November 5, 2002 PS40m software piracy ring smashed in Italy Police have smashed a counterfeit software ring in Italy worth almost PS40m in what is described as one of the largest and most organised cases of software piracy in Europe. One person has been charged and a further 10 suspects fingered as the Italian finance police (Guardia di Finanza) and the Business Software Alliance (BSA) seized 100,000 software titles ready to be copied onto CDs and DVDs. The haul also included thousands of other illegally produced media including the latest film releases and video games. - - - - - - - - Sonera security staff held on snooping charges Two senior security staff at Finish telco Sonera have been remanded in custody, charged with breaching customer privacy by allegedly riffling through private telephone records in an attempt to identify an internal mole. - - - - - - - - AOL loses court ruling on Internet privacy issue A Virginia Supreme Court ruled against America Online in its efforts to protect the identity of one of its 35 million subscribers by asking the court to quash a subpoena calling for the member's name in an issue that goes to the heart of the anonymity of the Internet. The ruling against the world's largest Internet service provider, based in Dulles, Virginia, was the latest in the evolution of privacy laws as they pertain to the Internet and identities of Web surfers, privacy experts said.,1367,56209,00.html - - - - - - - - Braid virus shows Klez similiarities A new mass-mailing computer virus known as W32.Braid has slowly spread among PCs over the weekend, said U.K. e-mail service provider MessageLabs. Although the company has seen only 43 copies of the virus--indicating an extremely slow start--W32.Braid shares some attributes of the widely spread Klez family of viruses and could have similar success. Among the similarities, both viruses forge a fake sender address in the e-mails they use to propagate themselves, which makes finding infected PCs more difficult.,,t269-s2125335,00.html - - - - - - - - Bank error exposes e-mail addresses Bank of the West exposed the e-mail addresses of thousands of its online banking customers Monday, in a mistake it blamed on "human error." In an e-mail message sent Monday to alert customers that its banking system would be out of service for maintenance this weekend, Bank of the West included the e-mail addresses of more than 3,300 of its customers in the "To" field, company spokesman John Stafford confirmed Tuesday. Stafford said the company mistakenly placed the e-mail addresses in the "To" field instead of masking them by placing them in the blind carbon copy (BCC) field. - - - - - - - - Online job listing an ID theft scam It was just the job lead Jim needed: a marketing manager position with Arthur Gallagher, a leading international insurance broker. And only days after Jim responded to the job posting on, a human resources director sent along a promising e-mail. Were interested in you, the note said. The salary is negotiable, the clients big. In fact, the clients are so valuable and sensitive that youll have to submit to a background check as part of the interview process. - - - - - - - - Hacking syndicates threaten banking The number of organized hacking syndicates targeting financial institutions around the world is growing at a disturbingly fast rate. And so is the number of banks willing to pay these high-tech extortionists hush money to protect their reputations, according to a security expert at The World Bank.,10801,75584,00.html - - - - - - - - New center reaches out to private firms to protect infrastructure A new center dedicated to assessing terrorist threats to critical U.S. infrastructures is reaching out to other institutions to help mitigate the risk of attacks against strategic U.S. industries and government services, according to U.S. officials. - - - - - - - - Information-sharing partnerships seen as anti-terror model Information-sharing partnerships that helped the federal government and the private sector combat cyber attacks such as the "Code Red" and "Nimda" viruses have served as a valuable model for protecting other critical infrastructures from potential terrorist attacks, a top cyber-security official said Tuesday. - - - - - - - - Homeland Security staff studies data analysis tools The Homeland Security Office is evaluating applications to let agencies analyze links and relationships among information sets without breaching privacy laws or sparking interagency turf battles. Steve Cooper, the offices CIO, said yesterday the goal of the current tests is to validate a data- sharing concept. The premise is that to better track information on possible security threats, agencies must at minimum share information about their data, he said at the Industry Advisory Councils Executive Leadership