NewsBits for August 4, 2005 ************************************************************ Ruling threatens use of undercover agents to trap Internet offenders The practice has become widespread_undercover agents pose as children on Internet chat rooms. When adults strike up online relationships and arrange for sexual liaisons, police are waiting at the rendezvous point with handcuffs and arrest warrants. - - - - - - - - - - Cisco Web Site Hacked, Exposing User Passwords "This is starting to install doubt about Cisco products," said Joshua Wright, deputy director of training for the SANS Institute. According to Wright, any disclosures from the security glitch might lead to leaked information about Cisco's customers. - - - - - - - - - - Man Arrested After Child Porn Found On CD A retired Westport middle school teacher inadvertently left a CD full of child pornography, including what appear to be lewd pictures of schoolchildren, in a computer he borrowed from a neighbor, federal investigators said Wednesday. Paul Held, 67, a former teacher at Bedford Middle School, was arrested at his home in Westport Tuesday on federal charges of possession and distribution of child pornography and is being held without bond. - - - - - - - - - - Justice Dept. effort to eavesdrop on airline passengers challenged Two privacy groups asked the Federal Communications Commission this week to reject a proposal that would give the Justice Department sweeping new powers to eavesdrop on cell phone calls and Internet usage by airline passengers.,1848,68407,00.html - - - - - - - - - - Spammer loses fight for right to spam A company in the US has lost a legal battle with the University of Texas over the institution's blocking of vast amounts of unsolicited commercial email. An online dating service does not have the right to blast unsolicited email at thousands of University of Texas email addresses, a federal appeals court ruled.,39020369,39212016,00.htm - - - - - - - - - - FAA CIO says cybersecurity incomplete govwide Cybersecurity must be the current and future focus of any federal information technology planning, said Dan Mehan, the Federal Aviation Administration's outgoing chief information officer, at an industry breakfast today. You have to start working on preprogrammed continuity of operations planning, he said at the event, sponsored by Input, a market research firm. - - - - - - - - - - It's a bull market for stock spam The volume of stock scam spam has risen, posing a new threat to investors, warns a new study from network security firm Sophos. Though traditional spam categories--medication, mortgage and pornography --continue to dominate, new ones such as stock scams are growing, according to the study, which covered the first six months of 2005. - - - - - - - - - - First potential virus risk for Windows Vista found Virus writers are targeting a new Microsoft tool that will be part of Windows and is set to ship as part of the next Exchange e-mail server release. A virus writer has published the first examples of malicious code that targets Microsoft's upcoming command- line shell, code-named Monad, according to Finnish antivirus maker F-Secure. If the technology is included in Windows Vista, these could be one of the first viruses to target the new operating system formerly known as Longhorn, F-Secure said Thursday.,39020330,39212024,00.htm Hasta la Vista, baby Virus writers have created proof of concept viruses targeting the scripting language behind prototype versions of Vista, the next version of Windows. An Austrian virus writer has published five simple viruses targeting Microsoft Command Shell (MSH), the command line interface and scripting language, in a virus writing magazine. None of these pieces of malware have been named as yet. Patches on the way for Windows flaws IP flaw leaves Windows 2000 wide open - - - - - - - - - - Worms could dodge Net traps Future worms could evade a network of early- warning sensors hidden across the Internet unless countermeasures are taken, according to new research. In a pair of papers presented at the Usenix Security Symposium here Thursday, computer scientists said would-be attackers can locate such sensors, which act as trip wires that detect unusual activity. - - - - - - - - - - JPEG-based virus attack gets closer Security researchers have warned that an infectious JPEG virus could be just around the corner. A virus writer has got close to exploiting a critical flaw in the way Microsoft Windows handles JPEGs. Costin Raiu, the head of research and development for Kaspersky Labs Romania, said on Tuesday that over the weekend a virus writer tried to spread a Trojan by exploiting a known image-handling flaw.,39020375,39212149,00.htm - - - - - - - - - - DNS servers--an Internet Achilles' heel Hundreds of thousands of Internet servers are at risk of an attack that would redirect unknowing Web surfers from legitimate sites to malicious ones. In a scan of 2.5 million so-called Domain Name System machines, which act as the White Pages of the Internet, security researcher Dan Kaminsky found that about 230,000 are potentially vulnerable to a threat known as DNS cache poisoning.,10801,103744,00.html - - - - - - - - - - Cyber tip line educates teens of online dangers The National Center for Missing & Exploited Children has launched an online program directed at teens to raise awareness about the prevalence of online sexual exploitation and to help teens better protect themselves against online predators. The online ads are a second installment in a campaign that began last year focused on internet safety. - - - - - - - - - - Hacker criticises cyber crime laws Gary McKinnon, the UK hacker facing extradition to the US accused of 'the biggest military computer hack of all time', is calling for international computer crime laws to be passed. - - - - - - - - - - Annual hacking game teaches security lessons The weekend-long Capture the Flag tournament stressed code auditing as a measure of hacking skill this year, a move that emphasized more real-world skills, but not without controversy. The game required skills that are also required by both security researchers and hackers, such as ability to analyze attack vectors, understanding and automating attacks, finding new, unpredictable ways to exploit things. - - - - - - - - - - Hacker fear fuels outsourced security spend Complexity of deploying in-house security systems also boosting services. Global demand for outsourced security services is "strong and growing fast", fuelled by increasing fear of viruses, malware, spyware and hacking, combined with the complexity of rolling out security systems in house. - - - - - - - - - - The new threat to Hollywood: Darknets PRIVATE, ENCRYPTED FILE-SHARING NETWORKS SET TO GROW. Fresh from its victory in the Supreme Court Grokster case, Hollywood faces a new Internet threat -- the rise of ``darknets,'' or private, encrypted networks that allow the anonymous exchange of music, movies and other digital files. - - - - - - - - - - ID cards 'were oversold' The Government has admitted that it overhyped the benefits of ID cards. The UK government has admitted that it exaggerated the benefits of ID cards by claiming they would be a panacea for identity theft, benefit fraud and terrorism.,39020651,39212022,00.htm - - - - - - - - - - E-Government think tank launched Representatives from all branches of the UK Government are represented in a group that will be run by Brunel University. A think tank dedicated to e-government issues has had its first meeting. The e-Government Integration and Systems Evaluation (e-GISE) Network, is aiming to identify the challenges associated with e-government, with an initial focus on local authorities.,39020330,39212021,00.htm *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.