Bookmark or link to: kobayashi.cjb.net. All other url`s could change!
News Archive    Translate Traducen
News October 2001
31 October 2001

New trojan:
Wicked Bot. Used with the DDOS attacks on Steve Gibson. Read more

xforce.iss.net:
Widespread Exploitation of SSH CRC32 Compensation Attack. Read more

www.securiteam.com:
Downloaded Applications Can Execute Without Warning on Mac IE 5.1 for OS X. Read more

www.azcentral.com:
Elusive hackers evoke fear. Read more

www.wired.com:
NY Times Hit by DoS Attack. Read more

www.newsbytes.com:
Taliban Web Sites Remain Online. Read more

news.bbc.co.uk:
Attacks from the heart of the net. Read more

www.nzherald.co.nz:
Microsoft hackers reached key programmes. Read more

www.vnunet.com:
Law means Linux security patches secret. Read more

www.fcw.com:
Anti-terror law expands powers. Read more

www.vnunet.com:
Comment: Hacking is not terrorism. Read more

www.vnunet.com:
Readers' letters: Is hacking terrorism? Read more

www.pcworld.com:
Refreshed Nimda Worm Is Set Loose. Read more

www.vnunet.com:
Hacker intrusion collusion creates 'perfect IDS'. Read more

www.vnunet.com:
Worm turned claim spurned. Read more

www.theregister.co.uk:
£25m Barclays blackmail trial begins. Read more

www.newsbytes.com:
Pirated Copies Of Windows XP Pose Security Risk - Microsoft. Read more

www.theregister.co.uk:
Secondhand WinXP for sale. Read more

web.lexis-nexis.com:
HACKING AWAY AT COMPUTER VIRUSES. Read more

www.vnunet.com:
Hacker's death threat terror. Read more

www.newsbytes.com:
Current Internet Filtering Tools Found Lacking - Study. Read more

www.newsbytes.com:
EarthLink Pushes 'Kid-Safe' Browser From SurfMonkey. Read more

30 October 2001

New trojans:
Theef 1.33a server

BlueIce 2000C client

www.securiteam.com:
JavaScript Insertion in phpBB and Ikonboard Bulletin Boards (IMG, CSS). Read more

www.securiteam.com:
Pc-to-Phone Sensitive Information Disclosure. Read more

www.securiteam.com:
Bypassing Linux Kernel Quota Limits. Read more

www.cdt.org:
Taps, Traps, and Pens -- Electronic Surveillance Overview . Read more

www.cdt.org:
CDT's Carnivore Reference Page. Read more

www.cdt.org:
Echelon. Read more

www.cdt.org:
FIDNet - Federal Intrusion Detection Network. Read more

www.nd.edu:
Error and attack tolerance of complex networks (pdf). Read more

www.chosun.com:
Ministry Warns of Klez Virus. Read more

www.theregister.co.uk:
Win-XP vs Red Hat 7.2. Read more

www.vnunet.com:
Chinese crackers dampen WinXP celebration. Read more

www.theregister.co.uk:
Microsoft's Trick or Treat. Read more

www.informationweek.com:
Hacker Hires Don't Interest Most Businesses. Read more

www.usdoj.gov:
COMPUTER HACKER INTENTIONALLY DAMAGES PROTECTED COMPUTER. Read more

www.ecommercetimes.com:
Why Are There No Rich Hackers? Read more

networking.earthweb.com:
DoS Attacks Go For the Throat. Read more

www.canoe.ca:
Government eavesdroppers could listen to Canadians under anti-terror law. Read more

news.independent.co.uk:
Meet the computer criminals: they'll see you in your office. Read more

www.washtech.com:
Alert System Sought for Internet Attacks. Read more

inq.philly.co:
Culprits in rising cyber-attacks unknown. Read more

www.theregister.co.uk:
Linux Update withholds security info on DMCA terror. Read more

cgi.usatoday.com:
Russian hacker's story shows financial system's weak spots. Read more

news.24.com:
E-mail hoax doing the rounds. Read more

29 October 2001

New trojan:
PSYchoFiles 1.6

www.securiteam.com:
Checkpoint VPN-1 SecuRemote Flaw (Username Verification). Read more

