations remain convinced the industry is still on a roll. As proof, they cite a federal court decision in Louisiana that could de-fang the Justice Department's virtual bite, Congress' repeated repudiation of such measures as the Internet Gambling Prohibition Act and a successful Nevada ballot initiative directing the state legislature to begin issuing online gambling licenses. (Several Las Vegas casinos now operate online by way of the Isle of Man.),1283,55202,00.html - - - - - - - - Crypto boffins: let's get physical Researchers at MIT have developed a physical token, based on tiny glass spheres encased in epoxy resin, as a more secure alternative to generating cryptographic keys electronically. With computers getting ever more powerful, especially when quantum-based technology come on the scene, some predict the mathematical algorithms which underpin current encryption techniques could be broken. - - - - - - - - Aussies protest MS security advice Citing Microsoft's own somewhat patchy security record, Australian industry commentators have called into question the software maker's worthiness to advise the Federal Government on the country's cyber security policy. Recent industry reports have suggested that despite its being snubbed by US government officials during formulation of America's official cyber security efforts, Microsoft Australia is playing a key advisory role in relation to Australia's first cybersecurity framework. - - - - - - - - Microsoft issues 51st security bulletin of the year Microsoft Corp. on Thursday disclosed more flaws in its Windows operating systems, the most serious of which could let an outside attacker take over a computer. The software company advised that all users of Windows install a free patch to fix flaws in its "virtual machine" for translating applications written in the Java programming language. Microsoft termed the threat "critical." Microsoft also disclosed "moderate" flaws in Windows 2000 and XP and advises administrators of Windows 2000 servers and end users of Windows XP to download a patch. - - - - - - - - Microsoft spying? Linux is looking better China thinks Microsoft software contains secretly embedded code that the United States government can manipulate at will. So, in case of war between the two countries, a Pentagon official can hit a switch and--presto!--cripple China's computing infrastructure. A senior Microsoft executive, who often confers with the Chinese (sorry, no names), told me this tale. I thought he was joking. He wasn't. Some people in the Chinese government actually believe it's true. - - - - - - - - Want to know how was hacked? Two weeks ago the Recording Industry Association of America website was defaced. Twice. Even more embarrassing, the crackers installed pirate music files on the site for download. But how?, a security site-based in Estonia, has uncovered the elementary mistake in RIAA's robot.txt files which gave the crackers their back door. This is our first exposure to Estonian humour. And we like it. The Register is publishing zone-h's entertaining treatment by permission. - - - - - - - - Who's letting the spam in? Have you helped a spammer today? According to operators of spam-filtering lists, an alarming number of people are unwittingly helping junk mailers shuttle spam, or unsolicited bulk e-mail. Those unassuming victims are running software meant to allow multiple connections over a LAN (local area network) to the Internet through a single line, or what's known as proxy servers. Many proxy servers are installed insecurely, and spammers have discovered tricks to tap into them to send junk mail with little trace--an occurrence relatively unseen a year ago, experts say. - - - - - - - - When is hacking a crime? Kevin Finisterre admits that he likes to hew close to the ethical line separating the "white hat" hackers from the bad guys, but little did he know that his company's actions would draw threats of a lawsuit from Hewlett-Packard. This summer, the consultant with security firm Secure Network Operations had let HP know of nearly 20 holes in its Tru64 operating system. But in late July, when HP was finishing work to patch the flaws, another employee of Finisterre's company publicly disclosed one of the vulnerabilities and showed how to exploit it--prompting the technology giant to threaten litigation under the Digital Millennium Copyright Act. New laws make hacking a black-and-white choice - - - - - - - - Security--teamwork pays off As organizations continue to invest in dedicated information security resources, developing the capability to respond appropriately to security incidents is becoming imperative. Instituting a security incident response team (SIRT) is aprerequisite for effective information security countermeasures.,14179,2880346,00.html - - - - - - - - Who Goes There? An Introduction to On-Access Virus Scanning, Part 2 By now, most savvy computer users have anti-virus software (AV) installed on their machines and use it as part of their regular computing routine. However, most average users do not know how anti-virus software works. This article is the second in a two- part series that will offer a brief overview of a particular type of anti-virus technique known as on-access scanning. Who Goes There: An Introduction to On-Access Virus Scanning, Part One - - - - - - - - Configuring IPsec and IKE on Solaris, Part Three This is the third article in a three-part series on configuring IPsec and the Internet Key Exchange (IKE) on Solaris hosts. The first article covered the basics of IPsec and IKE. The second article focused on configuring IPsec to protect traffic between two Solaris hosts. This article will discuss the configuration of an IPsec VPN tunnel between two Solaris hosts. Configuring IPsec/IKE on Solaris, Part One Configuring IPSec and Ike on Solaris, Part Two - - - - - - - - Cybersecurity plan on the lite side The Bush administration's long-awaited plan for protecting the nation's critical computer systems from cyberattacks is too weak because it does not set specific requirements for federal agencies or the private sector to follow, and politics is mostly to blame for the watered-down plan, information technology experts say. A Cybersecurity Sleeping Pill From a White House given to dramatic warnings of electronic Pearl Harbors comes an incongruously meek national strategy. Did industry lobbyists slip someone a Mickey? For sixty-five pages, a fat lot of nothing. That's the only sensible verdict possible upon scanning Richard Clarke's much-hyped draft of "The National Strategy to Secure Cyberspace." - - - - - - - - Exploiting online raunch at the polls What is it with state attorneys general trying to stamp out Internet vice around election time? On Oct. 27, 1998, precisely one week before Election Day, the New York State Attorney General's Office raided an Internet provider in Buffalo and confiscated its news server. The charge, according to former Attorney General Dennis Vacco, was that BuffNet carried Usenet newsgroups where child pornography could be found. It could be found, that is, if someone looked hard enough--and Vacco's investigators were nothing if not determined. - - - - - - - - Boston Airport to Install Scanners Logan International Airport in Boston will announce on Monday that it is installing scanners that can check the authenticity of hundreds of kinds of driver's licenses and passports, check the bearer's name against government "watch lists," and generate lists, with photos, of whose document was checked and when. - - - - - - - - When porn permeates Web personals They look real, their e-mails sound real, but before you know it youre being asked for a credit card number. Her online personal ad said she liked the outdoors, camping, hiking, biking, blading, and yes, even fishing. Don was online looking for love, like millions of other men, and thought Amyloov was sexy, so he dropped her a note through Yahoo.coms personals. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.