NewsBits for May 17, 2004 ************************************************************ Cisco investigates source code leak An unspecified amount of the proprietary source code that drives Cisco Systems' networking hardware has appeared on the Internet, the technology giant acknowledged early Monday. A representative could not confirm, however, that network intruders made off with 800MB of code, as reported by a Russian security group over the weekend. "Cisco is aware that a potential compromise of its proprietary information occurred and was reported on a public Web site just prior to the weekend," said Jim Brady, a spokesman for the company.,10801,93215,00.html - - - - - - - - - - Arrest of Japanese file-sharing developer is a threat A lawyer for a Japanese professor detained on copyright violations for his file-sharing technology called the arrest ``extremely dangerous'' Monday, saying the move threatened the freedom of software creators. Isamu Kaneko, a 33-year-old assistant professor at the prestigious University of Tokyo, was arrested May 10 on copyright-related charges for developing and offering the popular Winny software, which lets people swap movies and video games over the Internet. - - - - - - - - - - Judge replies after porn acquittal An Irish judge acquitted of having child pornography after the case against him collapsed is said to have given his version of events to the government. Judge Brian Curtin was asked by the Irish Government 10 days ago to explain his conduct after he was acquitted of having child pornography on his computer last month. He was found not guilty after it was revealed in court that the search warrant used by police had expired. - - - - - - - - - - Overseas porn investigation leads to Wyoming County A Wyoming County man whose arrest grew out of a child pornography investigation in Croatia is facing at least five years in prison for distribution of sexually explicit images of children. Grant Arthur Lasuer, 61, of RD 2, Box 363, Mehoopany, pleaded guilty Thursday before U.S. District Senior Judge Edwin Kosik to one count each of distribution of child pornography and possession of a firearm by a felon. According to FBI documents filed in the case, Croatian authorities alerted U.S. investigators last year that a man arrested for child pornography there had transmitted photos to e-mail addresses in the United States.\46&rfi=6 - - - - - - - - - - White power website shut Edmonton police have shut down the Internet site of a white power group which advertised last month it planned to expand into Manitoba. According to media reports in Alberta, officers confiscated computer hard drives, Nazi flags and jewelry -- as well as books promoting white domination -- from a home in a suburb of Edmonton on May 7. - - - - - - - - - - Sasser suspect fanclub launches appeal The German teenager fingered as the author of the Sasser and NetSky worms may not be popular among IT professionals, but fans of the accused miscreant have already sprung to his defense and, apparently, opened their wallets. On Wednesday an anonymous post to the Full Disclosure security mailing list announced a new website dedicated to raising money for 18-year- old Sven Jaschan. Bringing Worm Writers to Justice Is No Easy Task,10801,93188,00.html - - - - - - - - - - Softbank customers sue over data leak Japanese outfit Softbank Corp faces being sued after confidential information regarding 4.6m of its punters leaked out in March, according to the Mainichi Daily News. Softbank - which together with Yahoo! operates broadband outfit "Yahoo! BB" in Japan - was the victim of a massive scam to extort billions of Yen from the company. - - - - - - - - - - Crime rings exploit Internet job sites Online job sites like, CareerBuilder and HotJobs have given employers a better way to find workers, but it turns out that crime rings are targeting the sites, too. In a recent scam, for example, credit card thieves found unwitting money launderers through, then left their "employees" on the hook for thousands of dollars in debts and possible criminal liability when the fraud was discovered. - - - - - - - - - - AOL: One billion viruses blocked America Online says it's blocked more than one virus-infected emails since launching a screening programme in April 2003. The Internet service provider, a subsidiary of Time Warner, says it protected each of the company's subscribers from an average of 30 virus attacks.,39020375,39154918,00.htm - - - - - - - - - - Survey: Web users ignore illegal content Surfers don't report illegal material when they come across it on the Net, which may leave ISPs in a difficult position. Internet users aren't up to much when it comes to reporting dodgy content on the Web, research has revealed -- surfers are failing to let the authorities know when they come across content that breaks the law.,39020369,39155002,00.htm - - - - - - - - - - Mac OS X hit with another serious security issue When it rains, it pours. Yet another "highly critical" hole has been found in Apple's Mac OS X operating system, which will allow remote system access by getting someone to visit a malicious website. Lixlpixel has reported a vulnerability dealing with how basic Internet elements are addressed in the OS' help facility that allow arbitrary local scripts to be executed on a user's machine. It is also possible to place files in a known location on a system by asking users to download a ".dmg" disk image file. - - - - - - - - - - Windows XP SP2 poses firewall management test Business users could face complex management challenges to get the most out of the Windows XP Service Pack 2 update due