NewsBits for February 20, 2006 ************************************************************ Political hacking scandal hits Hungary A "Watergate-style" political scandal has broken in Hungary after the opposition party was forced to admit an over-zealous intern was responsible for hacking into the servers of the governing party. Fidesz said the hack against the systems of the ruling socialist party, ahead of the April general elections, was not sanctioned by the party's leadership but, nonetheless, conceded it was a serious breach of electoral etiquette. - - - - - - - - - - U.S. Navy Petty Officer Charged With Computer Pornography Investigators with the Florida Department of Law Enforcement's Computer Crime Section, the Tallahassee Police Department and the U.S. Department of Defense Criminal Investigative Service ended a two-month investigation Friday afternoon with the arrest of a U.S. Navy Petty Officer 1st Class. William Miles Clarke of Jacksonville, 41, was charged with one count of computer pornography -- a third-degree felony. - - - - - - - - - - Worker suspended in computer probe At risk: Security of state credit card data A state Office of Information Technology worker was placed on paid leave yesterday in connection with the investigation of a potential security breach to a state computer server. - - - - - - - - - - Authorities say many teens at risk on social Web sites On, teenagers can find kindred spirits who share their love of sports, their passion for photography or their crush on a Hollywood star. They can also find out where their online friends live, where they attend school, even what they look like. And so can adults. - - - - - - - - - - Cyber bank robbers threaten ecommerce Bank account plundering Trojans on the rise... Cyber criminals are surfing into online banks with you to steal your money. Password-stealing Trojan horses used to be all the rage. The software would nestle itself on a PC after opening a bad email attachment or visiting a malicious website. But in response to the increased adoption of stronger authentication, cyber criminals are changing their tactics, according to Alex Shipp, a senior antivirus technologist at MessageLabs.,39024655,39156580,00.htm,39020375,39253433,00.htm Invasion of the Computer Snatchers - - - - - - - - - - US seeks to tighten web gambling laws US politicians have launched a fresh bid to stop overseas internet gambling websites reaching American web users, according to the BBC. The new bill being introduced in the House of Representatives aims to extend existing laws which ban interstate telephone gambling. UK gambling firms say no to Italian ban - - - - - - - - - - Google keeps up porn probe battle The search giant is refusing to hand over a week's worth of search terms, and accuses the US Justice Department of being both cavalier and uninformed. Google lashed out at the US Justice Department on Friday, saying that a high-profile request for a list of a week's worth of search terms must not be granted because it would disclose trade secrets and violate the privacy rights of its users.,39020369,39253431,00.htm Google rejects DOJ bid for search info,10801,108843,00.html - - - - - - - - - - OMB provides sample HSPD-12 privacy reports The Office of Management and Budget late last week reminded CIOs to complete privacy impact assessments and a number of other related documents before issuing credentials under Homeland Security Presidential Directive 12. - - - - - - - - - - Hackers on the trail of Microsoft patches Hackers have released software that could be used to take over Windows PCs that lack the latest Microsoft security patches. But while this code is dangerous, security experts said Friday that it had yet to be used by attackers in any widespread way. Microsoft's February security bulletins,39020396,39253557,00.htm Microsoft reveals piracy battle plan for the UK - - - - - - - - - - Another OS X worm unearthed A second piece of Mac OS X malware has emerged within a week - albeit a worm that poses a very limited threat. Security software maker F-Secure describes Inqtana.A, a Java- based "proof of concept" worm that exploits a vulnerability in Bluetooth on some Macs that haven't been updated with Panther and Tiger security patches. - - - - - - - - - - Google admits Desktop security risk Businesses have been warned by research company Gartner that the latest Google Desktop Beta has an "unacceptable security risk". Google Desktop allows indexing and searching of PCs' hard drives, and sharing of information through a feature called Search Across Computers. This enables users to search for information within a network such as an intranet.,39020330,39253447,00.htm Gartner warns firms to lock down Google Search - - - - - - - - - - Linux worm turns on Mambo and PHP Security experts today warned of a Linux network worm that exploits holes in the Mambo content management system and the PHP XML-RPC library. Dubbed Mare.D, the worm leaves multiple backdoors on infected systems. Two of these are connect back shell backdoors that link to a remote host, while a third allows the malware's writer to access and control infected systems via IRC. Linux worm targets PHP flaw - - - - - - - - - - Apple recruits karma to stop OS X 'theft' Apple has embedded a special message to hackers in the latest version of its operating system in an effort to stop the platform being ported to non-Apple computers. Developers have been trying to break into Apple's OS X ever since the company released a version of the software that runs on Intel processors. Previous versions ran only on Power processors made by IBM and Freescale. - - - - - - - - - - Spammers adopt stealth tactics Botnet controllers are switching to stealth tactics in a bid to avoid detection. Instead