NewsBits for February 22, 2005 ************************************************************ U.S. makes first arrest for spim A U.S teenager has become the first person to be arrested on suspicion of sending unsolicited instant messages--or spim. Anthony Greco, 18, was lured from New York to Los Angeles under the pretence of a business meeting. He was arrested upon arrival at Los Angeles International Airport last Wednesday.,39020651,39188652,00.htm,1,381679.story - - - - - - - - - - Jury Clears Man of Piracy Charges The former Fox worker's case is the first of its kind taken to trial in California. A federal jury in Los Angeles on Friday acquitted a former Fox Cable Networks consultant of copyright infringement charges that alleged he illegally made movies and software available for downloading from the company's computer network.,1,2734109.story - - - - - - - - - - Former IT manager indicted on computer crime charges The United States Attorney's Office for the Northern District of California announced that the former Information Technology Manager of Creative Explosions, Inc., a Silicon Valley software firm, was indicted today by a federal grand jury on charges that he gained unauthorized access to the computer system of his former employer, reading email of the company's president and damaging the company's computer network. Creative Explosions, Inc., is based in Scotts Valley, California. - - - - - - - - - - T-Mobile to probe Paris' security breach The slinky socialite's latest saga involves highly sensitive details, including phone numbers and personal notes, posted for all to see on the Internet in what could be a case of mobile device hacking. A spokesman for T-Mobile confirmed earlier reports that information from Paris Hilton's star- studded address book has been posted online. "Her information is on the Internet," said Bryan Zidar. "We don't know if it was hacked or if someone got a hold of her password." According to Zidar, Hilton used the Sidekick II, a multi-purposed personal electronic device that uses an online server to store at least some information, including phone numbers. - - - - - - - - - - ID Theft Scam Hits D.C. Area Residents One of the nation's largest commercial information services said yesterday that thousands of Washington area residents were among those whose personal and financial details were sold to fraud artists apparently behind a nationwide identity theft scheme. ChoicePoint (CPS), a personal-information ChoicePoint to rescreen 17,000 customers in wake of personal info breach ChoicePoint Responds to Identity Fraud - - - - - - - - - - Russian police probe cheap downloads site Authorities in Moscow are investigating a Russian website offering cheap music downloads. is accused by a music industry group of offering music for sale without authorisation from rights holders in Russia and internationally. - - - - - - - - - - E-Mailers Pose as Homeland Security Dept. Federal authorities are investigating two e-mail scams, including one targeting families of troops killed in Iraq, that claim affiliation with the Homeland Security Department. The scams "are among the worst we have ever encountered," Michael J. Garcia, director of the department's Immigration and Customs Enforcement bureau, said Friday. (LA Times article, free registration required),1,1439434.story - - - - - - - - - - Former administrator admits having child porn Former Lehigh County Housing Authority Executive Director John Seitz pleaded guilty Friday to one count of possession of child pornography, a prosecutor said. In exchange, prosecutors dropped multiple charges, including a dozen counts each of sexual abuse of children and criminal use of a communication facility, Lehigh County Senior Deputy District Attorney Matthew Falk said. - - - - - - - - - - Singapore to create threat center Singapore plans to spend $23 million over three years to battle online hackers and other forms of cyberattack, government officials said Tuesday. Describing the infrastructure behind the Internet as a "nerve system" in Singapore, Deputy Prime Minister Tony Tan said a new National Cyber-Threat Monitoring Center will maintain round-the-clock detection and analysis of computer virus threats. - - - - - - - - - - Comms, internet ban orders surface in new UK terror law Variants of David Blunkett's 'ASBOs for terror' are set to be unveiled today by his successor as Home Secretary, Charles Clarke, under the banner of "control orders". Musing out loud to Jonathan Dimbleby last year Blunkett envisaged a kind of order that would have a wider application to people suspected of being fellow travellers of terror, perhaps engaged (allegedly...) in "acts preparatory to terrorism", including giving financial support, "doing runners, mule jobs", and "perhaps being able to use computer networks" in a way which could pose a threat. - - - - - - - - - - Net fraud worries U.S. Secret Service Internet fraudsters, motivated by money and armed with sophisticated technology, pose an increased economic threat as they steal private data from companies and individuals, the director of the U.S. Secret Service said Thursday. - - - - - - - - - - Federal effort to head off TV piracy challenged Mike Godwin, the legal director for Public Knowledge, a digital-rights advocacy group in Washington, is a fan of Showtime's new drama series "Huff." So three weeks ago, when he missed the season finale, he decided to download