NewsBits for February 1, 2006 ************************************************************ 19 indicted in alleged $6.5 million software piracy plot A federal grand jury indicted 19 people accused of using the Internet to pirate more than $6.5 million worth of copyrighted computer software, games and movies, authorities announced Wednesday. The indictment outlines an alleged plot by defendants across the United States to illegally distribute newly released titles, including movies like ``The Incredibles'' and ``The Aviator,'' and games like ``Tiger Woods PGA Tour 2005.'' - - - - - - - - - - Tycoon charged with computer hacking Matthew Mellon, the heir to a $11.7bn oil and banking fortune, has been charged with a computer hacking offence over his alleged involvement in a snooping, bugging and blackmail ring. Mellon, 41, the estranged husband of Tamara Mellon, the woman behind the Jimmy Choo shoe business, will appear alongside 17 other defendants in court later this month, The Sunday Times reports. - - - - - - - - - - Son of Saudi official arrested on child porn possession -- again The son of a Saudi military official has been arrested on porn charges. Mohammed Abdullah al-Garni, arrested Tuesday at his family's Miami Beach condominium by Secret Service agents, faces three counts of sending, receiving and possessing child pornography on his computer. - - - - - - - - - - FBI Agent: Local businessman had child porn on his computer A Winchester businessman accused of taking a 14-year-old girl from her home in Arkansas and bringing her to Kentucky to have sex with her had sexually explicit images of children on his computer, according to FBI Agent Kasey Gabriel. Gabriel, who testified during a detention hearing in U.S. District Court in Lexington Tuesday afternoon, disclosed that a preliminary forensic examination of a computer belonging to Charles Ray Wise, 38, showed that Wise had images of girls and boys who appeared to be under 14 years old. - - - - - - - - - - Porn spammer pleads guilty Conviction second-ever for transmission of obscene e-mail messages. A California man accused of managing the computer system used to send hundreds of thousands of pornography-related e-mail messages has pleaded guilty to violating a U.S. antispam law.,10801,108267,00.html - - - - - - - - - - Security snafu at Boston Globe exposes subscriber data Bank, credit card information on more than 240,000 people was made public. An apparent attempt to recycle discarded internal reports has ended up in the compromise of credit card and bank number information belonging to more than 240,000 subscribers of The Boston Globe and the Worcester Telegram & Gazette.,10801,108268,00.html - - - - - - - - - - Microsoft security chief attacks government Ed Gibson, Microsoft UK's chief security advisor, has hit out at the lack of effective channels for cybercrime reporting and claimed that better desktop-level protection is the key to effective security. Microsoft UK's chief security advisor Ed Gibson has attacked the government over what he claims is a lack of effective reporting channels for Internet- related crime.,39020330,39250147,00.htm - - - - - - - - - - Kama Sutra worm crashes malware chart Virus authors were hard at work last month creating 2,312 new malware variants - a third higher than December, according to UK-based security firm Sophos. Most of these attacks were financially motivated and designed to steal sensitive information from compromised PCs. Blackmal virus set to delete files Friday Is D-Day for Computer Worm New worm relies on old trick E-mail worm bent only on destruction Kama Sutra suffering starts early for some Old timers still top virus charts - - - - - - - - - - Winamp, Shoutcast exploits released same day An exploit for Winamp that allows remote code execution was released today, less than 24 hours after the release of an exploit for an old Shoutcast flaw. The Winamp vulnerability is made possible through a buffer overflow in a specially crafted playlist file. As playlist (.pls) files may be executed from remote servers with a single click, the possibility for remote code execution is present. - - - - - - - - - - IM new threat vector in messaging Worm attacks increased 1700 percent; e-mail spam remains steady. Worm attacks over instant-messaging networks increased 1700 percent in 2005, while e-mail spam remained constant at about 75 percent to 80 percent of all messages sent, according to an annual report issued by messaging security service provider Postini on Monday.,10801,108263,00.html - - - - - - - - - - Cookie Holes Expose Browsers Security researcher Michal Zalewski has identified an issue related to the manner in which most Web browsers process so- called cookies that he contends may leave many Web sites open to malicious attacks.,1759,1917283,00.asp - - - - - - - - - - Core Duo coming soon to Dell notebooks Apparent specifications for Dell's future notebooks were briefly exposed by Google's search engine Tuesday, before the spreadsheet was removed from a Dell FTP site and from Google's cache. - - - - - - - - - - DHS wants to improve software security The Homeland Security Department wants public comment on two draft documents that are part of a federal program to improve software security, according to todays Federal Register. The documents are part of the Software Assurance Program that DHS created as part of the National Strategy to Secure Cyberspace. - - - - - - - - - - Government suffers another ID Card defeat The House of Lords has voted for further changes to the ID card bill, in an attempt to make the watchdog more independent. The government ID cards bill has suffered two more defeats in the House of Lords after peers voted in favour of further amendments to the proposed legislation.,39020651,39250135,00.htm - - - - - - - - - - Five Ways To Keep Your Google Searches Private The recent news that the U.S. Justice Department has been seeking search data from Google, Yahoo, MSN, and America Online has struck fear into the hearts of Web surfers. Many users are concerned, not because they're done anything wrong, but because they wonder just how much personal information can be gleaned from their on-line searches. - - - - - - - - - - Malicious Malware: attacking the attackers, part 1 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two. - - - - - - - - - - What happens to your e-mail when you die? Or your digital photos, or your Web site domain? How to prepare. The death of a loved one is never easy, but death in the digital age can create knotty problems that add to the anguish. Just ask Roger van Oosten. "My father had a niche Internet business," he says. "When he died last year at 71, he left no provision for the business. I couldn't access his accounts or pay suppliers, and I couldn't shut the business down. - - - - - - - - - - Justice Dept. warns against BlackBerry cutoff Judge told more information needed on plan to exempt government users. The Justice Department urged a federal judge on Wednesday to refrain from any plans to shut BlackBerry portable e-mail service until the government gets more assurances its users will be exempted. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2006,, Campbell, CA.