NewsBits for May 10, 2005 ************************************************************ Cisco Says Swede Detained for 2004 Hacking Incident Cisco Systems Inc. said on Tuesday authorities in Sweden had detained a person for stealing its source code, the basic instructions for the machines that direct Internet traffic around the globe. "We are aware that a person has been detained in Sweden related to the IOS source code theft and are encouraged by this action," the San Jose, California, company said in a statement.,1759,1814520,00.asp,10801,101637,00.html Hacker infiltrated government computers The FBI confirmed Tuesday the accuracy of a New York Times report that software on routers, computers that control the Internet, were compromised last year by a hacker who claimed that he had infiltrated systems serving U.S. military installations, research laboratories, and NASA. - - - - - - - - - - Two Plead Guilty Over Counterfeit Software Two Silicon Valley business owners pleaded guilty Monday to trafficking in counterfeit software valued at more than $500,000 and promised to pay Microsoft Corp. more than $380,000 in restitution. Perry Zheng, 51, of Cupertino, and William Jin, 44, of Sunnyvale, told U.S. District Court Judge Ronald M. Whyte they possessed and sold $531,961 worth of counterfeit Microsoft software. The men sold the programs through PTI Inc., a San Jose-based software distribution business. - - - - - - - - - - Police target PS50m business identity theft scam Police have launched a crackdown on an online identity theft scam targeting businesses registered with Companies House that is estimated to rake in more than PS50m a year. The loophole that allows criminals to access a form on the Companies House website and change the registered office for a limited company without them knowing was highlighted by earlier this year.,39024655,39130275,00.htm - - - - - - - - - - Michigan State says computer security breached For additional information on the security breach, visit the Wharton Center Web site at and scroll down to the "Information Intrusion FAQ." Michigan State University has warned more than 40,000 Wharton Center patrons that a hacker broke into a computer server involved in credit card processing for the performing arts venue. - - - - - - - - - - Alerted by FBI, Serbian police crack down on child pornography A 19-year-old has been arrested in western Serbia for alleged distribution of child pornography through the Internet, police said Monday. Acting on a tip from the U.S. Federal Investigation Bureau whose agents had detected the pornographic content being sent from an Internet user in the Balkan republic, the police found the suspect and seized his computer, "packed with horrendous images," police chief Zoran Djokic said. - - - - - - - - - - Man to face more child porn charges Prosecutors unable to reach a plea agreement with a man facing 17 counts of possessing child pornography have filed an additional 64 charges against him based on evidence gathered for the initial charges. VanPierre Joseph McGreck, 50, 17011U2 N. Third St., first was arrested in January 2003 when police searched his 805 Flieth St. apartment and seized 500 items - pornographic movies, movie clips and still images - from various computer discs. - - - - - - - - - - Sex Offender Arrested on Child Porn Charges Authorities say a convicted sex offender who lives in Spartanburg has been arrested on child pornography charges. The State Law Enforcement Division says 37-year-old Thomas Walter Turner was arrested Friday and charged with two counts each of second and third degree sexual exploitation of a minor. - - - - - - - - - - Sheriff's Investigators say Texoma Nurse Caught with Child Porn A Texoma sheriff's department is on the hunt for a man they believe took advantage of an elderly woman and she might not be the only one. KTENs Rich Klindworth has the details. Marshall County resident Thomas Grady, better known TK, is described as a likable person. It looks like that likeability allowed him to use his position for illegal purposes. - - - - - - - - - - Congress plans scrutiny of Patriot Act Congress is returning to the controversial topic of whether to renew key portions of the Patriot Act. Both the Senate and House of Representatives have scheduled hearings on Tuesday that are part of an extended process of reviewing the portions of the 2001 law that are scheduled to expire on Dec. 31. Many of those 16 portions deal with computer and Internet surveillance. - - - - - - - - - - DHS secure network was rushed IG says The Homeland Security Departments $337 million network for sharing top-secret data was developed in a rush, and as a result is inadequate and does not meet the needs of its users, according to a new report by the departments Acting Inspector General Richard L. Skinner. DHS to lose research exec Congressman calls for more privacy authority at DHS - - - - - - - - - - Cyber law for UAE The UAE is introducing tough new laws to combat cyber crime, legal sources told Gulf News. Included in offences which will attract prison terms and fines are: publishing or downloading pornographic material, using the internet for blackmail, and publishing content that attacks religions or supports terrorist groups. The law is due to be introduced by the end of the year. - - - - - - - - - - 900,000 ISP customers blacklisted More than 900,000 customers of U.K. Internet service provider Telewest have been blacklisted by one of the most powerful antispam groups on the Web. The Spam Prevention Early Warning System (SPEWS), whose blacklist is referenced by many antispam controls, imposed the block in response to the high number of Telewest customers whose machines have become compromised and taken over for the purpose of sending spam.,39020375,39197821,00.htm - - - - - - - - - - MyDoom variant opens backdoor IRC channel Security experts have warned of a newly intercepted worm spreading throughout Europe which allows hackers to take remote control of infected PCs. MyDoom.BQ, also known as Mytob.ED, arrives as an attachment in an email claiming that the user's email system has been "locked" for security reasons. - - - - - - - - - - Virus writers resort to gorilla tactics A newly discovered email worm, dubbed Wurmark-K, displays a picture of an albino gorilla as it infects compromised PCs. Security experts said today that emails carrying the virus as an attachment have a variety of characteristics including subject lines: 'Hehehe LOL!!' and 'Your Photo Is On A Webpage!!'