www.securiteam.com:
Cross-Site Scripting Flaw in Webalizer. Read more

www.securiteam.com:
Oracle File Overwrite Security Vulnerability. Read more

www.securiteam.com:
Arbitrary Command Executing on Query of Corrupt RPM Files. Read more

www.securiteam.com:
Oracle Trace Collection Security Vulnerability. Read more

www.worldnews.com:
Anti-Terror Tools Include High-Tech. Read more

europe.cnn.com:
Marching into the 'smart' card era. Read more

www.newsbytes.com:
Security Site Succumbs Again To Hackers. Read more

www.computeruser.com:
'Millionaire' German hacker nearly bankrupt--report. Read more

www.economictimes.com:
Pakistani hackers attack US government website. Read more

europe.cnn.com:
Privacy Council defends Passport. Read more

denver.bcentral.com:
Buddhist works to change hackers' image. Read more

www.business.scotsman.com:
Internal misuse is as big a danger as external hackers. Read more

www.sunday-times.co.uk:
Fraud costs £14bn a year, yet few firms will admit to being victims. Read more

www.nzherald.co.nz:
Security crackdown in bid to plug leaks. Read more

28 October 2001

New:
Unify 1.4 by da.

www.insecure.org:
Nmap 2.54BETA30 released. Read more

www.securiteam.com:
Remote DoS in 6tunnel. Read more

www.securiteam.com:
Weak Authentication in iBill's Password Management CGI. Read more

www.securiteam.com:
Public ICQ Servers Based DDoS. Read more

www.securiteam.com:
Oracle9iAS Web Cache Overflow Vulnerability (Patch). Read more

www.computeruser.com:
Hacking incident closes security news site. Read more

www.theregister.co.uk:
MI5 turns to newsgroups to find Bin Laden supporters. Read more

www.zdnet.com.au:
Cybernarks - Who's hunting the Hackers? Read more

www.2600.com:
MITNICK TO PORTRAY CIA AGENT ON TELEVISION. Read more

www.zdnet.com.au:
Humanoid robot runs on Linux power. Read more

www.msnbc.com:
XP inferior in security department. Read more

27 October 2001

New Trojan
Rendezvous

www.astalavista.com:
There are folders on your computer that Microsoft has tried hard to keep secret. Within these folders you will find two major things: Microsoft Internet Explorer has been logging all of the sites you have ever visited -- even after you've cleared your history, and Microsoft's Outlook Express has been logging all of your e-mail correspondence -- even after you've erased them from your Deleted Items bin. (This also includes all incoming and outgoing file attachments.) Read more

An email purporting to offer a patch to a Trojan horse scanner, popular in Germany, is actually an Internet worm.
The worm arrives in an email with:
Subject line:
"ANTS Version 3.0"
Body text of email:
"Hi,
Anhängend die neue Version 3.0 von ANTS, dem bislang einzigartigen kostenlosen Trojanerscanner. Zum installieren einfach die angefügte Datei ausführen.
Attached you will find the brand new Version 3.0 of ANTS, the unique freeware trojan scanner. To install ANTS simply run the attached setup file.
Adieu, Andreas
webmaster@avnetwork.de
http://www.ants-online.de"

Microsoft Security Bulletin MS01-053
Downloaded Applications Can Execute on Mac IE 5.1 for OS X. Read more

CERT® Advisory CA-2001-29
Oracle9iAS Web Cache vulnerable to buffer overflow. Read more

www.securiteam.com:
RWhoisd Remote Format String Vulnerability (-soa). Read more

www.newsbytes.com:
Macintosh Users Warned Of IE 5.1 Browser Security Hole. Read more

hongkong1.cnet.com:
Trojan horse scanner pitch is a sneaky worm. Read more

www.theregister.co.uk:
Nasty email gives ANTS a case of worms. Read more

www.kingpublishing.com:
Commentary: The Threat Of Microsoft’s .Net. Read more

www.theregister.co.uk:
Win-XP firewall defeats Gibson NanoProbes. Read more

www.theregister.co.uk:
MS XP signed drivers regime draws consumer groups' ire. Read more

