NewsBits for June 4, 2004 ************************************************************ Wardriver pleads guilty in Lowes WiFi hacks In a rare wireless hacking conviction, a Michigan man entered a guilty plea Friday in federal court in Charlotte, North Carolina for his role in a scheme to steal credit card numbers from the Lowe's chain of home improvement stores by taking advantage of an unsecured wi-fi network at a store in suburban Detroit. Windows XP Bedevils Wi-Fi Users,1282,63705,00.html - - - - - - - - - - Employee accused of selling stolen cell phones online A former cellular phone company employee is facing computer fraud and theft charges for allegedly selling stolen cell phones on an Internet auction site. Paul Richard Cook, 30, of New Llano, was arrested Tuesday on 29 counts of computer fraud and one count of theft, according to Lt. Craig Stansbury, public information officer for Lafayette Parish Sheriffs Office. - - - - - - - - - - Scottish police target Net paedos Scottish police are questioning scores of suspects over alleged child pornography offences following raids across the country yesterday. Several people have been arrested and around 100 are being questioned following a swoop by eight Scottish police forces and the Scottish Drug Enforcement Agency on suspected paedophiles. Thousands of pounds worth of computer kit for reportedly seized from the home and business premises of suspects. Study: Web porn entices far more surfers than search - - - - - - - - - - 'Evil' teacher jailed over child porn An infant school teacher who was caught with almost 100,000 images of child pornography was jailed for seven years today. Martin Taylor, 39, of Hucknall, Nottinghamshire, was described as a "genuinely evil" paedophile, who was leading a double life. His stash of indecent photographs was only discovered when police were called to investigate a blaze at his home in Florence Street. A total of 95,227 images were found, including 16 images of the most serious level of child pornography, Tracey Kirwin, prosecuting, told the court. - - - - - - - - - - Welcome to the new pedophile playground It's possibly a mother's worst dream. To find out someone has sexually abused her child. For Lisa Prewitt, that nightmare is now a reality. Her 8-year-old son was sexually abused by a man he had come to trust. In April, Kentucky State Police arrested Robert Barron Greis and charged him with distributing pornography over the Internet. Police said his home computer contained several thousand pictures of child pornography and more than 130 videos of him involved in sexually explicit acts at his home. - - - - - - - - - - Ukraine: carders As CCRC informed, in Odessa, Ukraine, officers of Organized Crime Department arrested three young men attempting to illegally withdraw big sum of money from the accounts of the world famous bank through an ATM using counterfeit plastic cards. According to initial data, malefactors repeatedly withdrew big sums from accounts by using access to accounts of one of foreign banks, having stolen more than half million USD. "Hackers" withdrew 10-40 thousand USD from accounts of their victims per one time. - - - - - - - - - - Three caught recording 'Tomorrow' Three moviegoers were caught recording the recently released disaster flick "The Day After Tomorrow" with handheld video cameras in U.S. and Canadian theaters, the Motion Picture Association of America said Thursday. Two of the purported camcorder pirates were arrested in theaters in Los Angeles and Canada over the weekend trying to record the 20th Century Fox movie on digital video recorders for resale, and a third fled a Los Angeles theater when he was approached by theater personnel, the MPAA said. - - - - - - - - - - 'Potter-mania' fuels spread of NetSky-P The frenzy surrounding the latest Harry Potter cinematic offering is helping to keep the prevalent NetSky-P worm alive. Almost three months on from the first sighting of NetSky-P back in late March the worm still poses a significant threat. El Reg inboxes are bombarded with hundreds of copies of the worm each day and we're far from alone. AV firm Sophos places NetSky-P as the second most common irritant last month, second only to the infamous Sasser worm. NetSky still dominates virus hit parade Korgo Worm on the Move - - - - - - - - - - Mutant son of MyDoom plans three-pronged attack Virus writers have used code from the infamous Mydoom worm to create a potentially dangerous new Internet worm which uses multiple methods to spread. Plexus-A spreads using three different methods: infected email attachments, file-sharing networks and Windows vulnerabilities (the LSASS vulnerability used by Sasser and the RPC DCOM flaw used by Blaster). The as yet unknown virus authors used MyDoom source code as the basis for creating Plexus, according to an analysis of the worm by Russian AV firm Kaspersky Labs. New worm targets two Microsoft vulnerabilities,10801,93648,00.html Zombie PCs spew out 80% of spam - - - - - - - - - - Cell phone cameras getting day in court--or not The administrative office for the federal judiciary is now deciding whether cell phone cameras should be allowed in courtrooms, a source said Friday, raising the possibility that the popular devices will be banned from yet another place. Recording devices of any kind are usually banned from inside courtrooms. One of the myriad reasons involves protecting the identity of confidential witnesses or of minors accused of crimes. Courtroom personnel fear that cell phones with embedded cameras, not to mention those with both cameras and video recording capabilities, could be put to use without detection. - - - - - - - - - - Zombies may spoil Microsoft's spam plan One of Microsoft's plans to fight the spam epidemic is unlikely to adversely affect spammers or reduce the quantity of spam, according to security experts. Microsoft's chairman Bill Gates has been calling for the IT industry to work together and eradicate the spam problem. About six months ago he unveiled an initiative called Penny Black, which was a method for reducing a spammer's ability to send large volumes of unsolicited e-mails using Hotmail and MSN accounts. ITU to hold spam summit Net Rivals Embrace to Fight Spam,1377,63708,00.html - - - - - - - - - - RIAA wants your fingerprints Not content with asking for an arm and a leg from consumers and artists, the music industry now wants your fingerprints, too. The RIAA is hoping that a new breed of music player which requires biometric authentication will put an end to file sharing. Established biometric vendor Veritouch has teamed up with Swedish design company to produce iVue: a wireless media player that allows content producers to lock down media files with biometric security. - - - - - - - - - - Linksys Wi-Fi router vulnerability discovered Cisco Systems has issued a patch for a security flaw in one of its Linksys routers that could give hackers access to consumers' home networks. Alan Rateliff II, an independent security consultant, on Friday said he discovered a vulnerability in the Linksys WRTS54G 802.11g wireless router. The flaw gives hackers a free pass into the Web-based configuration page of the router when the firewall function is turned off. - - - - - - - - - - Network Associates warms to behaviour blocking Network Associates yesterday announced plans to offer intrusion prevention alongside conventional anti-virus software. The move is something of a watershed for the AV industry with a top-tier vendor acknowledging that conventional AV scanning software alone fails to defend against fast-spreading Internet worms like Sasser and Blaster. Conventional AV technology is inherently reactive and leaves a 'Window of vulnerability' where firms can get hit even if they have the latest AV signature updates, Metwork Associates acknowledges. - - - - - - - - - - IT security faces Olympian challenge If all goes according to plan, the only Trojan Horse causing trouble in Athens this summer will be the one in the Hollywood blockbuster Troy. But with 10,500 computers, 450 servers, 450 Unix boxes, 4,000 results terminals and a predicted 200,000 security alerts a day, the IT organisers face an Olympian challenge of their own. - - - - - - - - - - Vendors, VARs Embrace Endpoint Security It's no secret that remote users are among the most common sources of enterprise attacks. Mobile employees pick up viruses and worms on the road, then infect the corporate network when they access remotely through a VPN or plug in at the office. - - - - - - - - - - Part III: Insider theft and the role of regulation "Truth be told, everything we've done in the area of extrusion prevention is because of industry regulations. The police were useless in our last extrusion event, and we're developing our self- audit and control capability in order to protect our customer records and actuarial data." "We don't invest in extrusion-prevention technology because it's a criminal offense when one of our employee extrudes critical filings. We feel the legal deterrent is sufficient.",,93624,00.html *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.