NewsBits for June 3, 2005 ************************************************************ Bin Laden Trojan quickly constrained A spam e-mail that promises pictures of a captured Osama bin Laden but carries a malicious attachment has failed to spread widely, security experts said Friday. Millions of copies of various versions of the e-mail were mass-mailed on Thursday, representatives from F-Secure and McAfee said. All versions of the message announced that the al-Qaida leader had been seized and included an attachment called "pics" that, when opened, attempted to download a worm to the victim's PC, the antivirus companies said. - - - - - - - - - - S. Korea MSN hack went undetected for days Password-stealing software planted by hackers was active on Microsofts popular MSN Web site in South Korea for days before the worlds largest software company learned about the break-in and removed the computer code. Police investigators and Microsoft specialists are continuing to search for clues to the culprits behind this weeks high-profile computer break-in. More details emerged Friday about the hacking, which targeted subscribers of an online game called Lineage that is popular in Asia. Microsoft admits popular MSN site hacked in Korea MSN Korea hack targeted online gamers - - - - - - - - - - Man indicted on child porn possession charges A Waltham man has been indicted on child pornography charges, more than a year after he ordered a video from a company known to sell the illicit material, a Middlesex District Attorney spokeswoman said. The U.S. Postal Service and the Waltham Police Department had been investigating James Casey Jr. since September 2003, when he ordered the video from a company known to sell and distribute child pornography, spokeswoman Melissa Sherman said. Casey, 35, is charged with six counts of possession of child pornography. - - - - - - - - - - MPAA files new round of swap suits Hollywood studios filed a new round of lawsuits Thursday against individuals accused of trading copyrighted movies online. This is the Motion Picture Association of America's fifth round of suits against individual file-swappers, but the group has not provided details about the number or location of people targeted. New wrinkle in movie swapping - - - - - - - - - - Triple-Barreled Trojan Attack Builds Botnets Anti-virus researchers are sounding the alert for a massive, well-coordinated hacker attack using three different Trojans to hijack PCs and create botnets-for-hire. The three-pronged attack is being described as "unprecedented" because of the way the Trojans communicate with each other to infect a machine, disable anti-virus software and leave a back door open for future malicious use.,1759,1823633,00.asp Experts Warn of Growing Trojan Threat,1759,1823498,00.asp CA details 'remarkably sophisticated' Web attack,10801,102214,00.html Hackers plot to create massive botnet - - - - - - - - - - New Mytob worm poses as IT administrator Another variant of the Mytob worm began wiggling its way into inboxes this week, enticing recipients to open an e-mail attachment that could allow a remote hacker to access and perform commands on an infected machine. Mytob writers could be creating a superbug,10801,102220,00.html - - - - - - - - - - Commwarrior cell phone virus marches on Network security experts F-Secure say there's a relatively simple reason why even the savviest cell phone owners are falling prey to a new virus. Phone owners are duped because the virus, known as Commwarrior, is attached to premium cell phone e-mail known as MMS, which makes incoming e-mail look as if it was sent by someone the victim knows, according to F-Secure's analysis of an interview with a Commwarrior victim in Finland. - - - - - - - - - - Zombie war goes worldwide Give the Federal Trade Commission some credit: It has some marketing skills. "Operation Spam Zombies" got plenty of play recently both because it is a good idea and because the name attracted a lot more attention than it would have if it were, say, "Operation Computer Spring Cleaning." Yawn. Seriously, the FTC had a program a year or so ago called Operation Secure Your Server. I'm sure you recall that. Aside from its attention-grabbing name, Operation Spam Zombies appears to at least have some strategy behind it. - - - - - - - - - - Phishers going after small fry Phishers are widening their net to take in credit unions, according to a new report. While most of the fraud schemes still focus on big businesses such as major banks, smaller financial companies are increasingly being hit said the report, published Friday by the Anti-Phishing Working Group. "Hackers are modifying their attack methods by shifting away from attacking popular or large institutions," the monthly report said. Hilton customers targeted by phishers - - - - - - - - - - N.K. hacking ability matches