www.theregister.co.uk:
WinXP doesn't feel the Force Feedback. Read more

www.wkeys.com:
Microsoft Redux. Read more

www.nandotimes.com:
House's anti-terror bill requires judge to monitor FBI's use of e-mail surveillance system. Read more

www.govexec.com:
White House asks industry to develop secure federal network. Read more

www.ciol.com:
US government Web site hacked. Read more

www.washtech.com:
Alert System Sought for Internet Attacks. Read more

www.smalltimes.com:
BIGGER ROLE SEEN FOR DEFENSE R&D. Read more

www.theregister.co.uk:
Email deletion bug baffles McAfee. Read more

news.cnet.com:
Red Cross e-mail donation hoax circulating. Read more

news.globetechnology.com:
How do corporations stop hackers? They don't. They simply lure them to a "honeypot.". Read more

news.bbc.co.uk:
Ryanair admits flaws in online recruitment. Read more

www.ireland.com:
European firms need to assess IT security. Read more

www.theregister.co.uk:
RSA WebID agent can't read Unicode. Read more

www.nationalpost.com:
Hacking not just a 'boy thing'. Read more

www.first.org:
14th Annual Computer Security Incident Handling Conference. Read more

26 October 2001

New Trojan
Duddie 2.0

www.securiteam.com:
Proof of Concept netkit-0.17-7 Local Root Exploit. Read more

www.securiteam.com:
Response Header Overflow Exploit Code Released. Read more

www.securiteam.com:
Trend Micro OfficeScan Corporate Edition Configuration File Disclosure Vulnerability. Read more

www.securiteam.com:
Buffer Overflow Vulnerability in Action Argument of dtaction. Read more

it.mycareer.com.au:
Taliban opposition's website a casualty of war. Read more

www.theregister.co.uk:
Bin Laden hack-meister in defacement, financial debacles. Read more

www.wired.com:
Hack Breaks Security Site's Back. Read more

www.newsbytes.com
'Millionaire' German Hacker Nearly Bankrupt - Report. Read more

www.reuters.com:
Pakistani Hackers Attack U.S. Govt. Web Site. Read more

web.lexis-nexis.com:
Bill Gates Discusses Cyber Terrorism. Read more

www.ecommercetimes.com:
Hacker 'Bombs' Missing Targets. Read more

www.reuters.com:
British Security Chiefs Launch Web Terror Hunt. Read more

cryptome.org:
USA v. Carl Johnson - Testimony on PGP Use. Read more

www.computing.vnunet.com:
Worm puts vendors on the hook. Read more

www.theregister.co.uk:
WinXP on the wall, who's the most incompatible of them all? Read more

www.newsbytes.com:
Window Security Site Defaced With Anti-XP Message. Read more

cryptome.org:
Cryptanalysis of Multiswap. Read more

hongkong1.cnet.com:
Jam Echelon Day a "rousing" success. Read more

news.ninemsn.com.au:
China sentences hacker to two years jail. Read more

star-techcentral.com:
The top 3 hacker targets. Read more

web.lexis-nexis.com:
More women joining the ranks of hackers. Read more

www.internetwk.com:
Government Takes Security Lead. Read more

25 October 2001

New Trojan
Nethief 1.9

www.cert.org:
Recent trends in DoS attack technology. (pdf). Read more

sns.chicagotribune.com:
Taliban Opposition Site Knocked Out. Read more

news.bbc.co.uk:
Hacktivists take sides in war. Read more

www.vnunet.com:
YIHAT incurs hacker community's wrath. Read more

hongkong1.cnet.com:
Korea reports outbreak of Bin Laden virus. Read more

www.silicon.com:
Microsoft not trusted to hold personal data. Read more

www.economictimes.com:
Activists decry US inaction on new Microsoft OS. Read more

www.theregister.co.uk:
MS issues bum security patch, contradicts self. Read more

www.theregister.co.uk:
UK Net pedo jailed for eight years. Read more

www.techreview.com:
Information Warfare. Read more

www.securitynewsportal.com:
SecurityNewsPortal defaced. Read more

techupdate.zdnet.com:
XP vulnerable to DoS attacks. Read more

www.newsbytes.com:
Hacking Incident Closes Security News Site. Read more

news.bbc.co.uk:
Indian news sites hacked. Read more

www.nandotimes.com:
Taiwanese hackers reportedly broke into Army Web site. Read more

