NewsBits for August 30, 2005 ************************************************************ Zotob and Mytob were originated by Russian hacker One of the two men arrested last week on charges of creating and mailing the Zotob bot worm also authored some, but not all, of the many Mytob worms in circulation, a security firm said Monday. Finnish anti-virus vendor F-Secure identified Farid Essebar, 18, who was arrested by Moroccan authorities, as the author of some Mytobs. Zotob suspects linked to underground network,39020375,39215733,00.htm Zotob arrests throws open trade in compromised PCs Zotob suspect linked to other viruses Zotob worm linked to credit card fraud ring - - - - - - - - - - Stark State Web sites security breached Some Stark State College of Technology students were surprised Sunday night when they tried to check their personal information on the school Web site. The students couldnt access their own grade in sociology, how many thousands they get in student loans, and whether they are on the dreaded academic probation. - - - - - - - - - - Conn. man sells Microsoft source code A Connecticut man known on the Internet as "illwill" pleaded guilty in Manhattan federal court on Monday to charges relating to the theft of the source code to Microsoft Corp.'s Windows operating software, considered among the company's crown jewels. - - - - - - - - - - Spyware creator and his customers indicted The creator and several buyers of a keylogging software package marketed as a means of checking up on loved ones, have been indicted in the US for accessing computer systems without authorisation, the Associated Press reports. Purchasers of the $89 LoverSpy software would send their target a colleague, lover or child a seemingly harmless electronic greeting card. When opened, the card added software to the targeted computer that would record email messages, chat room conversations, passwords and any other computer activity.,10801,104249,00.html - - - - - - - - - - Former Farmington teacher sentenced to prison for child porn A former San Juan College teacher who pleaded guilty to child pornography charges has been sentenced to six years in prison. Forty-two-year-old Joseph Krim was sentenced Monday by state District Judge Thomas Hynes in Aztec. Krim says he never meant to hurt his family by possessing and manufacturing child porn. - - - - - - - - - - Man surrenders on charge of possessing child porn A city man has surrendered to police on a charge of possessing child pornography. Peter Brown, 26, turned himself in Monday morning, police said. Police issued a warrant for his arrest after a local business reported finding some child pornography on Brown's computer. The company was downloading material from Brown's old computer to a new computer he'd bought, police said. - - - - - - - - - - Fort Myers High staffer busted for child porn A Fort Myers High School interpreter for deaf students is jailed on child pornography charges, accused of trying to pay for a tattoo with pornographic images of children. William Allen Lane, 34, was arrested Saturday and accused of transmitting child pornography. He's the second Lee County school employee behind bars on child porn charges, joining bus driver Donald Deverso of Cape Coral, who is accused of using the Internet to view child pornography. - - - - - - - - - - to ban violent porn UK ministers are considering plans to make downloading violent sexual images from the net a criminal offence. Distributing footage depicting rapes or other so-called extreme pornography is illegal (under the Obscene Publications Act 1959) but current laws do not allow prosecution for simple possession. This contrasts with laws on the possession of images of child abuse. - - - - - - - - - - IT draft law deletes hacking in India IT amendment New act seeks to protect unintentional crimes; video, child pornography are new categories. The Expert Committee on Cyber Law set up to amend the Information Technology (IT) Act has deleted hacking from its list of offences. In what IT and legal experts say seems to be a knee-jerk reaction to the recent spate of MMS porn and BPO- hacking cases, the committee has installed video- porn and child porn as two separate entities, both with higher punishments. - - - - - - - - - - GAO: Federal data mining not obeying privacy rules Federal agencies are not adequately protecting citizens privacy when they query databases containing personal information, according to a Government Accountability Office report released today. Data Mining Found to Flunk Privacy Rules Federal data-mining efforts fail to fully safeguard privacy, GAO says - - - - - - - - - - Linux/Unix e-mail flaw leaves systems open to attack Two serious security flaws have turned up in software widely distributed with Linux and Unix. The bugs affect Electronic Mail for Unix (Elm), a venerable e-mail client still used by many Linux and Unix systems administrators, and Mplayer, a cross-platform movie player that is one of the most popular of its kind on Linux.,10801,104260,00.html - - - - - - - - - - HP warns of flaw in network management product Enterprises using a key network