. - - - - - - - - - - Car virus myth debunked Rumours that the Bluetooth systems of cars are at risk from infection from mobile phone viruses have been debunked. Anti-virus firm F-Secure tested a Toyota Prius and failed, despite exhaustive attempts, to infect the car's systems with variants of the infamous Cabir worm, the most wide-spreading piece of mobile code malware to date. - - - - - - - - - - Trio of security holes kick sysadmins in teeth RSA, Ethereal and Smail all need patching. Serious security vulnerabilities have been disclosed in three networking tools found in many enterprises: the RSA Authentication Agent for Web for Internet Information Services; ethereal, a network protocol analyser; and smail, a Mail Transfer Agent. - - - - - - - - - - Apple plugs security hole in iTunes Apple Computer has patched a flaw in iTunes that could open the door to a remote attack on a person's computer. The fix was released as part of the company's iTunes 4.8 update. Earlier versions of the music software have a vulnerability within MPEG-4 file parsing, Apple said in a security advisory. People who access a malicious MPEG-4 file could trigger a buffer overflow exploit, which could then allow an attacker to gain remote control of their computer without their knowledge or crash iTunes. - - - - - - - - - - Microsoft fortifies monthly patches with interim advisories Microsoft opened up a new line of communication to its customers on Tuesday, pledging to provide more authoritative information about incidents involving, and changes to, the company's products that could affect customers' security. Fix in for Windows flaw Microsoft releases patch to fix remote code-execution hole,10801,101643,00.html - - - - - - - - - - Symantec Research Labs Creates New Worm Simulator When a new worm spreads around the world, people want to know if they are protected. How fast is it? How does it spread? A new simulation program developed by Symantec Research Labs not only has the answers, it also provides pictures. Symantec false alert floors Macs How Long Can You Fly Under the Malware Radar?,1759,1814308,00.asp The missing glue in the fight against malware - - - - - - - - - - School Studies Effects of Internet Attacks A new test laboratory at Iowa State University will allow researchers to study how computer networks respond to massive Internet attacks and could lead to breakthroughs in computer defenses and forensics, said a researcher behind the project.,1759,1813648,00.asp - - - - - - - - - - Forensics firms clean up through user ignorance Brief: A data recovery firm says users are failing to heed warnings to back up vital data and are fuelling the information recovery industry. Companies are lining the pockets of information- recovery experts by ignoring warnings and failing to back up data, a data forensics company said on Tuesday.,39020375,39197831,00.htm - - - - - - - - - - PGP goes the whole hog of encryption PGP Corporation has launched a radical overhaul of its PGP desktop security suite aimed at making its products more comprehensive and easier to use. PGP Desktop 9.0, released Monday 9 May, features "automatic operation so email, instant messaging (IM), whole disk, and file encryption are secure without user interaction or training", the blurb boasts. - - - - - - - - - - Google blackout linked to internet infrastructure A brief blackout at internet search giant Google has drawn attention to the creaking addressing system that underpins the worldwide web. The Google search page disappeared from view for about 15 minutes at 2245 GMT on Saturday, and the company's email and online advertising services also suffered disruptions. Some users reported being redirected to an alternative search service called SoGoSearch, but Google has strongly dismissed suggestions that its servers were compromised in any way. Google's Accelerator Breaks Web Apps, Security,1759,1813761,00.asp - - - - - - - - - - IBM Rolls Out Federated ID-Management Software IBM's Tivoli division unveiled federated identity- management and information-access software on Monday that's designed to improve communications among business partners. - - - - - - - - - - Could you introduce yourself ? I'm a security technologist. My career has been a series of generalizations. I started working in cryptography: mathematical security. Then I realized that all the cryptography in the world won't help if the computer is insecure, and all the computer security won't help if the network is insecure. Since then, I have been concentrating more on the social and economic aspects of security, realizing that all the technology in the world won't help if those aren't done right. - - - - - - - - - - OS makers: Security is job No. 1 Look beyond the bells and whistles, and make sure the security's tough. That's the attitude of operating system makers, who aren't just focusing on features such as snazzy graphics and better networking tools when revamping products. Now they're also providing sturdier defenses. - - - - - - - - - - No Real Debate for Real ID Hundreds of civil liberties groups, immigrant support groups and government associations oppose the Real ID Act, a piece of legislation that critics say would produce a de facto national ID card, cost states millions of dollars and punish undocumented immigrants. Yet despite widespread opposition to the bill, it passed through the House last week and is expected to easily pass through the Senate on Tuesday.,1848,67471,00.html - - - - - - - - - - Avoid a man in the middle attack Securing the handshake during a Secure Sockets Layer session (SSL) is vital, since almost all of the security involving the connection is set up inside the handshake. Learn how to secure the SSL handshake against a man in the middle (MITM) attack -- in which the intruding party masquerades as another, trusted source. This article also introduces the concept of digital certificates and how the OpenSSL API handles them. - - - - - - - - - - Call My Cell Why GPS tracking is good news for inmates. Four days ago, Florida Gov. Jeb Bush signed a law slapping child molesters with a minimum prison sentence of 25 years "followed by probation or community control for the remainder of the person's natural life." During such probation, the offender must "be electronically monitored." Grope a 15-year-old, and you'll be wearing a satellite-linked ankle bracelet that tells the cops where you are every minute until the day you die. - - - - - - - - - - Singaporean shuts blog after libel threat A Singapore student said on Monday he has shut down his blog and apologized unreservedly after a government agency threatened to sue for defamation. Chen Jiahao, a 23-year-old graduate student in the United States, told Reuters he closed down his personal Web site after A*STAR, a Singapore government agency focusing on science and research, threatened legal action for what the agency said were untrue and serious accusations. International freedom of speech and media advocates criticized the agency's methods.;?storyID=8422422 *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.