of mass mail-outs of spam and malicious code, they are adopting slower distribution tactics in a bid to avoid appearing on corporate security radars. - - - - - - - - - - London Oyster card - a tool for spouse stalkers? Marriages down the tubes...Transport for London's (TfL) 'ID card lite', the Oyster travelcard, is already being illicitly used to snoop on people's movements, according to the Independent on Sunday. The problem stems from the fact that TfL records the journeys made using the card, and gives owners easy internet access to their personal audit trail. But it's perhaps too easy. - - - - - - - - - - LE and Government Officials Join BSA In a town hall meeting last week by the Business Software Alliance (BSA), top law enforcement officials from the United States and Europe said that combating cybercrime requires industry coordination with law enforcement officials on both sides of the Atlantic. In addition, a new survey released by BSA showed the positive impact of industry-led initiatives in fighting organized cybercrime. - - - - - - - - - - Yahoo!Mail bans Allah and Dirty Harry handles Yahoo! is banning the use of allah in email names - even if the letters are included within another name. This was uncovered by Reg reader Ed Callahan whose mother Linda Callahan was trying to sign up for a Verizon email address. She could not get it to accept her surname. - - - - - - - - - - Plan for ID Cards Drawing Criticism The new technology, required by law, hikes costs and raises risks of identity theft, some say. When Congress rushed passage of the Real ID Act last spring, the idea was to foil terrorists. States would be required to replace their current drivers' licenses with forgery-proof identification cards embedded with private information that government agents anywhere in the country could quickly scan to verify a person's identity. (LA Times article, free registration required),1,2329413.story Government continues to stonewall over ID card costs,39020651,39253436,00.htm - - - - - - - - - - RSA: Companies pushed to bolster internal security efforts After spending years implementing controls to protect their network perimeters from external threats, companies are under growing pressure to do the same thing to guard against internal ones as well, security professionals at last weeks RSA conference here said. Driving the trend are concerns about accidental data leaks and theft resulting from internal lapses at a time when companies are increasingly opening up their networks and data to business partners, suppliers and customers. Also playing a role are regulations that require companies to exercise greater control over the data they handle.,10801,108849,00.html Is your company doing enough to protect itself... and you?,39024655,39156605,00.htm Leader: Good news amid the gloom of insecurity?,39024655,39156606,00.htm - - - - - - - - - - A Glimpse at Wiretap Device Central to the Case Pellicano allegedly had Telesleuth created to convert voice recordings into digital files. In a racketeering indictment issued last week, federal prosecutors contend that Hollywood private eye Anthony Pellicano helped develop a device called Telesleuth, which he then used in illegal wiretaps. (LA Times article, free registration required),1,7386148.story - - - - - - - - - - Preventing SSH Dictionary Attacks With DenyHosts In this HowTo I will show how to install and configure DenyHosts. DenyHosts is a tool that observes login attempts to SSH, and if it finds failed login attempts again and again from the same IP address, DenyHosts blocks further login attempts from that IP address by putting it into /etc/hosts.deny. DenyHosts can be run by cron or as a daemon. In this tutorial I will run DenyHosts as a daemon. - - - - - - - - - - Cheat Sheet: Security appliances A must-have box of tricks or just another in a long line of 'next big things'? A security appliance? What does this do? Well as you might imagine, it's an appliance - often a black or silver (techies may call it 'gun metal') box - which handles a lot of your security needs such as antivirus, anti-spam and content filtering. The various models work in different ways and address different issues in many cases - with varying degrees of integration and threat management - but the premise is basically the same.,39024655,39156601,00.htm - - - - - - - - - - EU cops to get Europe-wide licence and vehicle database A European database of vehicle documentation, giving police access to driver and vehicle data from multiple European countries, goes live today. The Traffic Documentation System (TDS) is currently subscribed to by the UK, Belgium, France, Germany and the Netherlands, and has been developed by Dutch National Traffic Police on behalf of the European Traffic Police Network, TISPOL, with EU funding. Five more countries are due to join shortly. - - - - - - - - - - Reference Tool On Web Finds Fans, Censors When access to Wikipedia, the online encyclopedia that anyone can edit, was disrupted across China last October, a lanky chemical engineer named Shi Zhao called his Internet service provider to complain. A technician confirmed what Shi already suspected: Someone in the government had ordered the site blocked again. The Click That Broke a Government's Grip *********************************************************** Search the Archive at: *********************************************************** The source material may be copyrighted and all rights are retained by the original author/publisher. The information is provided to you for non-profit research and educational purposes. Reproduction of this text is encouraged; however copies may not be sold, and NewsBits ( should be cited as the source of the information. Copyright 2000-2006,, Campbell, CA.