NewsBits for November 5, 2003 sponsored by, Southeast Cybercrime Institute - ************************************************************ Microsoft offers cash rewards for catching virus writers Applying Wild West bounties to modern Internet crimes, Microsoft Corp. set aside $5 million Wednesday to pay large cash rewards to people who help authorities capture and prosecute the creators of damaging computer viruses.,39024655,39116765,00.htm,39020375,39117637,00.htm Interpol, FBI officials weigh in on cyber crime-fighting hurdles Peter Nevitt, the IT director of international crime-fighting organization Interpol, called the antivirus reward program unveiled today by Microsoft a first step toward fighting the problem of computer viruses. But more needs to be done, Nevitt said -- especially in the many countries that lack basic skills and laws to pursue cybercriminals.,10801,86863,00.html Experts, IT managers say Microsoft should forget bounty, focus on security,10801,86869,00.html - - - - - - - - - - Italian charged in porn dialler virus scam A 39-year-old Italian man accused of running a porn dialler scam has been charged with fraud and virus distribution. Italian police say the unnamed suspect stood to net 104,000 from a scam which tricked users into running a virus, called Marq-A, which altered the Internet dial-up number used by victims to a premium rate line, La Repubblica reports. - - - - - - - - - - 'Massive' DoS attack takes down WorldPay Online payment firm WorldPay, part of the Royal Bank of Scotland Group, is battling to process customer transactions after being hit by a massive denial of service (DoS) attack. The attack started yesterday, flooding WorldPay's web connected systems with huge volumes of bogus requests and bringing its payment and administration systems to a grinding halt. WorldPay prepared to compensate clients New Zealand Under Attack of Cyber Swindlers - - - - - - - - - - Congress vs. Spam Congress is on track to pass a federal anti-spam law before it adjourns for the year. What would the law do? Can any law put an end to spam? What technological solutions to spam are currently in the works? Krim also discussed the latest developments in the Microsoft antitrust case and the FCC's decision on Tuesday to require some electronic components to be built with technology to prevent Internet piracy of digital TV content. Spam fighters make a good killing - - - - - - - - - - Bill seeks to iron out wrinkles in visitor-tracking program Lawmakers on Thursday plan to introduce a bill to address concerns with a new visa program at the Homeland Security Department. Rep. Pete Sessions, R-Texas, who sits on the House Select Committee on Homeland Security, along with Reps. Lincoln Davis, D-Tenn., and Randy Neugebauer, R-Texas, are unveiling the Visitor Information and Security Accountability Act at a Capitol Hill news conference. - - - - - - - - - - FCC Cracks Down on Piracy Bowing to pressure from Hollywood studios and broadcasters, the Federal Communications Commission on Tuesday ordered consumer electronics and computer manufacturers to redesign their products to help deter piracy of digital television programs.,1,5266940.story - - - - - - - - - - 'Critical' patch sent out for Office flaw Microsoft issued the first major patch for the new version of its Office software, fixing a flaw that could result in lost work. The "critical update," released late on Tuesday, applies to three of the four major applications in Office 2003--the Word word-processing program, the PowerPoint presentation application and the Excel spreadsheet software, according to a Microsoft bulletin. - - - - - - - - - - Has your phone been 'bluejacked'? Bluetooth, the connectivity technology most commonly found in mobiles and PDAs, looks like it could be spawning a new craze--and possible a new outlet for spammers. Bluetooth enables devices within a few meters of each other to exchange information wirelessly--a technology that users with Bluetooth- enabled mobiles are making the most of to send text messages to strangers anonymously. This drive-by messaging has been dubbed 'bluejacking.' - - - - - - - - - - Data surveillance complaints have zero success rate Hundreds of people have protested that their privacy has been unfairly violated under the Regulation of Investigatory Powers Act, but not a single one has yet been successful. The body set up to protect UK citizens from having their communications data unfairly accessed by the police or secret agents has yet to rule in favour of a single complainant despite receiving hundreds of complaints, the government has revealed.,39020330,39117640,00.htm - - - - - - - - - - Internet more dangerous than ever The internet is more dangerous than it was last year, according to Art Coviello, chief executive of RSA Security. In his opening keynote at the RSA Security Conference in Amsterdam, Coviello warned that the proliferation of web-enabled applications and devices and a lack of fault fixing have made the environment more dangerous. - - - - - - - - - - A glimpse inside the virus writer It's not just technical tricks that make viruses successful. When most people catch a computer virus it usually makes them much more diligent and update their anti-virus software more often. But when computer security researcher Sarah Gordon was hit by a virus it did not just make her worry about what was lurking in her inbox. - - - - - - - - - - RSA