NewsBits for July 7, 2005 ************************************************************ Police arrest Chinese hacker in Tokyo Police have arrested a Chinese university student in Tokyo, accusing him of hacking into companies' computer systems to obtain information on their customers. Yu Hua, 27, a student at a private university and resident of Tokyo, is accused of violating the anti-hacking law, the Mainichi Shimbun reported Wednesday. - - - - - - - - - - Two-year sentence urged for German teen who created 'Sasser' worm Prosecutors are seeking a suspended two-year sentence for the German teen who has admitted he created last year's ``Sasser'' computer worm, court officials said Thursday. In closing arguments Thursday, prosecutors asked that Sven Jaschan be found guilty and be handed the youth detention center sentence, which he would have to serve if he committed another infraction in the next three years, court spokeswoman Katharina Kruetzfeld said.,1759,1835015,00.asp Sasser creator likely to get suspended sentence Lawyers disagree over punishment in Sasser trial,10801,103005,00.html - - - - - - - - - - Man in murder-suicide 'over child porn' A MELBOURNE man who killed his mother and then himself was under the mistaken belief that police had found child pornography on his computer, an inquest found today. Darren Pollard, 34, killed his 69-year-old mother by suffocating her with a pillow at the unit they shared in eastern Melbourne in the early hours of January 16 last year, Victorian Coroner Jane Hendtlass found.,5936,15841414%5E421,00.html - - - - - - - - - - Man charged with stealing Wi-Fi signal Police have arrested a man for using someone else's wireless Internet network in one of the first criminal cases involving this fairly common practice. Benjamin Smith III, 41, faces a pretrial hearing this month following his April arrest on charges of unauthorized access to a computer network, a third-degree felony. - - - - - - - - - - Suspected spam supremo Smith seized Suspected spam supremo Christopher Smith, nicknamed the Rizler, will appear in court today after being arrested in a midnight operation at a Minneapolis airport. - - - - - - - - - - Hacker attacks college server More than 27,000 students were informed by e-mail on Tuesday that their Social Security numbers could have been compromised by an attack on the College of Education's server. The server housed information that included student names, addresses, student courses and personal identification numbers. After the intrusion was discovered at the beginning of April, the server was taken off-line and a computer forensic investigation on the incident was started, said College of Education Assistant Dean Gail Nutter. Now, the college no longer maintains student Social Security numbers on its server. - - - - - - - - - - FBI issues computer virus warning An FBI agent issued a warning to computer owners about fraud and a fake e-mail with a link for protection against the Trojan horse program which actually ends up downloading the tool for computer thievery. The e-mail appears to have been sent by Microsoft with a means to download safeguards against viruses and the Trojan horse program, said Agent Chris Campion. - - - - - - - - - - Credit card suit now seeks damages A class action lawsuit filed after millions of credit card accounts were compromised by a data breach at payment processor CardSystems Solutions now also demands unspecified monetary damages for consumers and merchants. The amended complaint was filed on behalf of California credit card holders and card-accepting merchants Wednesday in California Superior Court in San Francisco. MasterCard data breach: Lawsuit demands damages,39024655,39150141,00.htm - - - - - - - - - - Trojan horses gallop into networks An outbreak of Trojan horse programs is hitting networks around the world, an e-mail security company has warned. MessageLabs said it has blocked 54,000 copies of new Downloader Trojans since 6 p.m. PDT on Wednesday. "They are pretty run of the mill--they use e-mail subjects that have been used before," Alex Shipp, a senior antivirus technologist at MessageLabs, said. "But we're detecting them from all over the place.",39020330,39207978,00.htm,39024655,39150134,00.htm - - - - - - - - - - Longhorn locked down to fight hackers Microsoft's forthcoming Longhorn operating system places great emphasis on locking down PCs to prevent unauthorised access to hardware and software, the software giant revealed today. Critical fixes for Windows, Office coming Exploit heightens risk from old Firefox flaw MS Patch Day: 3 Critical Bulletins on Tap,1759,1834925,00.asp - - - - - - - - - - Wide-ranging flaw crashes programs A security flaw in a widely-used data compression technology could put many software programs at risk of attack, experts have warned. The buffer overflow vulnerability exists in the open-source "zlib" component, Secunia said in an alert published Thursday. Using a specially crafted file, an attacker could take control over a computer or crash applications that use zlib, the security monitoring company said. - - - - - - - - - - 'Hunting season' for computer