Conference. - - - - - - - - Industry teams up to fight mobile theft Stolen handsets can now be banned from all five of the UK's mobile networks - could this reduce the number of mobiles nicked? Britain's mobile phone operators and the GSM Association have launched a database designed to prevent stolen handsets being used on any UK mobile network. The move is an attempt to reduce mobile phone crime in the UK, which is thought to be running at one phone theft every three minutes.,,t269-s2125409,00.html - - - - - - - - SAN security under the spotlight Having got standards programmes underway for SAN interoperability and management, the Storage Networking Industry Association (SNIA) is turning its attention to the next key part of the puzzle: storage security. "Three things kicked it off," says Mike Alverado of Neoscale, who chairs SNIA's Storage Security Industry Forum, which held a technology demonstration at Storage Networking World in Orlando this week. - - - - - - - - Teleworking hits security barriers The widespread uptake of working from home is being slowed down by concerns over security issues Over 80 percent of companies now have staff who work from home on a regular or occasional basis, according to the latest research, but security is still seen as a major barrier to more widespread uptake.,,t269-s2125392,00.html - - - - - - - - Mozilla riddled with security holes Details of six flaws in Mozilla, the open source browser were posted on BugTraq at the weekend. Versions of Mozilla previous to version 1.0.1 contain multiple security vulnerabilities, so users need to update their browser software. The flaws could be used by an attacker to read data off of the local hard drive, gain information which should normally be kept private, and in some cases to execute arbitrary code, an advisory by Red Hat explains. - - - - - - - - China's Cyberwall Nearly Concrete While the Great Wall no longer deters would-be invaders from entering China, experts meeting in Washington on Monday said the Chinese government continues to maintain a nearly rock-solid cyberwall. At a panel discussion held by the Congressional-Executive Commission on China, experts warned that China has recently improved its censorship technology -- much of which is provided by U.S. companies. The panel also claimed that China now employs some 30,000 "Internet police" to monitor its citizens, and that is has increased arrests of dissidents and journalists posting illegal content on the Internet.,1283,56195,00.html - - - - - - - - Microsoft Earns a Security Merit Badge No way, you say? Well, it's true: Though its code is far from rock-solid, the Colossus of Redmond is making recognized strides. When a perennial computer-security punching bag gets an exemplary grade for security, you have to scratch your head. But that's precisely what happened when Microsoft announced on Oct. 29 that its Windows 2000 Pro software line had received the so-called Common Criteria certification, an internationally recognized standard for secure design and implementation of info-tech products. - - - - - - - - Polymorphic Macro Viruses, Part Two This article is the second of a two-part series that will offer a brief overview of polymorphic strategies in macro viruses. The first installment of this series looked at some early examples of polymorphism, along with some of the early polymorphic techniques. This installment will look at the first serious polymorphic macro viruses, as well as the evolution of viruses into true polymorphic and, ultimately, metamorphic viruses. Polymorphic Macro Viruses, Part One - - - - - - - - German police launch SMS crime watch German police have launched an SMS service which promises to speed up the process of catching suspected criminals. Descriptions of any felons at large will be texted to a network of mobile phones as soon as police begin investigating a report. An SMS description will be sent to taxi drivers and public transport workers in the area in an attempt to bring in suspects. The system will also be used for quickly spreading the number plates of stolen cars or descriptions of missing persons. - - - - - - - - DISA at halfway point in rolling out wireless priority service Emergency response officials nationwide will get wireless priority phone service starting in May. "Wireless priority service is on the way," said Air Force Lt. Gen. Harry Raduege Jr., director of the Defense Information Systems Agency. DISA's National Communications System has been testing the service in Washington and New York since May, Raduege said yesterday at the Industry Advisory Councils Executive Leadership Conference. For the test, Phase 2 of a four-phase rollout, 3,000 special wireless phones were distributed to a variety of first-response organizations. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2002,, Campbell, CA.