www.ananova.com:
China sentences computer hacker to two years. Read more

www.vnunet.com:
Routers surpass servers for hacker attacks. Read more

www.reuters.co.uk:
Microsoft Beefs Up Security with Windows XP. Read more

www.securityfocus.com:
Preventing and Detecting Malware Installations on NT/2K. Read more

www.canoe.ca:
Eavesdropping agency must be allowed to intercept Canadian calls. Read more

www.computerbuyer.co.uk:
BT plays down hacker claims. Read more

www.timesofindia.com:
IBM software helps companies secure networks. Read more

web.lexis-nexis.com:
CYBERTERROR: U.S. tries to protect self on crucial front. Read more

www.internetnews.com:
McAfee.com and eEye Get Secure With Each Other. Read more

24 October 2001

New Trojan
Phoenix II 1.64

www.securiteam.com:
Attacking a Lotus Notes Client. Read more

www.securiteam.com:
Mac OS X 10.1 Local Security Exploit. Read more

www.securiteam.com:
Novell Groupwise Arbitrary File Retrieval Vulnerability. Read more

www.securiteam.com:
Webmin Insecure Temporary File Creation. Read more

www.securiteam.com:
Solaris Fingerd Discloses Complete User List. Read more

www.securiteam.com:
Red Hat 7.2 GnuPG signed RPM verification fails on distribution files. Read more

www.zdnet.co.uk:
Hacking is not terrorism. Read more

www.newsbytes.com:
Pro-USA Hackers Target Pakistani Defacement Group. Read more

www.vnunet.com:
New hacker Maxmouse defaces Taliban site. Read more

www.reuters.com:
Korea Reports Outbreak of Bin Laden Computer Virus. Read more

www.theregister.co.uk:
Taleban - who can't hack - get hacked. Read more

www.attrition.org:
Kimble & YIHAT Morons Threaten Attrition. Read more

www.vnunet.com:
UK in bad shape to fend off cyber attacks. Read more

www.theregister.co.uk:
Virus writers are industrial terrorists - MS. Read more

www.theregister.co.uk:
Murder on the Outlook Express. Read more

www.computeruser.com:
Image tags hide new hotmail security attack. Read more

www.informationweek.com:
Hacker Hires Don't Interest Most Businesses. Read more

www.siliconvalley.com:
Once-feared hacker works the other side. Read more

linuxtoday.com:
NewsBytes: Red Hat Denies Security Flaw in `Enigma'. Read more

www.nandotimes.com:
Israeli high-tech firms may benefit from security concerns. Read more

www.zdnet.com:
Windows XP just doesn't cut it in the security department. Read more

www.zdnet.com:
Windows XP urban legends and myths--debunked! Read more

www.osopinion.com:
The 'Anthrax' Computer Virus - A Bug in the Worm. Read more

23 October 2001

New Trojan
Nerte 7.5.0

www.shat.net:
Network Query Tool (NQT) is a one-stop solution for getting information about a domain or IP address. Instead of manually using different unix commands or visiting numerous websites to "investigate" a host, just load Network Query Tool and enter the hostname or IP. NQT does the rest. Read more

Microsoft Security Bulletin MS01-052(version 2.0)
Invalid RDP Data can Cause Terminal Service Failure. Read more

www.newsbytes.com:
Image Tags Hide New Hotmail Security Attack. Read more

www.securiteam.com:
Acrobat PDF Protection is not Very Secure. Read more

www.securiteam.com:
Claris Emailer Buffer Overflow Vulnerability. Read more

www.securiteam.com:
Wireless Access Points and ARP Poisoning. Read more

www.securiteam.com:
Mountain Network System's WebCart Vulnerability Leads to Arbitrary Command Execution. Read more

www.securiteam.com:
Multiple Looking-Glass Input Vulnerabilities. Read more

www.securiteam.com:
DoS Found in Ssdpsrv.exe (UPnP). Read more

www.securiteam.com:
Flaws Found in Recent Linux Kernels (newgrp, symblinks). Read more

www.securiteam.com:
Network Query Tool Command Execution Vulnerability. Read more

www.securiteam.com:
3Com Home Connect Cable Modem Vulnerable to Denial of Service. Read more

