NewsBits for November 18, 2004 ************************************************************ Russian fined for virus-writing exploits A Russian member of well-known 29A virus writers group has been fined 3,000 roubles (approximately PS57) after he admitted writing malicious code. Eugene Suchkov (AKA Whale), from the little-known Russian republic of Udmurtia, admitted writing the Stepan and Gastropod viruses. He posted live code for the viruses alongside the source code necessary to create variants onto a number of underground virus exchange websites. - - - - - - - - - - Microsoft accused of destroying e-mails, in court papers unsealed this week, also accuses Microsoft of destroying e-mails crucial to Burst's lawsuit against the software giant even after the trial judge ordered it to retain the documents. - - - - - - - - - - Pedophile actor sentenced An actor from West Orange, who allegedly arranged to meet a 14-year-old boy in Hamilton for sex through the Internet but instead hooked up with a state investigator, was sentenced to six years in jail yesterday in Mercer County Superior Court. Steven Shriner, 43, of Rollinson Street, was charged with third-degree luring, third-degree endangering the welfare of a child, fourth-degree sexual contact and fourth-degree endangering the welfare of a child with pornography. - - - - - - - - - - Pedophile Accused Of Solicitation A 46-year-old pedophile from York County is under arrest for allegedly attempting to solicit two young children. Walter Himmelreich was arrested by Delaware County's Internet Crimes Against Children Task Force on Wednesday. CBS 3 has learned Himmelreich is charged with trying to solicit a seven and 11-year-old girl. Police apparently apprehended him when he reportedly arrived for a planned meeting with the girls in Media, PA. - - - - - - - - - - Website blamed for student suicide A Coroner has condemmed an online suicide guide after a medical student hanged himself following directions on the site. Liverpool Coroner Andre Rebello asked Yahoo! to pull the plug on the Holland-based site, but the company refused. Arwel Davies, 22, was found hanging from a hook on his bedroom door, the Coroners court heard. - - - - - - - - - - Trojan steals banking information Computer Security Experts warns about new Trojan Banker-AJ. With the help of this program fraudsters steal money from the accounts. The most alarmed clients of the banks Abbey, Barclays, Egg, HSBC, Lloyds TSB, Nationwide NatWest, which lost tens thousand dollars. Trojan Banker-AJ was created specially for these banks. Penetrating into PC Trojan does not show itself until users browse web-sites of the banks. - - - - - - - - - - IE in fresh security drama IE is subject to a trio of unpatched vulnerabilities, security firm Secunia warned yesterday. It warns that two of the three unfixed security bugs are on the "critical" list. These "deadly duo" could be exploited in tandem to bypass security features in Windows XP SP2 and trick users into downloading malicious files. - - - - - - - - - - AOL Concentrates On Security Issues With New Software America Online Inc. is releasing a new version of its software today that focuses on increasing online safety and security, which the company hopes will help it hold on to more subscribers. Dubbed AOL 9.0 Security, the latest version of America Online's software will give dial-up and high-speed subscribers free McAfee antivirus software and automatic upgrades. Previously, AOL had charged $3.95 a month for upgrades. - - - - - - - - - - Oracle moves to quarterly patch release schedule Users want a more predictable process for applying security fixes. Oracle Corp. today announced that it is moving to a quarterly patch release schedule in response to user demands for a more predictable process for applying needed security fixes to the company's software. The move comes amid continuing criticism of the company's handling of a recent major security update by analyst firm Gartner Inc.,10801,97625,00.html - - - - - - - - - - ID Theft/Credit Card Protections The Federal Bureau of Investigation wants everyone shopping this holiday season to enjoy purchasing gifts for loved ones and friends without the fear of becoming a victim of credit card fraud, credit card ID theft and financial information fraud. There are plenty of protections you may easily take to protect yourself from the unscrupulous criminal element looking to steal your money. - - - - - - - - - - How the Grinch spammed Christmas Computer security firm says 90 percent of all e-mail will be spam; offers tips to avoid trouble. As the holidays approach, a leading computer security company is warning that during this hectic season consumers are more at risk to be taken advantage of by spammers and Internet-related scams. - - - - - - - - - - Strong network security sales driven by fear Appliances, routers and switches with integrated security selling well. Security has been one of the few growing areas of the networking market over the past two years owing to a combination of fear factors including increased global instability, paranoia and real threats. - - - - - - - - - - New security standards to strengthen SCADA Industrial control systems seen as vulnerable to Internet threats. The security of critical- infrastructure processes, long festering as a thorny issue in securing everything from food and water to energy and transportation, will be getting a boost from proposed standards for industrial controls.,10801,97606,00.html Erecting secure infrastructure,10801,97460,00.html - - - - - - - - - - Air Force turns to Microsoft for network security The U.S. Air Force is drafting Microsoft to help simplify its networks and software contracts, which could improve its computer security and deliver savings of $100 million. - - - - - - - - - - XML security device unveiled Web-services security company Digital Evolution released on Monday an appliance designed to authenticate access into business networks. The company has developed what it calls a virtual private network product specifically designed for applications that use XML and XML-based protocols to format and exchange data. - - - - - - - - - - DHS to upgrade enforcement systems The Homeland Security Departments Immigration and Customs Enforcement agency has issued a task order to Sytel Inc. and EDS Corp. to upgrade several critical systems. Sytel, based in Bethesda, Md., led a team that received a task order under ICEs Starlight contract to carry out the Enforcement Systems Program. The task order includes an initial $6.5 million base year and as many as five option years that could bring the value of the contract to as much as $34 million, EDS said. - - - - - - - - - - Phishing Feeds Internet Black Markets William Jackson never thought he would be grateful for going bankrupt. Nine months ago, the 44-year- old resident of Katy, Texas, got an e-mail message from what appeared to be eBay's PayPal online payment division. It warned him that his account would be suspended unless he updated it with his personal financial data. Catch a Phish: Take The Quiz Phishing Schemes Scar Victims A Brief History of Phishing How to Fend off Phishing - - - - - - - - - - Detection of 'counterfeit reality' becoming a new specialty During the past decade, the DNA technology used to solve crimes and settle paternity suits has become a big business. The federal government alone spent $232 million this past fiscal year promoting the use of a technology that barely existed 20 years ago. Now two information- technology experts with Florida ties are predicting the use of digital forensics to police -- what they call ``counterfeit reality'' -- will soon join DNA science as a growth industry. - - - - - - - - - - Security must be key part of outsourcing When businesses and government departments outsource parts of their technology operations to third-party specialists, IT security needs to be given greater focus, according to analyst firm Meta Group. - - - - - - - - - - The dual firewall approach Firewalls must inspect at the application layer to address today's threats. Each week asks a different expert to give their views on recent virus and security issues, with advice, warnings and information on the latest threats. - - - - - - - - - - Detecting Kernel-level Compromises With gdb This article is intended to outline useful ways of detecting hidden modifications to a Linux kernel. Often known as a rootkit, this stealthy type of malware gets installed in the kernel of an operating system and requires special techniques by Incident handlers and Linux system administrators to be detected. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.