secures deals for tighter ID Security vendor RSA has signed partnerships with both Microsoft and Accenture for its Identity and Access Management product range.mSoftware giant Microsoft is to build RSA's ClearTrust 5.5 web access management into its own identity and access software. - - - - - - - - - - Virtual Battlefield The Answer To Real Threats The battle against hackers is going virtual. The U.S. Department of Justice has awarded Iowa State University a grant worth nearly $500,000 to build an Internet-Scale Event and Attack Generation Environment, or ISEAGE, a lab where "virtual battlefields" will be created. Researchers can conduct computer attacks as if they occurred over the Internet and test how well security tools thwart those attacks. - - - - - - - - - - Effects linger from security breach at Interland Some visitors to Web sites hosted by Interland Inc. are still feeling the effects of an Aug. 28 security breach that allowed their systems to be infected with malicious code. Following up on readers' e-mails about the problem, Computerworld today spoke with Jeff Reich, director of security at Atlanta-based Interland. He acknowledged an ongoing problem, but downplayed its significance.,10801,86868,00.html - - - - - - - - - - Cyberterrorism: More sophisticated than past worms No hard evidence exists that shows a cyberterrorism attack on the U.S., but when such an attack comes, it is likely to be much more harmful than the current crop of relatively unsophisticated viruses and worms that have caused billions of dollars in damages, a cybersecurity expert said Monday. Terrorism groups have planned cyberterrorism attacks for years, and those attacks are waiting for a vulnerability to trigger them, predicted Norm Laudermilch, vice president of managed security services for VeriSign Inc. - - - - - - - - - - Fighting Child Pornography In time of intensive global computerization humanity faced plenty of challenges, which have quickly turned into real threats to economic and social well-being. Cybercrime and cyberterrorism can be included in list of threats. A phenomenon of cybercrime is so young as it is not well studied. Being a crime which has transnational nature, cybercrime requires special approaches. Among of such widespread cybercrimes as infringement of the work of computers and computer networks, data theft, Internet fraud, blackmail and extortion, distortion of computer information, it is necessary to emphasize and mark out crimes related to manufacture and distribution of child pornography in the Internet. - - - - - - - - - - Foolish CEOs flunk security test The fourth European IT security conference opened in Amsterdam Tuesday--with a damning indictment of CEOs who fail to understand the value and the costs of security. While cyberterrorism and other fad-threats haven't turned out to be pose the risks which many experts had predicted, the number one source of tech threat remains inside a business itself--its staff and its internal processes, according to Arjen van Zanten of KPMG's risk management business. - - - - - - - - - - Who falls for e-mail scams? It certainly looked like the real thing. Full of eBay logos and links, the e-mail said their accounts were expiring, and theyd better fill out a form quickly or risk losing their current auctions. So they did typing in everything from drivers license numbers to credit card PINs. Since then, thieves have attempted to steal their money and their private information has been posted on the Internet for all the world to see. The lapse in judgment was momentary, but the consequences continue to unfold. Firms warned over scams - - - - - - - - - - Wireless Intrusion Detection Systems Threats to wireless local area networks (WLANs) are numerous and potentially devastating. Security issues ranging from misconfigured wireless access points (WAPs) to session hijacking to Denial of Service (DoS) can plague a WLAN. Wireless networks are not only susceptible to TCP/IP-based attacks native to wired networks, they are also subject to a wide array of 802.11-specific threats. - - - - - - - - - - Web hijacking VeriSign raised the hackles of the Internet community with its surprise decision to take control of all unassigned .com and .net domain names, a move that has wreaked havoc on many e-mail utilities and antispam filters. The company is redirecting domain lookups for misspelled or nonexistent names to its own site, a process that has confused Internet e-mail utilities and drawn angry denunciations of the company's business practices from frustrated network administrators. - - - - - - - - - - Terrorism lends urgency to hunt for better lie detector In a quiet corner of the University of Pennsylvania campus, professor Britton Chance is using near- infrared light to peek at lies as they form in the brains of student volunteers. - - - - - - - - - - Cheaper traffic-signal change devices threaten intersection chaos It's every motorist's fantasy to be able to make a red traffic light turn green without so much as easing off the accelerator. That naughty dream may now be coming true, with perilous implications. The very technology that has for years allowed fire trucks, ambulances and police cars to reach emergencies faster a remote control that changes traffic signals is now much cheaper and potentially accessible. *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2003,, Campbell, CA.