NewsBits for February 16, 2006 ************************************************************ Nasa hacker case adjourned over extradition fears A UK judge will not allow Gary McKinnon to be extradited unless the US can guarantee he won't be subject to its anti-terrorism laws. Gary McKinnon, the UK citizen accused of hacking into computer systems run by Nasa and the US military, will not be extradited across the Atlantic to face trial unless the US can guarantee that he won't be treated as a terrorist.,39020651,39252962,00.htm - - - - - - - - - - Security Breach Reported in N.H. Computers New Hampshire's state computer system was breached, possibly by a hacker seeking residents' credit card numbers, Gov. John Lynch said Wednesday. The breach involved online and in-person transactions in various locations, including motor vehicle offices and state liquor stores. - - - - - - - - - - U.S.: Kumar altered computer Prosecutors say former CA chairman and other defendant tampered with possible evidence Former CA chairman and chief executive Sanjay Kumar and another CA executive obstructed justice by attempting to erase evidence from computers after the federal government began investigating accounting fraud at the software company, prosecutors say in a letter to defense attorneys.,0,3363165.story - - - - - - - - - - Keith's actor faces child porn charge The mutton-chopped actor best known as the beer- obsessed spokesman for Alexander Keith's has been arrested in Toronto for allegedly downloading child pornography. Robert Norman Smith, 40, turned himself in at Toronto Police's 53 Division yesterday following an undercover investigation that resulted in a search warrant being executed at his residence on Tuesday. - - - - - - - - - - Hazleton police detail child porn sting operation, arrest A sting operation led by Hazleton police last week caught a child pornographer by surprise, a detective in the case said. A federal grand jury in Scranton handed down an indictment Tuesday against 61-year-old Jeffrey Boyd, of Rochester, N.Y., for allegedly taking pornographic pictures of a 6-year-old Hazleton girl. - - - - - - - - - - Visitor arrested over child porn A GERMAN man who allegedly tried to import child pornography had been arrested at a Melbourne airport, Customs said today. The 35-year-old's bags were searched at Melbourne International Airport on Tuesday after he arrived on a flight from Cambodia, Customs said. "During the examination, a laptop computer and a quantity of photographs, film negatives and DVDs were located," The Australian Customs Service (ACS) said today.,7034,18167573%255E1702,00.html - - - - - - - - - - Congressman wants retailer ID'd in data breach In nearly identical letters to the chief executives of Visa USA and MasterCard International, Massachusetts Rep. Barney Frank said a company responsible for security systems that are breached should be the one to notify customers, or should be identified publicly as the party responsible for the breach. - - - - - - - - - - Lawmakers try again to ban Net gambling More than 100 lawmakers in the House of Representatives introduced a bipartisan bill Thursday to outlaw the $12 billion Internet gambling industry. "The explosive growth of the Internet has provided a means for gambling operations to evade existing anti-gambling laws," said Rep. Rick Boucher, a Virginia Democrat. "These Internet gambling Web sites typically operate offshore and often serve as a prime vehicle for money laundering and other criminal enterprises." - - - - - - - - - - Net censorship angers House High-tech execs get an earful over China policies. Halfway through an extraordinary congressional hearing Wednesday about the role of U.S. high-tech giants in censoring the Internet in China, Rep. Tom Lantos tried to cut through all the legalese. Net Firms Faulted on China Actions,1,3884097.story China defends right to police Internet - - - - - - - - - - FBI warns on international cyber-criminals Hacker hunters need to develop new techniques to take on the latest generation of cyber criminals. That's according to FBI Director Robert Mueller, who told attendees of the RSA Conference 2006 that the FBI increasingly had to deal with organised groups of criminals, operating across international borders. FBI chief asks valley for help FBI chief wants stronger partnerships Panel: Security companies in demand - - - - - - - - - - Fraudsters ready with "a scam for everyone" Pyramid schemes, lotteries, phishing or 419 - which will target you? Younger, more affluent consumers are just as likely as vulnerable, older consumers to be targeted by scammers. Research from the Office of Fair Trading (OFT) shows that nearly half of the UK population - or 20 million consumers over the age of 15 - have been targeted by a scam. Pyramid schemes, lotteries, phishing or 419 scams are often spread through websites and emails.,39024655,39156510,00.htm Tips & Tweaks: Avoid viruses and phishing scams,10801,108720,00.html - - - - - - - - - - OS X proof-of-concept Trojan appears A new proof-of-concept Trojan for Apple's OS X computers has appeared. While neither a virus nor the first appearance of malicious code on Mac OS X, the incident is receiving major attention from the Apple community. OS X Trojan appears 