NewsBits for May 31, 2005 ************************************************************ Israelis Nab Computer Spies Eighteen people have been arrested in one of Israel's largest industrial espionage schemes, police said Sunday, charging that business executives and private investigators used sophisticated software to infiltrate competitors' computers. The investigation implicated a car importer, two cell phone providers and the nation's main satellite television company. Police said they were still sifting through documents and computer files to figure out the extent of the damage, but maintained that victims lost competitive bids and thousands of customers because of the spying.,1848,67684,00.html,39020375,39201340,00.htm - - - - - - - - - - Computer crime: Group of hackers arrested in Russia The investigation of computer crime involving a group of 39 people was finished in Volgograd, Russia. They committed illegal access to computer information protected by law. On September 15, 2004, regional police department filed a criminal case on counts of illegal access to computer information protected by law, Oleg Stepannikov, investigation senior officer told CCRC. Moscow carder arrested - - - - - - - - - - Laptop with credit card info for 80,000 DOJ workers stolen The FBI and Fairfax, Va., police are investigating the theft of a laptop containing the names and credit card numbers of about 80,000 U.S. Department of Justice workers. Gina Talamona, a DOJ spokeswoman, said the laptop was stolen between May 7 and May 9 from the Fairfax, Va., headquarters of Omega World Travel, a travel agency used by the DOJ for its employees.,10801,102146,00.html Laptop lockdown MCI Data Theft Intensifies Encryption Debate,1759,1821333,00.asp - - - - - - - - - - Hacker may have stolen Social Security numbers from Jackson Community College A hacker who broke into the computer system at Jackson Community College may have accessed as many as 8,000 Social Security numbers, the college said Monday. The hacker broke into the system Wednesday. College officials are still investigating but say the hacker may have downloaded employee and student passwords. - - - - - - - - - - One of our disc drives is missing Investment bank UBS has launched an investigation after a disc reckoned to contain sensitive client data went missing. The lost drive held data from the bank's Tokyo share trading division raising fears that confidential trading histories from the bank's corporate clients might be disclosed, The Times reports. Japanese regulators told the paper they took the leak "extremely seriously". Japan's Financial Services Agency was told about the missing disc last week and though its unclear when the disc went missing, theories abound. Used hard drives betray company secrets - - - - - - - - - - July trial for Sasser suspect The German teenager accused of creating the infamous Sasser worm faces a July trial for computer sabotage offences. Sven Jaschan, 19, was arrested in the village of Waffensen near Rotenburg, in northern Germany, on suspicion of writing and distributing the Sasser worm in May 2004. He later confessed to police that he was both the author of Sasser and the original author of the NetSky worm. Jaschan's trial, scheduled last week, is due to begin on 5 July in the juvenile court of the German town of Verden. - - - - - - - - - - Criminals use eBay to sell fake or stolen items A growing number of criminals are using internet sites such as eBay to sell counterfeit and stolen goods, police said yesterday. The warning comes just days after a woman was convicted of selling a fake Louis Vuitton handbag on the auction website. Launched in 1999 in Britain, eBay is now the UK's most visited commercial website. More than 10 million Britons have registered with the site, which offers 50 million items from around the world at any one time. - - - - - - - - - - MasterCard nets 1,400 phishing sites MasterCard International said it has successfully shut down nearly 1,400 global phishing websites 300 operating from Asia Pacific last year through its Operation Stop IT (Identity Theft) campaign. The credit card giant said its success was due to the effective monitoring of phishing activities discovered on the Internet and swift counteraction by Internet service providers (ISPs) and law enforcement agencies. - - - - - - - - - - CIA girds against electronic attacks The CIA is conducting a secretive war game, dubbed "Silent Horizon," this week to practice defending against an electronic assault on the same scale as the September 11 attacks. The three-day exercise was meant to test the ability of government and industry to respond to escalating Internet disruptions over many months, according to participants. They spoke on the condition of anonymity because the CIA asked them not to disclose details of the sensitive exercise taking place in Charlottesville. - - - - - - - - - - New Bagle variants spreading At least three new versions of the Bagle e-mail worm were spreading quickly on the