that of CIA, analyst says North Korea has hundreds of well-trained cyber soldiers and its intelligence warfare capabilities are believed to have reached the level of the U.S. Central Intelligence Agency, a South Korean arms expert said yesterday. Computers are a rarity and Internet access is almost nonexistent for most people in the reclusive country, but Byun Jae-jung, researcher at a state-run Agency for Defense Development, believes that "North Korea is capable of cyber attacks on both the command and control system of the U.S. Pacific Command and the critical infrastructures of the U.S. mainland, such as electric power." - - - - - - - - - - Code-Abiding Porn to Get .xxx Domain The nonprofit organization that oversees Internet addresses has approved a new online neighborhood specifically for pornographic Web sites: the .xxx domain. The Internet Corporation for Assigned Names and Numbers said on Wednesday that it had approved a new "top-level domain" specifically for adult- oriented Web sites that voluntarily agree to adhere to a set of "industry best practices." - - - - - - - - - - Next Anti-Spyware Group Pushes for Standards A group of anti-spyware software makers and public- interest groups is forming a new coalition to define spyware, according to an executive at the Center for Democracy and Technology, which is running the coalition. The Anti-Spyware Coalition, which met for the first time last week, includes leading anti-spyware vendors Aluria Software LLC, Computer Associates International Inc. and Webroot Software Inc.,1759,1823707,00.asp Group seeks spyware's defining moment,39020330,39201805,00.htm - - - - - - - - - - Hack can upgrade XP Home to XP Pro Lite German computer magazine C'T claims that by changing only 2 bytes from the file in Windows's XP Home kit, users can get access to certain functions only avalaible in Windows XP Professional, such as Remote Desktop, User management and enhanced security features. - - - - - - - - - - Google's Long Memory Stirs Privacy Concerns When Google Inc.'s 19 million daily users look up a long-lost classmate, send e-mail or bounce around the Web more quickly with its new Web Accelerator, records of that activity don't go away. In an era of increased government surveillance, privacy watchdogs worry that Google's vast archive of Internet activity could prove a tempting target for abuse.,1759,1823547,00.asp - - - - - - - - - - Two-pronged tech aims to plug data leaks Information security provider Tablus is expected to unveil on Monday a two-pronged approach to stopping leaks of sensitive corporate information. The company has integrated its Content Alarm NW product for networks with Content Alarm DT for desktop computers, which is based on technology picked up in Tablus' recent acquisition of Indigo Security. The package aims to provide a single dashboard to monitor and manage data to prevent it from being copied, printed or transmitted in violation of a company's policies. - - - - - - - - - - Uneasy Rider Ask Jeeves didn't ask before installing a search tool on millions. The unwanted traveler hovers underneath the URL box on my copy of Internet Explorer, just below the invaluable Google toolbar. It's called the MySearch toolbar. It waits silently, begging me to enter a search term so it can whisk me to a page that contains advertising links for companies that paid for placement. - - - - - - - - - - Your E-Mail Is Getting a Reputation Opinion: I hereby declare that DomainKeys has won the SMTP authentication battle. But the war against mail abuse isn't over, and the next stage isn't well-understood. It's taken so long for e-mail authentication to get to this point that you might assume the whole idea had failed and been forgotten. Not true. The really important work has gone on, out of the spotlight.,1759,1823338,00.asp Leader: Spam laws shame the UK,39024655,39130948,00.htm - - - - - - - - - - Entrepreneur's plan for voluntary biometric ID gets first taker Since the federal government began letting select frequent fliers with new high-tech passes speed through airport security checkpoints, one of the biggest complaints has been that the year-old program is too limited to be of much use. Now, a privately run version coming online in Florida could spur efforts to broaden the program -- and boost media entrepreneur Steven Brill's vision of installing such a system across the nation at airports and other security-sensitive locations. - - - - - - - - - - Bushs choice to run Information Sharing Environment draws criticism President Bushs decision to place director of national intelligence John Negroponte in charge of the newly created Information Sharing Environment is a bad idea that will reduce the power of the Homeland Security secretary, a Heritage Foundation scholar said today. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.