NewsBits for December 30, 2004 ************************************************************ Cabir worm code wriggles onto Web The source code for more versions of the Cabir cell phone virus is now available online, a security company has warned. Sophos said on Wednesday that a 32-year-old Brazilian programmer has published the source code for the Cabir-H and Cabir-I viruses online and said it could be used by virus writers to create their own variants. - - - - - - - - - - Phel Trojan Horse Threatens Latest Windows XP The new Trojan horse program -- dubbed "Phel," an anagram of "Help" -- infects visitors to a malicious Web site through Internet Explorer's Help controls, Symantec warns. The Trojan horse exploits a vulnerability in the way Internet Explorer and Windows XP Service Pack 2 handle help files called from Web pages.,10801,98636,00.html - - - - - - - - - - CYBER CRIMEFIGHTERS: FEDS FIGHTING CYBER CRIME When the Federal Bureau of Investigation implemented the second phase of their reorganization plan in 2003, phase two emphasized the need for allocating special agents to combating cyber crime. According to a Government Accounting Office study, this reallocation involved reassigning away from drug enforcement duties and into counterterrorism, counterintelligence and cyber crime. - - - - - - - - - - Netcraft goes fishing for phishers Netcraft has released an Internet Explorer plug- in that could help people avoid becoming victims of online fraud. The Internet security company heralded the plug-in toolbar, which displays information about the Web sites a surfer is visiting, as a strong weapon against phishing attacks. - - - - - - - - - - Linux distro tackles spam Astaro claims to have added sophisticated spam- blocking features in the latest version of its distribution, but security experts say it's nothing new. The latest version of Astaro Security Linux includes various features that can be optionally enabled to improve spam protection.,39020390,39182853,00.htm - - - - - - - - - - BT has 'Big Brother' wobbles over ID scheme bids British Telecom may not bid for ID card contracts because of concern that its involvement would make it seem like a 'Big Brother' company in the eyes of the public. According to This is London, BT has been talking to consultants and public bodies, including Liberty, in order to gauge how close involvement with the ID scheme would be perceived. - - - - - - - - - - 2004: The Changing Face of Spam Despite government and industry efforts to stop spam, the U.S. remains the world's largest source of unwanted e-mail, which now represents some 90 percent of all Web traffic. Experts see little hope of stemming the tide. - - - - - - - - - - Trojan Horse Christmas Here are some suggestions on how to help your family members safely use that new trojan horse they received under the Christmas tree this year. My wife Denise is really a brilliant woman, probably the smartest person I know. Earlier this year, we went to see the movie Troy, about, obviously, the Trojan War. - - - - - - - - - - Police say cameras will help them monitor Dallas neighborhood Dallas police have joined with private businesses in the city's Deep Ellum entertainment district to watch the area by camera. Dallas police will be able to monitor crowds from 16 cameras on the roofs of three businesses in Deep Ellum. The businesses and police will share the footage via the Internet. - - - - - - - - - - FBI plans to build new case management system from scratch The Justice Departments Inspector General Office has concluded that the FBIs Virtual Case File projecton which the bureau has spent almost $170 million since June 2001wont succeed. Instead, the FBI plans to launch a new case management project named the Federal Investigative Case Management System to replace VCF, according to a draft report from the Justice IG. - - - - - - - - - - Agencies Clash on Fingerprint DB More than three years after the Sept. 11 attacks, the Bush administration has failed to create a unified U.S. fingerprint database because of agency infighting, meaning most visitors to the country still aren't fully screened for terrorist or criminal ties, the Justice Department's watchdog warned Wednesday.,1283,66146,00.html - - - - - - - - - - DHS deploys U.S. Visit at major land entry points The Homeland Security Department has rolled out its virtual border system at the 50 busiest land crossings into the United States, meeting its deadline for doing so by the end of the year. The U.S. Visitor and Immigrant Status Indicator Technology system went live at all 50 land border crossings on Wednesday, Dec. 29, after a phased rollout period, a DHS spokeswoman said. - - - - - - - - - - Snowed-in code blamed for Comair's Xmas flight collapse Aging server software has been blamed for Comair's holiday collapse that left thousands of travelers stranded. Comair last week said that winter storms had affected its computer systems responsible for scheduling flight crews. At the time, however, the carrier - a subsidiary of Delta Air Lines - did not say exactly how inclement weather had brought down its boxes. - - - - - - - - - - XXX, on a small screen near you A slideshow of Playboy photos glides by, to the distinct wah-wah guitar of a 1970s porno soundtrack --all in the palm of your hand. The scenario may not be quite what Apple Computer had in mind for its new iPod Photo music player, but it's almost sure to play out, now that Playboy Enterprises has targeted the device as a distribution channel for its soft-porn empire. This month, the publisher released iBod, a free download for iPod Photo users. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2004,, Campbell, CA.