Internet today, according to several Internet security firms. MessageLabs Ltd., which monitors 110 million pieces of e-mail sent per day, found about 145,000 copies of just one of the new Bagle downloader variants, said Maksym Schipka, a senior antivirus researcher at the company. MessageLabs tracked about 4,000 copies of the variant between 7 a.m. and 8 a.m. EDT. That number jumped to nearly 42,000 copies in the next hour and rose to 56,000 copies between 9 a.m. and 10 a.m., the company reported.,10801,102143,00.html Blank virus blanks email In brief It's happened yet again. A new version of the Bagle Downloader is spreading like wildfire via email, according to email filtering firm MessageLabs. MessageLabs has intercepted almost 70,000 copies since the arrival of the virus at lunchtime on Tuesday. The virus appears to have originated from a Yahoo! group. - - - - - - - - - - Hybrid Worm Wave Of The Future A new worm that hit users this week is a perfect example of the future of malicious code, said Panda Software. And that future looks ominous. The worm, dubbed "Eyeveg.d" by Panda (but Bugbear.b by Sophos, Lanieca.b by Symantec) is a sophisticated hybrid that spreads like a worm but conducts Trojan-style actions against the compromised computer. - - - - - - - - - - IM worm lures users to the dark side Users of AOL and Yahoo instant messaging clients have been bombarded with a phishing attack that plays on the current interest in Star Wars. Yahoo users have received messages urging them to try out an online Star Wars game, but are directed to a phishing site which tries to steal log-in details. - - - - - - - - - - Nortel patches flaw in VPNs Nortel Networks customers are being urged to upgrade their virtual private network routers, after a security research company found a serious vulnerability in them. The denial-of-service vulnerability enables hackers to crash IPSec VPN machines using a specially designed UDP packet. NTA Monitor, the company that discovered the flaw, said it would withhold details of the vulnerability because it is so dangerous. More Than a Token Overhaul of the VPN,10801,102041,00.html - - - - - - - - - - Federal ID Act May Be Flawed The new law could actually increase the risk of a person's identity being stolen, critics say. A federal law designed to make it harder to assume someone else's identity may instead have the opposite effect, critics of the measure say. The Real ID Act, attached to a crucial bill for military spending and tsunami relief that was signed by President Bush on May 11, sets new rules for issuing driver's licenses and requires states to share electronic access to their records.,1,5737312.story Cost of ID Cards could triple, plan could breach DRA Panel debates Real ID - - - - - - - - - - Government moves to tackle phishing An update to the UK's fraud laws has been proposed, with online scammers finding themselves in the firing line of the new Bill. The UK government is proposing changes to a fraud law that would mean scammers behind phishing attacks could face up to 10 years in jail. The Home Office has published the government's Fraud Bill in which it suggests a new offence of fraud to close loop holes in the current law.,39020375,39201079,00.htm - - - - - - - - - - Stanford rejects hacker applicants Applicants tried to access school's admissions files. Stanford University's Graduate School of Business has rejected 41 applicants who tried to access an admissions Web site earlier this year in hopes of learning their fate ahead of schedule. School officials said the applicants were given the opportunity to explain why they attempted to gain access to their admissions files before the date when the university was to tell them if they were admitted. - - - - - - - - - - FBI veteran to secure Microsoft Experts have welcomed Microsoft's appointment of 20-year FBI veteran Ed Gibson as chief security advisor in the UK, but warned he will face an uphill struggle to repair Microsoft's battered reputation. Bob Tarzey of analyst Quocirca said Gibson's experience of tackling money laundering, intellectual property theft, fraud and high-tech crime, coupled with being a regular speaker at UK security events, would lend credibility to Microsoft's security efforts. But he added that Gibson would have his work cut out to change users' perceptions that Microsoft systems are rife with flaws. - - - - - - - - - - DISA seeks stronger software for sensitive Defense systems The Defense Information Systems Agency is searching for solutions from vendors, academia and other government agencies to help combat internal threats to Defense networks, systems and data. DISA has issued a request for information for he toolset on Responses are due June 21. - - - - - - - - - - Finding security in a wireless world Front Lines is a guest viewpoint section offering perspectives on current issues and events from people working on the front lines of Canada's technology industry. Marcus Shields is enterprise product manager with Soltrus Inc. The