seattletimes.nwsource.com:
Espionage must wear new cloak. Read more

www.chicagotribune.com:
Web hooligans hurt search for clues. Read more

dailynews.yahoo.com:
Cyber-Terrorism Becoming Very Real Threat. Read more

www.newsbytes.com:
Pro-USA Hackers Target Pakistani Defacement Group. Read more

www.vnunet.com:
Vigilante hackers blasted off net. Read more

www.reuters.co.uk:
China Internet blocks back in place. Read more

www.betanews.com:
AOL Security Compromised After Upgrade. Read more

www.theregister.co.uk:
DoS attacks getting scary, CERT warns. Read more

www.theregister.co.uk:
Net security in an open electronic society. Read more

www.theregister.co.uk:
MS digital rights management scheme cracked. Read more

www.reuters.com:
Microsoft Vows Legal Action Against Hacker. Read more

www.usatoday.com:
Microsoft explores legal options against hacker. Read more

www.theregister.co.uk:
Win-XP as terrorist tool story contradicted. Read more

news.zdnet.co.uk:
Firms resist XP distractions. Read more

www.interactiveweek.com:
Beyond Carnivore: FBI Eyes Packet Taps. Read more

www.zdnet.com:
Identity theft more than doubling. Read more

www.theregister.co.uk:
Is Wednesday the end for Web bugs and dodgy cookies? Read more

www.theregister.co.uk:
Data Protection Act kicks in on Wednesday. Read more

www.fcw.com:
Pa. strengthens cybersecurity. Read more

news.zdnet.co.uk:
Novell make a move into security. Read more

news.zdnet.co.uk:
E-Minister takes first steps towards free wireless Internet. Read more

www.chron.com:
To boost security for your home computer, start with secure password(s). Read more

www.cbsnews.com:
Privacy vs. Security. Read more

www.guardian.co.uk:
Secrecy surrounds £25m Barclaycard blackmail case. Read more

www.theregister.co.uk:
Kevin Mitnick plays CIA lackey in TV role. Read more

22 October 2001

New Trojan
Muska52 1.3

Georgi Guninski security advisory #50, 2001
Javascript in IE may spoof the whole screen. Read more

www.securiteam.com:
JavaScript in IE Can Take Over the Whole Screen. Read more

www.securiteam.com:
Citrix MetaFrame Remote Denial of Service Vulnerability. Read more

www.zdnet.com:
Meet the dark side of Windows XP. Read more

www.zdnet.com:
Why MS's password-revealing glitch should worry you. Read more

web.lexis-nexis.com:
DMCA Protester Cracks Microsoft's Copyright Protection Code. Read more

www.eweek.com:
Cyber-Security: Striving for Public/Private Pact. Read more

web.lexis-nexis.com:
Pakistani Group Strikes U.S. Military Web Site. Read more

europe.cnn.com:
Utah's 'Black Ice': Cyber-attack scenario. Read more

www.zdnet.com:
How McAfee.com is cashing in on viruses. Read more

www.sunday-times.co.uk:
Cybercrime threat to firms. Read more

seattletimes.nwsource.com:
Firewalls not perfect but needed these days. Read more

www.sunday-times.co.uk:
Unregulated web services trigger security fears. Read more

www.eweek.com:
Providers Take On Security. Read more

www.govexec.com:
Public, private sectors advised to share data to combat cyber attacks. Read more

www.sciam.com:
Foolproof Quantum Cryptography. Read more

21 October 2001

New Trojan
Infector 2.0 by FC. With download.

Dcetest is a tool which probes a windows machine over TCP port 135, MSRPC endpoint information. It can be though of as the equivalent of rpcinfo -p against a Windows box. Dcetest can also be very useful once inside a DMZ to fingerprint Windows machines on the network. Read more

www.securiteam.com:
Oracle9iAS Web Cache Multiple DoS and Buffer Overflow. Read more

www.securityfocus.com:
Flaws in recent Linux kernels. Read more

www.idgnet.co.nz:
Anthrax worm fails to spread on 'net.Read more

www.theregister.co.uk:
Lame attempt to disguise viruses as MS security update. Read more

