NewsBits for February 2, 2006 ************************************************************ Japanese man places Internet order to kill father A Japanese has been arrested for allegedly ordering the murder of his wheelchair-bound father by hiring an amateur hitman on an Internet bulletin board, police said Wednesday. Tomitaka Nomoto, 49 and unemployed, had a history of beating his 76-year-old father Tsutomu, said, quoting their neighbors in Matsumoto city of central Nagano prefecture. - - - - - - - - - - Former Boys Club Official Pleads Guilty To Child Porn Charges A former Boys Club official has pleaded guilty to possession and distribution of child pornography. Salvatore Frederick Rubino, 67, of Laguna Niguel was sentenced to 270 days in a work furlough program and must register as a sex offender. - - - - - - - - - - $6 million pirating ring alleged Federal prosecutors Wednesday charged 19 members of an alleged software- and movie- pirating ring with stealing more than $6.5 million in copyrighted material. The group, known among members as RISCISO, is accused of copying and sharing pirated films, software and video games through password-protected sites on the Internet, authorities said. U.S. Atty. Patrick Fitzgerald said the group, founded in 1993, collected a staggering amount of pirated material. On a single server, the group stored more than 23,000 CD-ROMs of movies, songs, games and software, the indictment alleges.,1,4091855.story,10801,108288,00.html - - - - - - - - - - Three cuffed during London raids Kent police and the Federation Against Copyright Theft (FACT) seized 100,000 fake DVDs and arrested three men during an operation yesterday, the BBC reports. Two Chinese men were arrested in Burnt Oak, north London, and another in Peckham, south of the river. - - - - - - - - - - Man caught with more than 150 pirate DVDs A man selling pirated DVDs mistakenly thought he could hide behind a veil of ignorance when a council's officers served him with a notice. The Lambeth Trading Standards officers handed the Chinese trader a notice written in Mandarin and confiscated the counterfeit goods. More than 150 bootleg DVDs were seized from the seller. They were examined and among the haul of pirated new cinema releases were discs depicting child abuse. - - - - - - - - - - Kama Sutra: the final countdown Da-da-da-da, da-da-da-da-daaaa... The destructive Kama Sutra worm has begun thrashing files on infected machines with incorrectly set system clocks. Even though the worm is programmed to first delete files on infected machines on Friday (February 3), its deadline is based on the clock of infected Windows PCs. Finnish anti-virus firm F-Secure says it has already received two reports from users who've had files on their system overwritten by the worm. Fake F-Secure e-mail contains malware,10801,108300,00.html What will happen tomorrow with your PC? Nyxem worm poised to wreak havoc - - - - - - - - - - Verizon wins injunction in spam case Verizon Wireless, the No. 2 U.S. mobile phone service, said on Wednesday it had won a permanent injunction to prevent a Florida company from sending unsolicited text messages to its customers phones. - - - - - - - - - - Lawmakers promise action against phone-record sales House committee members decry practice, but industry warns against haste. Members of a U.S. House of Representatives committee yesterday promised fast action to outlaw the sale of telephone and mobile phone call logs. Lawmakers on the House Energy and Commerce Committee were united in their call to take some kind of action against businesses that sell phone records without the permission of the telephone customer.,10801,108297,00.html - - - - - - - - - - Flood of fakes: Counterfeits inundate high-tech market Counterfeit goods have long been hidden in the back alleys of the business underworld. But now counterfeiting has invaded the high-tech industry so brazenly that scammers are hawking sleek fakes of DVD players, MP3 players and other hot products to potential buyers at trade shows, retail stores and online. - - - - - - - - - - It's Time to Arrest Cyber Crime As the bad guys get ever more sophisticated, even more ambitious efforts to thwart them are needed. Here are some tips. Last year for the first time, proceeds from cyber crime were greater than proceeds from the sale of illegal drugs, according to recent comments by Valerie McNiven, an adviser to the U.S. Treasury Dept. "Cyber crime is moving at such a high speed that law enforcement cannot catch up with it," she says. British businesses not taking cybercrime seriously - - - - - - - - - - IT giants demand action on Chinese web