management product from Hewlett-Packard Co. may be vulnerable to a serious flaw allowing remote attacks, the company has warned. The problem is in Network Node Manager, an HP OpenView product that carries out auto-discovery, control and monitoring of network devices via the Simple Network Management Protocol.,10801,104257,00.html HP netman product trips over security hole - - - - - - - - - - Vulnerability Flagged in Adobe Version Cue A security flaw was disclosed today in Adobe Systems Inc.'s Version Cue softwarethe second security flaw in the company's software discerned during the last month. The latest flaw was reported Monday by iDefense Inc., a provider of security intelligence to governments and Fortune 500 organizations, based in Reston, Va., near Washington, D.C.,1759,1853785,00.asp - - - - - - - - - - Secunia: Malware may hide behind long names in Windows registry Security experts have found a vulnerability in the Windows operating system that could allow malware to lurk undetected in long string names of the Windows Registry.,10801,104254,00.html Security experts stake out Windows spyware hiding place Latest IE6 vulnerability explored,39020396,39215734,00.htm Home users rush for data protection Is Microsoft skirting the issue? - - - - - - - - - - Sack for workers caught accessing porn PUBLIC servants, including government contractors, caught accessing pornography at work have been warned they will be sacked, under new state government guidelines which confirm bosses can monitor employees' e-mails. The policy backs an edict by Premier Peter Beattie last year that anyone caught deliberately accessing pornography should be sacked.,5936,16429847%255E3102,00.html - - - - - - - - - - Cal State combats thieves in cyberspace Every morning, Thomas Dixon goes into his office at California State University, East Bay, knowing that a million attempts will be made each hour to break into the computer system he is charged with protecting. - - - - - - - - - - Army to better monitor blogs, Web sites Gen. Peter Schoomaker, the Armys chief of staff, wants military leaders to better monitor soldiers Web sites and blogs for the posting of sensitive information that could aid the enemy. Schoomaker said some soldiers, for example, continue to post pictures depicting weapon system vulnerabilities and tactics, techniques, and procedures (TTPs). - - - - - - - - - - UK Gov must meet biometric standards on ID cards Any national identity card introduced in the UK will have to meet new international standards for biometrics. The standards body, BSI, has published a set of four new BS ISO/IEC 19794 standards, covering the science of biometrics, using biological characteristics to identify individuals, according to reports. - - - - - - - - - - Something fishy's going on The Trusted Computing Group is an industry consortium that's trying to build more secure computers. It has a lot of members, although the board of directors consists of Microsoft, Sony, Advanced Micro Devices, Intel, IBM, Sun Microsystems, Hewlett-Packard and two smaller companies that are voted in on a rotating basis. Net Security Plans Sow Confusion - - - - - - - - - - I was a teenage crybercriminal "If one teenager can jeopardise over a hundred Web sites from his parent's house, imagine what groups of seasoned cybergangs can do." In 2004, after months of putting a virtual tail on a hacker who called himself Pherk, FBI agent Timothy Nestor had the guy right where he wanted him. Though unsure of Pherk's identity, Special Agent Nestor was tracking every digital footstep the hacker took as he wreaked havoc on dozens of businesses by shutting down their online storefronts. - - - - - - - - - - Site allegedly exposes British secret agents The U.K. Foreign Office is slamming an anti-secrecy activist who listed online alleged spies and secret agents. New York-based activist JohnYoung named 276 alleged MI6 agents--including former Liberal Democrat leader Paddy Ashdown--on his Cryptome Web site over the weekend. The list claims Ashdown was an MI6 agent in Geneva in the 1970s. - - - - - - - - - - Chinese go mental for nude web chat Pity if you will the poor old Chinese authorities in their fight to stem the tide of internet-provoked social destabilisation. First up, you've got Sister Furong flaunting herself like a two-bit hussy, then there's the thousands of addicts relentlessly gaming themselves into online degeneracy. But it gets worse. One researcher has found that up to 20,000 Chinese regularly log on to chat rooms completely stark bollock naked - a small percentage of the country's estimated 87 million net users, 'tis true, but more than enough to set Beijing alarm bells ringing. Censorware software fails to cut it - - - - - - - - - - Camera Phone Has Life After Theft A New York stock clerk who had his camera phone swiped from his car this month says he was able to peer into the life of the gadget's new owner. The thief evidently didn't realize the copious photos and videos he was taking with the hot phone were accessible through a web account.,1848,68668,00.html *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2005,, Campbell, CA.