cryptome.org:
SafeWeb and Bahamian Trojans. Read more

www.zdnet.com:
Hacker exploits make PC worms deadlier. Read more

www.wired.com:
Governor Calls for 'Cyber Court'. Read more

news.cnet.com:
Net security: An oxymoron. Read more

www.theregister.co.uk:
Win-XP denounced as terrorism tool. Read more

www.guardian.co.uk:
Hacker cries foul over FBI snooping. Read more

www.washingtonpost.com:
Bush Backs Changes In Hacking Disclosure. Read more

20 October 2001

New Trojan
Freddy K - ASE

VERADO: THE IT SECURITY GAME v2.0.
Verado, a managed services firm in Greenwood Village, Colo., released "The IT Security Game," which portrays some of the serious situations facing today's mission-critical operations. The goal is to educate IT professionals about the various foes awaiting an unsuspecting data chief, including cyberthieves and hackers. Just remember, in real life there's no Play Again button. Read more

Microsoft Security Bulletin MS01-052
Invalid RDP Data can Cause Terminal Service Failure. Read more

xforce.iss.net:
Citrix MetaFrame Remote Denial of Service Vulnerability. Read more

www.securiteam.com:
CDP Vulnerability in Cisco Routers. Read more

www.securiteam.com:
Hi-Resolution System's MacAdministrator Hidden Files Disclosure and Access Vulnerability. Read more

www.securiteam.com:
Invalid RDP Data can Cause Terminal Service Failure. Read more

www.computerworld.com:
Red Cross warns of Trojan horse that steals credit card data. Read more

www.newsbytes.com:
Red Cross Warns Of Fraudulent Trojan Program. Read more

www.washingtonpost.com:
E-Mail Scam Preys on Relief Donors. Read more

www.fortune.com:
The Tools Of Freedom And Security. Read more

www.theregister.co.uk:
Hacker Web site up for sale. Read more

www.informationweek.com:
Lights, Camera, Hacker! Read more

www.law.com:
Juror's Exposure to 'Love Bug' Story Didn't Warrant New Trial. Read more

www.computerworld.com:
Microsoft withdraws faulty server patch. Read more

www.zdnet.com:
Microsoft tech plays into hackers' hands. Read more

www.silicon.com:
Microsoft unbowed in face of 'stop XP' lawsuit. Read more

www.computerworld.com:
Microsoft: Loose lips give hackers tips. Read more

www.silicon.com:
Microsoft's brotherhood of silence. Read more

www.businessweek.com:
Hackers Harvest Passwords from DSL Routers. Read more

www.pcworld.com:
Controversial Encryption Plan Abandoned. Read more

www.varbusiness.com:
12 Steps To Better Security. Read more

19 October 2001

New Trojan
Winshell 2.0

Microsoft Security Bulletin MS01-052
Invalid RDP Data can Cause Terminal Service Failure. Read more

www.ciac.org:
Office XP Error Reporting May Send Sensitive Documents to Microsoft. Read more

www.insanely-great.com:
Major security hole found in OS X 10.1. Read more

hongkong1.cnet.com:
"Redesi" worm reformats hard drives. Read more

news.cnet.com:
Security experts see nastier worms. Read more

www.vnunet.com:
Hackers launch 'cyber jihad' on US. Read more

www.siliconvalley.com:
Bush supports limits on disclosing details about hacking, official says. Read more

www.cigital.com:
Cigital Discovers Wireless Attacks That Expose Wired Networks. Read more

www3.gartner.com:
U.S. Cyberspace Security Office Must Define Its Mission -- Now. Read more

www.wired.com:
Senator Backs Off Backdoors. Read more

www.it-analysis.com:
SirCam blitz is damp squib. Read more

www.windowsitsecurity.com:
Trapping Worms in a Honeypot. Read more

www.computeruser.com:
Anti-terror hackers seek govt blessing. Read more

www.theregister.co.uk:
SafeWeb ain't all that. Read more

www.newsbytes.com:
Hackers Put A Price Tag On New Attack Tool. Read more

www.billboard.com:
Hacking Techniques Could Help RIAA. Read more

scripts.ireland.com:
Home users take on computer hackers. Read more

hongkong1.cnet.com:
Sounding the alarm on Net security. Read more

18 October 2001

New Trojan
Muska52 1.0

www.linux.com:
Installing and Configuring Snort. Read more

www.securityfocus.com:
Chasing the Wind, Episode Eleven: Fire and Brimstone. Read more