censoring Microsoft and Yahoo look to US government to pressure China. Yahoo and Microsoft have urged the US government to act at an international level to stop foreign governments censoring the online content that their citizens can view and access. Gates warns on the futility of censorship,39020369,39250157,00.htm Microsoft, Yahoo and Google snub China briefing Tech Giants Accused of Bowing to China - - - - - - - - - - Boston Globe in clueless security breach Two Massachusetts papers - the Boston Globe and the Worcester Telegram & Gazette - have apologised after exposing the credit card details of up to 240,000 subscribers. Most of those affected were Globe readers. Information security breaches by major US corporations are becoming an almost weekly event but the breach involving the two papers, both part of the The New England Media Group owned by The New York Times, was especially boneheaded. Giving newspaper readers some credit - - - - - - - - - - Security glitch bites IE7 beta Researchers have discovered a security vulnerability in a preview version of Microsoft's Internet Explorer 7 (IE7) browser just days after its release. A denial of service bug in IE 7 beta 2 creates a means for a hacker to crash the software and potentially execute arbitrary malware on PCs running the code, according to security researcher Tom Ferris.,10801,108279,00.html - - - - - - - - - - Mozilla Plugs Firefox 1.5 Security Gaps The Mozilla Foundation has shipped the first patch for its flagship Firefox 1.5 browser to plug a series of security vulnerabilities and memory leaks. The open-source group has started pushing out Firefox as an automatic update and recommended that all users apply the upgrade to protect against a known denial-of-service bug and several undisclosed security issues.,1759,1918087,00.asp - - - - - - - - - - County courthouse becomes first for high-technology cases The San Mateo County Court was named the first Bay Area courthouse dedicated to high technology cases and other lawsuits deemed complex. By creating a special court just for complex litigation, San Mateo Superior Court is able to proactively address the unique requirements of these special cases and provide the necessary resources, stated Presiding Judge George A. Miram in an announcement of the designation. - - - - - - - - - - Biometrics use to accelerate in 2006 Electronic passports have driven technological improvements in biometrics and will pave the way for greater commercial use of it in 2006, IT services company Unisys predicted. "Traveler security is driving the adoption of biometrics much faster than commercial pressures would have," Terry Hartmann, director of secure identification NIST finalizes biometric specification for HSPD-12 - - - - - - - - - - Malicious Malware: attacking the attackers, part 2 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two. Malicious Malware: attacking the attackers, part 1 - - - - - - - - - - Understanding the Roles of Server 2003 Security Policies Using policy-based mechanisms to secure your systems and network. Windows domains rely on policy-based security mechanisms, but Windows security policy deployment can be confusing to the uninitiated. What's the difference between the local security policy, domain security policy and domain controller security policies? When and how do you use each? How do you use site GPOs and OU GPOs for best security, and how do they all interact together?,10801,108301,00.html - - - - - - - - - - DOJ skeptical of exemptions to a BlackBerry injunction As a potential shutdown of the popular handheld BlackBerry devices and network looms, the Justice Department is still not convinced that government users can be easily exempted from a possible injunction. NTP Asks Federal Judge To Turn Off BlackBerrys - - - - - - - - - - Super Bowl security to use sensor fusion to fight WMD threats The Michigan National Guard will be field testing devices for the U.S. Army. As some 65,000 football fans gather at Ford Field in Detroit Sunday for this years Super Bowl XL, Michigan National Guard troops will be patrolling the stadium and nearby neighborhoods with handheld computers and special sensors tied together in a uniform system to fight terrorist threats.,10801,108304,00.html - - - - - - - - - - Mobile phone tracking, girlfriend stalking and the law A service has launched in the UK which allows you to track any mobile phone around the globe and follow its movements from your own computer. The Guardian ran a feature on it yesterday called 'How I stalked my girlfriend'. It painted a scary picture. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2006,, Campbell, CA.