NewsBits for July 28, 2005 ************************************************************ Local man gets 24 years on child porn charges A federal judge Wednesday sentenced a Mount Joy Borough man to 24 years in prison on child pornography charges. Prosecutors labeled John L. Campbell III, 28, a longtime sexual predator who molested children when he was supposed to be baby- sitting them and compiled one of the largest child pornography collections in Pennsylvania history. - - - - - - - - - - DeRidder teaching couple face 102 child porn charges A DeRidder couple -- both elementary schoolteachers -- have been charged with multiple counts of child pornography after investigators said they found at least 102 images on a computer at the couple's home. Timothy A. Brannon, 33, also was arrested in April and charged with seven counts of molestation of a juvenile and eight counts of sexual battery. - - - - - - - - - - Huge cache of child porn seized in Montgomery This month's arrest of a Montgomery Village man accused of molesting at least seven boys has yielded a collection of child pornography so vast that it likely provided materials for a national or international network, Montgomery County Police said. - - - - - - - - - - Fake Tube safety e-mail spreads London Transport and mobile firms are warning people about an e-mail spreading rapidly containing inaccurate safety information. The message claims that passengers on the London Tube system can contact emergency services via a satellite signal from their mobiles underground. - - - - - - - - - - Wireless hijacking under scrutiny Hotspots are popping up all over the country A recent court case, which saw a West London man fined PS500 and sentenced to 12 months' conditional discharge for hijacking a wireless broadband connection, has repercussions for almost every user of wi-fi networks. - - - - - - - - - - Opera Plugs Three Security Holes Opera Software on Thursday shipped an updated version of its Opera for Windows Web browser to fix a trio of potentially serious security vulnerabilities. The Norwegian company recommends that Windows users upgrade to Opera 8.0.2 to protect against malicious hacker attacks.,1759,1841359,00.asp - - - - - - - - - - The hunt is on for file format bugs New tools could help bug hunters find vulnerabilities in popular file formats, such as the JPEG and GIF image formats. Flaws in how applications handle those file formats are drawing interest among security researchers, according to speakers at the Black Hat security conference here. - - - - - - - - - - Seduced into scams: Online lovers often duped Richie's picture showed a jolly, bearded man curled up on a couch with a cat rubbing his face. "Loving, caring and hardworking," the online dating profile said. When Theresa Smalley received a note from Richie last January asking if she wanted to chat, she was flattered. He seemed cute. The two began exchanging e-mails, friendly at first, but quickly swelling in intensity and passion. - - - - - - - - - - Serious flaws found across range of security tools Serious vulnerabilities have popped up in several popular security software tools in the past few days, namely Sophos Anti-Virus, ClamAV and the network protocol scanner Ethereal. The flaws could allow complete system takeover, according to researchers. - - - - - - - - - - Honeynets expanding their capabilities A global consortium of cybersecurity researchers has released a new tool to make it easier to track and analyze the activities of hackers. The tool, released in May by the Honeynet Project, is a honeynet gateway called "Roo" and is available as a free download. - - - - - - - - - - Windows Vista Security Looks Promising There's some clever stuff in the next version of the Windows client, but we won't really know anything until late next year when lots of people are actually running it. For several years, especially since Windows XP Service Pack 2, Microsoft has been tightening security in Windows and Internet Explorer. It's hard to see at times, but I do think they have been making progress. Nevertheless, with a completely new version of Windows, Microsoft has the opportunity to do some radical things that should help a lot more.,1759,1841242,00.asp - - - - - - - - - - Geeks gather at 'What The Hack' conference There are hundreds of tents on the hot and soggy campground, but this isn't your ordinary summertime outing, considering that it includes workshops with such titles as "Politics of Psychedelic Research" or "Fun and Mayhem with RFID." - - - - - - - - - - We found the body in a server closet, wrapped head to toe in Cat 5 cable Cisco and Internet Security Systems are trying everything short of a ball gag to muzzle researcher Michael Lynn, who sacrificed his job at ISS on Wednesday to tell a hackers conference about a critical vulnerability in the software that powers Cisco's ubiquitous Internet routers. First ISS ordered Lynn to cancel his planned presentation to the Black Hat gathering and remove the supporting documents on the vulnerability and the talk, "The Holy Grail: Cisco IOS Shellcode and Remote Execution," from all copies of the conference's thick book of materials. Cisco kills hacker presentation on its router code Cisco, ISS file suit against rogue researcher Cisco calls in the lawyers over Black Hat hack,39024655,39150822,00.htm - - - - - - - - - - Podcasts can infect your PC You wouldn't think that playing an audio file or a short video clip on your PC could infect your machine with a virus or spyware. But the growing popularity of downloadable files called "podcasts" can do just that. - - - - - - - - - - How to keep data safe when outsourcing offshore As U.S. businesses, policy-makers and security experts work to stem the tide of data thefts, an equal or greater vulnerability lurks overseas -- the level of network and physical security at outsourced operations of U.S. corporations.,10801,103496,00.html - - - - - - - - - - Government Uses Color Laser Printer Technology to Track Documents Next time you make a printout from your color laser printer, shine an LED flashlight beam on it and examine it closely with a magnifying glass. You might be able to see the small, scattered yellow dots printed there that could be used to trace the document back to you.,aid,118664,00.asp - - - - - - - - - - DOD asked to look at centralizing IT Sen. Carl Levin (D-Mich.), the ranking Democrat on the Senate Armed Services Committee, wants to know if centralized information technology spending in the Defense Department would solve its data sharing and system interoperability problems. - - - - - - - - - - Web kiosks to show missing kids Public Internet kiosks are being used as modern-day milk cartons in an effort to find missing children. SurferQuest, a Philipsburg, Pennsylvania-based supplier of about 1,000 computer kiosks throughout the United States, is donating screen space to disseminate photos and information provided by the National Center for Missing & Exploited Children. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.