attackers Their anonymous ranks include extortionists who threaten to crash companies' on-line operations. They play with powerful viruses to surreptitiously lift personal data off PCs. And they brazenly wander through electronic bazaars to freely trade stolen information, malicious computer code and access to hijacked networks. - - - - - - - - - - Cybercrime cost about $400 billion McAfee, Inc., the leader in Intrusion Prevention and Security Risk Management solutions, today announced the results and availability of the McAfee(r) Virtual Criminology Report, which examines how a new class of criminals are using the Internet in new, systematic and professional ways to commit illegal acts. According to the findings, information theft is the most damaging category of Internet crime, while viruses have been the most costly for businesses. - - - - - - - - - - Hacking for dollars Hackers have traded fame for financial gain, experts say. In the past, lone hackers defaced Web sites or launched global worm attacks, mainly to gain notoriety among their peers. Today, they use their skills for profit. They hunt for security flaws and find ways to exploit them, hijack computers and rent those out for use as spam relays, or participate in targeted attacks that steal sensitive information from individuals or spy on businesses. - - - - - - - - - - Tech's part in preventing attacks How do you pick out the terrorist in the crowd? That's the problem, underlined by the London explosions, that Pixlogic is trying to solve. The Los Altos, Calif.-based company has created software that uses visual pattern recognition and search technologies to match archived still or video images with pictures gathered from security cameras or other sources. The software can also pick out anomalies--someone walking with a large box, or a truck that keeps coming back to the same spot--in hours of video footage. - - - - - - - - - - Fear of spyware changing online habits Internet users worried about spyware and adware are shunning specific Web sites, avoiding file- sharing networks, even switching browsers. Many have also stopped opening e-mail attachments without first making sure they are safe, the Pew Internet and American Life Project said in a study issued Wednesday. - - - - - - - - - - LANDesk Makes Security Part of Network Management Opinion: Rather than letting users bark for themselves, network managers should take control of security. I have learned that, yes, there is something worse than having all the users on your network download their own anti-spyware applications. It's that the users start running the software, whether they really need to or not.,1759,1834950,00.asp - - - - - - - - - - What to look for in a data encryption product Data represents the lifeblood of any organization. With the right information, companies can improve customer satisfaction, increase the efficiencies of their supply chain, identify market trends and positively affect their bottom line. This is not a new concept, it is a commonly understood fact of business.,,102961,00.html - - - - - - - - - - DHS says US-VISIT program is protecting privacy The Homeland Security Departments program to screen foreign nationals entering and leaving the country is protecting travelers privacy as the program expands, according to a new DHS report. As the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) program expands its capabilities and data sharing with federal law enforcement agencies, it is enlarging the pool of travelers whose personal data is potentially at risk, said Steve Yonkers, US-VISITs privacy officer, in a statement about the programs updated Privacy Impact Assessment. - - - - - - - - - - Jury sends a message in case involving teen's cell use A stunning verdict emerged from a Palmdale courtroom in 2003 that sent a statement about public opinion on cellphone use by drivers, but the case also showed how insurance policies shape the outcome of accident litigation. The jury was considering the matter of an off-duty Los Angeles police officer injured by a 16-year- old driver of an SUV, who made an illegal U turn. (LA Times article, free registration required),1,7752882.story - - - - - - - - - - Big Brother recruits cameraphone users A UK firm today unveiled plans for a service that allows members of the public to send pictures of antisocial behaviour to local authorities using mobile phones. Citizens are being encouraged to take mobile snaps of anti-social behaviour such as graffiti, abandoned cars and fly-tipping where it is possible to do so without endangering their safety. - - - - - - - - - - Blog Bares Sex Offender's Demons Netizens began gathering at the chilling weblog of accused kidnapper Joseph Duncan this week, turning the online journal into both a forum for their rage against the convicted sexual predator and a tribute to his victims. "Thank God and our law enforcement community that you are now permanently behind bars," wrote one anonymous poster, addressing Duncan. "I would have reported you if I had seen this blog earlier," wrote another.,1367,68094,00.html *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.