for release in July. XP SP2 will, by default, switch on the Windows firewall, and Microsoft is recommending that users configure the Windows Firewall and use Active Directory to manage configurations of the firewall across large numbers of desktop PCs. Microsoft cracks pirates on Service Pack 2 - - - - - - - - - - Ex-cybersecurity czar blasts Bush's efforts Richard Clarke became a national celebrity in recent months for his criticisms of the Bush administration's handling of the 2001 terrorist attacks. Now the former White House official is extending that criticism to the administration's handling of cybersecurity. - - - - - - - - - - South Korea's cat-and-mouse with piracy Koreans with pirated software have resorted to an old-fashioned method for skirting Microsoft and the authorities. They scram. Recently in a city near Seoul called Incheon, police investigators who were empowered to audit software on PCs snuck in through an office building's back exit, according to a source who worked for an Internet service provider inside the facility at the time. A receptionist immediately began to call all the businesses in the building. New way to combat online piracy Ukraine fighting "pirates" - - - - - - - - - - NIST doing crypto key exchanges at the speed of light The National Institute of Standards and Technology is pushing the speed limit on cryptographic key exchanges on its new quantum communications test bed. The May 3 issue of Optics Express, the online journal of the Optical Society of America, described a demonstration of NISTs quantum key distribution system that delivered usable bits in the form of individual photons at the rate of 1Mbps. EU seeks quantum cryptography response to Echelon,10801,93220,00.html - - - - - - - - - - Symantec takes bite off virus-ID spam Symantec has shown the way for other antivirus firms to finally end the proliferation of false virus notifications, which wrongly identify the source of an e-mail-borne virus and add to the general deluge swamping users' inboxes. - - - - - - - - - - U.S. passports to get ID chips In the near future, Americans returning from abroad will have their faces scanned by cameras at ports of entry, then compared by computer to digitized photos encoded on high-tech chips in their passports for verification. The goal is to prevent known terrorists from entering the country and to make the use of stolen passports virtually impossible. Because such biometric identification incorporates a person's unique physical characteristics, including fingerprint swirls or iris patterns, it is considered the best method yet invented of authenticating someone's identity. (Chicago Times article, free registration required),1,6776428.story - - - - - - - - - - Data Scant for Watchlist Usage Border-control officials, highway patrol officers and airline screeners all now have access to a centralized terrorist watchlist of 120,000 names. But the public knows little about how the list is compiled and used, or how individuals can remove their names if they're wrongfully targeted. The database, known as the Terrorist Screening Center, or TSC, is fed by foreign intelligence compiled by the CIA-run Terrorist Threat Information Center and by domestic intelligence from the FBI.,1848,63478,00.html - - - - - - - - - - Spy vs. Spy Like many small companies, J.B. Racing of Taveres, Fla., depends heavily on its local- area computer network to manage its operations. Earlier this year Dennis King, head of sales and marketing and de facto IT chief for the seven-employee maker of custom auto-racing components, noticed a disturbing problem: Speeds on the company network were dropping.,15114,614397,00.html - - - - - - - - - - Getting Naked for Big Brother Americans are willing to "get naked" for their government if they feel it will make them more secure. That's the conclusion Jeffrey Rosen reached in his new book The Naked Crowd, which explores the willingness of Americans to abandon privacy for perceived security. The book takes its title from the name Rosen gives a high-tech X-ray machine tested in airports after 9/11.,1848,63450,00.html - - - - - - - - - - Busted The arrest of Sasser's author proves bounties work to catch cyber vandals. Now, if the security industry would just stop egging them on ... When Microsoft first announced its "bounty" program late last year, many security experts condemned the initiative as a mere publicity stunt: a marketing tactic designed to distract gullible users from the "real issue" with Microsoft products. - - - - - - - - - - Stop skirting network security Network security has become the thing that keeps executives up at night. With each new security epidemic, such as the recent Sasser worm, the debate over the effectiveness of current security technologies and practices are called into serious question. Even though security is one of the biggest concerns for almost every organization the world over, the number of attacks increases year over year, with each one more devastating than the last. Enterprises plagued by flawed data - - - - - - - - - - TCP/IP Skills Required for Security Analysts Breaking into the network security industry, and finding a job as a computer security analyst can often be a daunting task. A great deal of us who work in the industry started down this path with nothing but an interest in computer security to begin with, and a desire to work in a field that we love. The question of how does one seek employment in this job sector, and more importantly what skills does one really need to have is a question I have been asked many, many times. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.