'First' Mac OS X Trojan sighted Apple hackers encounter a poetic warning - - - - - - - - - - Homeland Security Spells Out Coming Online Threats The top Internet threats for 2006 will include more attacks through instant messages and cell phones, as well as a boost in identity hacks against online brokerage accounts, the Department of Homeland Security and the National Cyber Security Alliance predicted Wednesday. Homeland Security official suggests outlawing rootkits At least when it comes to such mishaps as the Sony BMG Music Entertainment fiasco, that's what an official from the Department of Homeland Security suggested Thursday. Locking down America's Net defenses - - - - - - - - - - Bits and Bytes to Fight Child Pornography European forensic scientists have developed a state-of-the-art computer program to help track down child victims of sexual exploitation on the Internet. The prototype program, which took just a year to develop, can apparently discriminate between the faces of children, youths, and adults with great precision. Dr. Stefanie Ritz-Timme of the Institute for Forensic Medicine in Dusseldorf helped create the software and said it is the first of its kind.,2144,1906159,00.html - - - - - - - - - - Windows Intruder Detection Checklist This document outlines suggested steps for determining whether your Windows system has been compromised. System administrators can use this information to look for several types of break-ins. We also encourage you to review all sections of this document and modify your systems to address potential weaknesses. Attack code out for latest Microsoft flaw Ending Microsoft's identity crisis - - - - - - - - - - Windows Network and Host-based Anti-Reconnaissance Arxceo has announced an OEM licensing agreement with Port80 Software. Port80 Software will bundle the Ally ip100 and Ally IP1000 appliances, which mask TCP/IP network signatures from detection, with the company's leading ServerMask software, a Microsoft IIS Web server module that obscures the identity of a Windows Web server from potential hackers at the HTTP level. - - - - - - - - - - Firms: Don't expect federated IDs soon Banks and analysts have seen the adoption of two-factor authentication driven by federal requirements and early adopters, but warn users that their pockets might be filled with dongles and smart cards because a universal access token is years away. - - - - - - - - - - Utility hack led to security overhaul Apprehending a notorious hacker rarely involves a car chase or a team of dedicated private investigators, but in the case of Vitek Boden, life imitated a Hollywood script.,10801,108735,00.html - - - - - - - - - - Security Not Top Of Mind For CEOs; That's Where Cisco Comes In In RSA Conference keynote, CEO Chambers says Cisco will leverage its central role in corporate networks to become a primary provider of security management technology. Security Risk Management: The Answer to Security Security industry M&As under the spotlight,39024655,39156501,00.htm Is It the End of the Security World as We Know It?,1759,1927517,00.asp Enterprise WLANs add 3rd Party Security - - - - - - - - - - OASIS stamps approval on WS-Security 1.1 A standards body on yesterday gave final approval to a security specification that is recognized as a foundation for securing distributed applications and Web services.,10801,108731,00.html - - - - - - - - - - GAO: Security, privacy controls threaten U.S. Visit The Homeland Security Department has been so slow in assessing and testing basic system security and privacy controls for the U.S. Visitor and Immigrant Status Indicator Technology that it may be jeopardizing the success of the program, according to a new report from the Government Accountability Office. - - - - - - - - - - Is Google Desktop 3 a threat to data security? Here's two IT pros who certainly think so... Google Desktop's new search-across-computers feature could put sensitive data at risk and violate US federal data-privacy regulations, according to IT administrators at a public university and a large manufacturing company. Both are banning it from their networks.,39024655,39156523,00.htm - - - - - - - - - - Is Skype a wiretap killer? Even as the U.S. government is embroiled in a debate over the legality of wiretapping, the fastest-growing technology for Internet calls appears to have the potential to make eavesdropping a thing of the past. Skype, the Internet calling service recently acquired by eBay Inc., provides free voice calls and instant messaging between users. - - - - - - - - - - CIO Jury: Will biometrics replace passwords and PINs? The 'eyes' have it as IT bosses give fingerprint and iris scanning the thumbs-up. Iris and fingerprint-scanning technology will replace passwords and PIN numbers as the long-term answer to identity management problems, according to UK IT chiefs.,39024655,39156520,00.htm Driver's license or national ID card? - - - - - - - - - - awardees focus on info-sharing By making state and local sex-offender information available and searchable through a single portal, the Justice Department made it easier for the public to determine whether registered sex offenders live in their neighborhoods. *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2006,, Campbell, CA.