cost- effectiveness and flexibility of wireless ("Wi-Fi") LANs or WLANs offer a seemingly ideal solution to mobile workers. Windows GSM phones get 'unbreakable' encryption,2000061744,39194316,00.htm Ofcom eyes phone slamming breaches Tougher laws planned to combat mobile phone thefts - report - - - - - - - - - - Hardware Security Scheme Works At Net Infrastructure Two small networking companies are collaborating on a new concept for network security. Their idea of inserting a server-based hardware monitor at Layer 3 would simplify many aspects of packet encryption or inspection in traditional TCP/IP networks. - - - - - - - - - - Secure open source desktop gets public funding The DTI is supporting a project to create a secure centrally managed desktop system based on Linux A UK company is using a six-figure sum from the UK government to develop a secure Linux- based desktop operating system.,39020330,39201351,00.htm - - - - - - - - - - Irish college deploys fingerprint scanners It was with a little fanfare of trumpets that St Andrew's College in Dublin today announced it has rolled out a biometric student registering solution which allows the reading of kids' fingerprints without physically storing an image of same. - - - - - - - - - - GAO study of RFID technology, policy seen flawed A recently released Government Accountability Office study of radio frequency identity device security is flawed because it omits discussion of technologies and federal policies in the arena, according to smart-card industry executives. GAO defended the report, saying it relied on information provided by other federal agencies and did not delve deep into individual RFID programs thatthe agencies are implementing. - - - - - - - - - - TiVo-like devices for radio raise piracy fears It's like TiVo for radio, but is it legal? Various devices that enable listeners to record Internet radio streams and then convert them into MP3 files are catching on and making Web radio and streaming services more appealing to the general public. But some legal experts say the recording software may violate digital copyright laws and does little more than promote piracy. - - - - - - - - - - Many unaware of browser-security link: study Many American online computer users are unaware that choice of browser affects Internet security, and few switch browsers even when they know the risk, a Norwegian study said Monday. The Oslo- based browser-maker Opera Software ASA, which touts its own browser as being one of the most secure, released a survey of 2,835 online users in the United States, which indicated that only 51 per cent of what it called the "adult online population" were aware that the type of browser can affect a computer's vulnerability to malicious software, such as viruses and spyware. Security barometer survey - the results are in - - - - - - - - - - Online extortion victim speaks out The founder of NoChex has spoken about how his business survived its Web site being targeted by mobsters. The founder of an online payment system has spoken out about his experience of being targeted by Russian gangsters who threatened to destroy his Web site and his business if he didn't pay them $10,000.,39020375,39201078,00.htm - - - - - - - - - - Insider Threats Mount The recent rash of data compromises at large companies, several of them caused by insiders, highlights the need for IT managers to develop tight internal controls for monitoring and enforcing compliance with corporate data- usage policies.,10801,102102,00.html Sygate Checks Remote Threats,1759,1820335,00.asp - - - - - - - - - - How to crack passwords, and why you should Your network's weak point is often the users and their passwords, and the only way to check the security of your passwords is to try to crack them. Auditing passwords is a worthwhile venture, particularly in an environment that deals with sensitive information. Because systems encrypt passwords when they store them, you really can't properly judge the strength of a password unless you try to crack it.,39020457,39201076,00.htm - - - - - - - - - - AI Seduces Stanford Students Psychologists and salesmen call it the "chameleon effect": People are perceived as more honest and likeable if they subtly mimic the body language of the person they're speaking with. Now scientists have demonstrated that computers can exploit the same phenomenon, but with greater success and on a larger scale.,1284,67659,00.html - - - - - - - - - - Japanese state to restrict sales of violent U.S. video game A state in Japan has decided to ban a U.S. video game from being sold or rented to minors, after officials deemed it harmful and capable of inciting violence. ``Grand Theft Auto III,'' produced by U.S.-based Rockstar Games Inc., was introduced in Japan in September 2003 and has sold about 350,000 copies. It depicts random killing sprees in public places, cars being blown up and other acts of violence that officials fear teens might try to mimic, said Takahito Hayashi, a child welfare official.