NewsBits for November 23, 2004 ************************************************************ Tasin worms ate my Windows files Security experts have issued a warning over the newly intercepted A, B and C variants of the Tasin worm, which have begun to spread rapidly by email. The malicious worms use social engineering tricks to distract users while they are sent out from infected computers before deleting large number of system files. - - - - - - - - - - New Sober variant spreading A new version of the Sober e-mail worm started spreading in Europe last week, according to antivirus software vendors, which have given the worm a midlevel threat rating. By the end of the workday in Europe, the worm had spread to North America and was propagating there as well, said Marius van Oers, an Amsterdam-based antivirus research engineer at McAfee Inc.,10801,97818,00.html - - - - - - - - - - Lawmakers OK anti-piracy czar Buried inside the massive $388 billion spending bill Congress approved last weekend is a program that creates a federal copyright enforcement czar. Under the program, the president can appoint a copyright law enforcement officer whose job is to coordinate law enforcement efforts aimed at stopping international copyright infringement and to oversee a federal umbrella agency responsible for administering intellectual property law.,39020651,39174753,00.htm - - - - - - - - - - Pornographer sues Google A California-based pornographer said Monday it has sued Google Inc., alleging that its Internet search engines are illegally allowing people to view hijacked versions of its nude photos and to access its Web site with stolen passwords. - - - - - - - - - - Better hackers behind attack boom: Verisign Security events in the third quarter jumped 150 percent over the same period last year, fuelled by more sophisticated hackers writing better code who are more interested in dollars than creating computer disasters, according to internet security firm VeriSign. VeriSign's three times a year Internet Security Intelligence Briefing (ISIB) analyses data collected from the services it provides its customers, such as SSL digital certificates, domain name system (DNS) services, and fraud protection. - - - - - - - - - - Java flaw could lead to Windows, Linux attacks A flaw in Sun Microsystems' plug-in for running Java on a variety of browsers and operating systems could allow a virus to spread through Microsoft Windows and Linux PCs. The vulnerability, found by Finnish security researcher Jouko Pynnonen in June, was patched last month by Sun, but its details were not made public until Tuesday. Security information provider Secunia posted information about the flaw in an advisory that rated it a "highly critical" threat. - - - - - - - - - - Microsoft investigates 'download warning' flaw Microsoft has said it will take "appropriate action" to fix a problem in Internet Explorer and Windows XP SP2 that allows a malicious Web site to bypass the browser's warnings when downloading potentially harmful content. - - - - - - - - - - UK police face increasing pressure from high-tech crime Chief police officers say that fighting high-tech crime is one of the factors contributing to a shortfall of PS350m needed to fund police work effectively in the UK. Police forces are facing a PS350m shortfall in budgets as chief police officers are struggling to juggle funds because of new responsibilities, such as fighting cybercrime.,39020375,39174876,00.htm - - - - - - - - - - 'Tis the season for phishing scams Survey: Scam e-mails might deter online shopping Confused consumers who can't tell real electronic shopping Web sites from fake ones might shun holiday shopping online this year, according to a new survey by MailFrontier Inc. In the study, 29 percent of Internet users indicated they would avoid shopping online this holiday season due to the rise of e-mail scams, the company said. Automated phishing on the rise Phishing--who's taking the bait now? - - - - - - - - - - Pressure group condemns 'blood-soaked' PC games Grand Theft Auto and Halo 2 on list of 'inappropriate' Xmas gifts for kids. Fears that parents and grandparents may unwittingly buy violent or sexually explicit computer games for youths this Christmas have prompted a coalition of US pressure groups to compile a warning list of the world's most violent games. - - - - - - - - - - ID cards unveiled in Queen's Speech The government is to press ahead with its plans for biometric ID cards and a UK equivalent to the FBI. Legislation for national ID cards and the UK's version of the FBI were the key planks of the Queen's Speech today, which promised "security for all".,39020375,39174875,00.htm - - - - - - - - - - SSH and ssh-agent No one likes typing passwords. If people had their way, computers would simply know who they were and what they should have access to without us proving it at every turn.[1] In my last article I showed you how to create SSH Identities/Pubkeys, which can be used as an alternative to password authentication. However, I then went right back and told you to passphrase protect them, so now you were substituting one password for another, seemingly gaining nothing. - - - - - - - - - - Court Documents Not Fit for Web? Court records are presenting a tricky challenge for open-government types and privacy advocates. In most parts of the country, people can drive to a courthouse to view all types of records. But should those same records -- which include medical histories, divorce records, arrests -- be online in the age of omniscient search engines and identity thieves?,1848,65703,00.html - - - - - - - - - - Year of the global malware epidemic - Top ten lessons 2004 is set to become the worst year on record for malware variants and their hybrids as vulnerabilities in Microsoft Windows are exploited within days of being posted on the internet. Witness the latest and ongoing Bofra malware episode, which is a hybrid of the MyDoom family. There is evidence to show that malware writers are learning from each others' code and refining carrier vectors continuously based on live-tests within the internet environment. - - - - - - - - - - Pentagon official: We need new security technologies For the nation's security agencies to realize their vision of a secure America extending well beyond its borders, the private sector must deliver an array of new and existing security technologies, a top Defense Department official said Tuesday. "To win the war on terror, we must look to our private sector, specifically our high-tech industry," Paul McHale, assistant Defense secretary for homeland defense, told a homeland security conference sponsored by E.J. Krause and Associates. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.