NewsBits for March 22, 2004 sponsored by, Southeast Cybercrime Institute - ************************************************************ 'Witty' Worm Wrecks Computers A quickly spreading Internet worm destroyed or damaged tens of thousands of personal computers worldwide Saturday morning by exploiting a security flaw in a firewall program designed to protect PCs from online threats, computer experts said. The "Witty" worm writes random data onto the hard drives of computers equipped with the Black Ice and Real Secure Internet firewall products, causing the drives to fail and making it impossible to restart the PCs. Unlike many recent worms that arrive as e-mail attachments, it spreads automatically to vulnerable computers without any action on the part of the user.,39020375,39149459,00.htm,10801,91528,00.html - - - - - - - - - - Federal charges: Man threatened Google Relying on secretly recorded meetings at Google, federal agents this week arrested a Ventura County man for allegedly threatening to release a software program to spammers that he claimed could cost the Internet search-engine company millions of dollars through bogus advertising clicks. Google seeks consensus on personal-info issues - - - - - - - - - - U.S. shuts down Internet 'phishing' scam The U.S. government said Monday it had arrested a Texas man who crafted fake e-mail messages to trick hundreds of Internet users into providing credit card numbers and other sensitive information. 'Phishing' Scams on the Rise,1,5692627.story,39020375,39149467,00.htm - - - - - - - - - - Germany: largest hacker crack down operation ever held On March 18, German law enforcement held the largest operation against homeland hackers. Several people were arrested and around 38 terabytes of pirated software and films seized following raids in Germany, according to a media release from the German Federation Against Copyright Theft (GVU). - - - - - - - - - - RIAA site apparently downed for five days by virus The Web site for the recording industry's anti- piracy lobby has been inaccessible for several days, possibly the victim of a computer virus specifically targeting the site. - - - - - - - - - - BT engineer denies deflowering lesbian BT is investigating claims that one of its engineers had sex with a lesbian student who auctioned her virginity for PS8,400. Weekend press reports said that a 44-year-old BT engineer from South London paid for sex with Rosie Reid, 18, following her online auction. - - - - - - - - - - Phatbot primed to steal your credit card details A Trojan horse-type computer virus called Phatbot can steal credit card numbers and launch denial of service attacks on Web sites. The new virus made its debut on the Internet on Friday (18 March), clogging bandwidth, stealing personal data and initiating denial of service attacks. - - - - - - - - - - Enticing Attachments Spell Trouble Surely most people have gotten the news by now. E-mail attachments can be bad stuff. Click on the wrong file and you could be installing a bug that crashes your system, makes your financial information available to some guy in Russia or commandeers your computer for an attack on some company's Web site. Still, people sometimes have a hard time resisting the urge to click when that strange or unexpected file-bearing e-mail arrives -- even the folks who should know better. Watch out: It's virus season again Close encounters of the viral kind - - - - - - - - - - Scripting flaws threaten Norton software Symantec has released a fix for a pair of potentially troublesome flaws that create a mechanism to turn its Norton security software packages against their owners. - - - - - - - - - - Child porn industry may reach $6 billion in 2004 Internet has exerted a strong catalytic influence on development of child porn. If caught red-handed producers or owners of child porn could face up to 15 years of jail. Nowadays, the anonymity of the Internet and complexity of detection and liquidation of sites scatterred all over the world allow these sites' owners to duck out. - - - - - - - - - - Incorrect signature on e-mail snares professor in Web It's a parody James M. Kauffman said he wished he had written but he didn't, a point that the University of Virginia education professor emeritus has been repeating and repeating. Kauffman's name and title have been circulating under a long-lived e-mail that satirizes the anti-homosexual pronouncements of conservative radio talk show host Laura Schlessinger. The result has been a flood of daily calls and e-mails from people around the world. - - - - - - - - - - Cisco upgrades IOS secure functionality Cisco is strengthening its security play with the launch of new features for its internet operating system (IOS), and the acquisition of a security vendor. - - - - - - - - - - The farce of federal cybersecurity Over the past several years, various Washington entities, from the General Accounting Office to assorted Congressional committees, conducted surveys and issued reports on the state of the federal government's information security posture. In each case, with few exceptions, the findings range from the scathing to the downright embarrassing, and remain essentially unchanged since the mid-1990s. - - - - - - - - - - Stopping the enemy at the gate Over the past few years, security vulnerabilities have spiralled, writes Bloor Research analyst Fran Howarth. The CERT Co-ordination Centre, a federally- funded R&D centre operated by the Carnegie Mellon University in the US, publishes statistics of security vulnerabilities that are reported to it on an annual basis. In 1995, just 171 such incidences were brought to its attention; by 2003, that figure had risen to 3,784. - - - - - - - - - - How Secure Is OS X? What is the big picture when it comes to Apple security? Is OS X safe enough to be a viable contender for running public Web sites and general enterprise applications? - - - - - - - - - - Forensic Analysis of a Live Linux System, Part One During the incident response process we often come across a situation where a compromised system wasn't powered off by a user or administrator. - - - - - - - - - - RFID goes to war Come 2005, radio frequency identification will no longer be an option for the U.S. military. It will be the law. For the Pentagon, RFID systems are part of a major logistics revamp. And the deadline for suppliers to attach RFID tags to many of the goods they ship to the American armed forces is indeed looming. - - - - - - - - - - War games teach data sharing Two computer-simulated exercises showed that U.S. and coalition forces can improve data sharing and train together by connecting their virtual laboratories, said Joint Forces Command officials in statements. Foundation showcases data-sharing network, urges action - - - - - - - - - - Brits Going at It Tooth and Nail First came dogging, an underground swinging scene where couples and sometimes third or fourth parties engage in public sex for an exhibitionist thrill. And now comes "toothing," where strangers on trains and buses and at bars and concerts hook up for clandestine sex by text messaging each other with their Bluetooth-enabled cell phones or PDAs.,1284,62687,00.html *********************************************************** Computer Forensics Training - Online. An intense, 150 hour, instructor lead program that teaches you computer forensics and helps prepare you for the Certified Computer Examiner exam. For more information see; *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.