it to his personal computer. - - - - - - - - - - Computerized Voter Abuse Rep. Grace Flores Napolitano of Norwalk never met Gov. Elbridge Gerry of Massachusetts, but his influence has helped determine her political life. Gerry, a founding father of the United States, owes his fame to the derisive word "gerrymander." He was governor in 1812 when one party in the Massachusetts Legislature drafted a contorted legislative district plan drawn specifically to elect that party's representative.,1,1100290.story - - - - - - - - - - Meeting a new challenge In a nearby county, a married man with two children logged onto the Internet and engaged in a conversation with what he thought was a 13-year-old girl. Over time, they became chat partners. One thing led to another, and the man concocted an excuse to take a business trip to the state where the "child" lived. When he got off the airplane, he was identified and arrested by federal agents. - - - - - - - - - - Citizens Advice warns of 'shocking' rogue dialler scams The Citizens Advice Bureau (CAB) has warned net users to be on the guard against "shocking" rogue dialler scams. The UK's free consumer help and advice service says it's seeing an increasing number of cases where ordinary net users have been conned by such scams. OFT in net spam scam crackdown BT sued for blocking suspected 'rogue dialler' numbers - - - - - - - - - - New worms turn up New variants of some old favourites have emerged today, but experts have played down the threat. Several new worms have been spotted in the wild today including a variant of Sober; a variant of Bropia; and a new MyDoom -- taking the total number of variants of that worm beyond 50.,39020375,39188653,00.htm,10801,99936,00.html Cabir worm wriggles into U.S. mobile phones,10801,99935,00.html Wormability formulae weighs malware risks - - - - - - - - - - Worm tries to entice with 'lov ya' message Five years after the world fell victim to the "I love you" virus, a malicous-software writer is trying a similar trick on unsuspecting users. Antivirus company Sophos unearthed the new mass-mailing worm, dubbed Assiral, on Monday.,39020375,39188757,00.htm - - - - - - - - - - Mutant Sober worm spreading fast Security firm intercepts 1,400 copies of latest mass-mailer variant. A newly discovered variant of the mass-mailing Sober email worm is spreading rapidly and has already been spotted in the UK, according to MessageLabs.,39020375,39188759,00.htm,10801,99936,00.html Virus promises Paris Hilton porn - - - - - - - - - - Online dangers increase Antivirus firm McAfee has released the results of its study into "virtual criminology", identifying changing patterns of IT crime and weaknesses that criminal gangs can exploit. Microsoft in quandary over virus security How Serious Is That Security Flaw?,aid,119748,00.asp - - - - - - - - - - Largest hacker group in China dissolves Honkers Union of China (HUC), the earliest and largest hacker group in China and ranking number five in the world, has announced its dissolution and has shut down its website at the same time. Membership FEE of this group was once as high as 80,000. It has drawn both praises and blames as it participated in confronting foreign hackers on numerous occasions. - - - - - - - - - - Small advances made to fight computer crime The head of the state police announced "modest" steps Thursday to bolster the task force that investigates one of Maine's fastest-growing offenses: computer crime. Col. Craig Poulin said a sergeant who now trains recruits at the state Criminal Justice Academy, Glenn Lang, will become supervisor of the Computer Crimes Task Force. - - - - - - - - - - Private-public sector rallies against organized cybercrime Organized crime on the internet is a growing threat but the sky is not falling. That was the general message at a "town hall" event at the RSA Conference Thursday, where law enforcement officials and security executives described the threat of organized crime on the web but expressed confidence that efforts by the public and private sectors to thwart the threat are succeeding. - - - - - - - - - - Terrorists' use of Internet spreads Cyberfraud, ranging from credit card theft to money laundering, is the latest wrinkle in terrorists' use of the Internet. Imam Samudra of Indonesia, who carried out a bomb attack that killed 202 people, peers from his death-row cell. - - - - - - - - - - Security breakthrough kills 'evil twins' Two US academics have promised to dramatically boost wireless networking security using a revolutionary identity authentication system. Unveiled at the annual meeting of the American Association for the Advancement of Science, the 'delayed password disclosure protocol' was created by Markus Jakobsson and Steve Myers of Indiana University. - - - - - - - - - - Four passwords needed to foil hackers Users urged to maintain different passwords for home, work, surfing and banking. Every computer user should have at least four different types of password to securely access websites and work systems, according to the Computing Technology Industry Association (CompTIA). RSA specs to bolster passwords - - - - - - - - - - Handheld Risks Prompt Push for Usage Policies The increasing security risk posed by handheld devices is creating a need for formal policies governing their use in corporate settings, according to IT managers and analysts who attended the RSA Conference 2005 here last week.,10801,99914,00.html - - - - - - - - - - Anti-phishing group expands to address pharming Kim Cameron, an identity expert popular for his "Laws of Identity," reported in his blog that the Anti-Phishing Working Group (APWG) has added pharming to its web site. After praising the Group for not changing its name yet (so what if they do?) he points to a report the Group published on phishing trends for December 2004. - - - - - - - - - - Feds prepare security test The federal government and several international partners will hold a cyber preparedness exercise in November, Homeland Security Department officials said here at the RSA Conference. - - - - - - - - - - Nokia targets firms with smart RFID kit Companies whose employees work out and about could improve their communications by giving their mobile phones RFID-reading powers. Nokia has begun selling a product that turns one of its mobile phone models into a radio-frequency identification (RFID) tag reader.,39020330,39188773,00.htm - - - - - - - - - - CoreStreet releases First Responder CoreStreet officials say they can validate digital credentials in emergency situations in which public-safety and public health employees have no access to a secure network or database of valid credentials. - - - - - - - - - - IT administrators told to get hacking The best way for IT administrators to test their systems is by using hacking tools against them, according to a leading security specialist. The plethora of exploit code available on the web to attack corporate servers should be used as a resource to test computer security. By running such code administrators can judge the efficacy of their defences and make appropriate adjustments. - - - - - - - - - - Legalweek: Law On Cyber Crime Overdue The penal sanction against trespass or breaking and entry cannot hold against an act of hacking into a computer network and unlawfully acquiring proprietary data, writes lawyer MATHEW NGUGI of the inadequacy of Kenya law in fighting cyber crime. Perhaps the most sweeping influence on our lives is that of electronic technology. - - - - - - - - - - Data destruction claims rubbished A charity that supplies refurbished PCs to the developing world has slammed reports suggesting the only reliable way to totally remove data from a hard drive involves a six- inch nail. A charity which reconditions second hand computers for use in the Third World has hit out at media coverage this week which encouraged companies to destroy old kit by driving nails through the hard drive of each computer they discard.,39020351,39188620,00.htm - - - - - - - - - - Thwarting Hacker Techniques: Combating social engineers So, you've got two firewalls, an intrusion prevention system [IPS] and antivirus software deployed, and you're feeling pretty good. Servers are patched, packets are being dropped, you're alerted when network traffic isn't behaving well and viruses are killed on the spot. Yep, life is good! So what's the problem?,289483,sid14_gci1060516,00.html - - - - - - - - - - I'll show you mine if you show me, er, mine Security researchers have developed a new cryptographic technique they say will prevent so-called stealth attacks against networks. A stealth attack is one where the attacker acts remotely, is very hard to trace, and where the victim may not even know he was attacked. The researchers say this kind of attack is particularly easy to mount against a wireless network. - - - - - - - - - - When games get gory A key sequence in "Grand Theft Auto: San Andreas" requires the player to steal a police SWAT team tank, machine gun rival gang members and incinerate employees of a rival crack dealer--all acts covered by the "Mature" rating prominently displayed on each copy of the video game. Legislator seeks to restrict teens' access to video games - - - - - - - - - - The High-Hanging Fruit Now that Microsoft has pruned Windows of its most serious remote-access holes, its high time Redmond fixes the local vulnerabilities too. Last week I watched the webcast of Bill Gates speaking at the RSA conference in San Francisco. He talked about Microsoft's plans to build upon the progress it's already made in security. These plans included better protection against spyware and spam. Gates also announced Microsoft's intention to release Internet Explorer 7, complete with a number of security improvements, by the end of this year. - - - - - - - - - - Smart phones work like train tickets Some 10 million Japanese commuters use smart cards embedded with a computer chip to pay for train tickets and slip by station gates with just a tap of their plastic on special reading devices. - - - - - - - - - - Bloggers unite to help jailed Iranians Campaigners have called on the world's bloggers to help push for the release of two Iranians jailed after expressing opinions online. The Committee to Protect Bloggers, a campaigning organisation, has called on bloggers to take action on Tuesday to help two Iranians who were apparently jailed by the Iranian government after expressing opinions on their blogs.,39020369,39188729,00.htm - - - - - - - - - - Sex offenders' side of debate over database A few days after the first of the year, the Mercury News ran a story about how mothers reacted to the new online database mandated by Megan's Law. It evoked a sharp response among a group you might not count as regular readers, the sex offenders themselves. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.