www.ciac.org:
Office XP Error Reporting May Send Sensitive Documents to Microsoft. Read more

www.securiteam.com:
Dotless IP Addresses Can Cause IE to Move into Intranet Zone. Read more

www.securiteam.com:
phpBB Allows Remote Users to Modify Default SQL Queries. Read more

www.newsbytes.com:
Novell Patches Security Hole In GroupWise Server. Read more

www.newsbytes.com:
Tech Group Hails Demise Of Encryption Backdoor Idea. Read more

www.siliconvalley.com:
In the wake of Sept. 11, encryption is no joke. Read more

www.newsbytes.com:
Pakistani Hackers Deface U.S. Site With Ultimatum. Read more

www.govexec.com:
Bush creates cyberterrorism panel. Read more

www.newsbytes.com:
Anti-Terror Hackers Seek Govt Blessing. Read more

www.smh.com.au:
US braces for 'cyberattacks'. Read more

www.theregister.co.uk:
Win-XP denounced as terrorism tool. Read more

news.bbc.co.uk:
Hackers take to the air. Read more

www.computeruser.com:
U.S. on verge of 'electronic martial law' -- researcher. Read more

www.wired.com:
'Stung' Russian Hacker Guilty. Read more

www.siliconvalley.com:
Man pleads no contest to hacking into computer of firm affiliated with Department of Defense. Read more

news.cnet.com:
Microsoft to hackers: Don't publish code. Read more

www.newsbytes.com:
Microsoft Rallies Industry Against Bug Anarchy. Read more

www.ecommercetimes.com:
Code Errors Stall Spread of Computer Worms. Read more

www.informationweek.com:
Infamous Hacker Becomes CIA Agent? Read more

web.lexis-nexis.com:
NEW HACKERS WREAK HAVOC;BENIGN TURNS MALICIOUS. Read more

dailynews.yahoo.com:
RIAA: We'll smother song swappers. Read more

17 October 2001

New Trojans
Qtaz 2.0

DeepThroat 1.1 Server Darkstar

www.securiteam.com:
TYPSoft FTP Server STOR/RETR Denial of Service Vulnerability. Read more

www.securiteam.com:
Cisco PIX Firewall Manager Password Disclosure Vulnerability. Read more

www.securiteam.com:
Account Management Vulnerabilities in Ipswitch IMail Server. Read more

www.securiteam.com:
Security Bug Found in ht://Dig htsearch CGI (DoS, File Exposure). Read more

www.securiteam.com:
Bug in Linux 2.4 and IPTables MAC Match Module. Read more

www.foundstone.com:
Vulnerability exists with Novell's GroupWise server. Read more

www.computeruser.com:
Security attacks set to double in 2001 - CERT. Read more

www.tribuneindia.com:
Pak hackers pose cyber threat to USA. Read more

news.cnet.com:
New anthrax worm is a dud. Read more

www.ireland.com:
Anthrax ‘information’ virus in circulation. Read more

www.zdnet.com:
SirCam's comeback ends up a flop. Read more

www.computeruser.com:
Allegedly hacked bank denies bin Laden connection. Read more

cryptome.org:
PROVIDE APPROPRIATE TOOLS REQUIRED TO INTERCEPT AND OBSTRUCT TERRORISM. Read more

www3.gartner.com:
GOVNET Won’t Solve U.S. Government Internet Security Concerns. Read more

www.informationweek.com:
The debate over encryption intensifies as the government looks to crack down. Read more

web.lexis-nexis.com:
Fear Along The Firewall;America's computer databases and satellite navigation systems are vulnerable to attack. Read more

web.lexis-nexis.com:
Cyberspace vulnerable to attack, panel warns. Read more

www.zdnet.co.uk:
Must privacy die too? Read more

web.lexis-nexis.com:
Russian hacker found guilty faces 100-year prison term. Read more

www.linuxworld.com:
How to tell if your Linux box has been cracked. Read more

www.ecommercetimes.com:
The Security Side of Windows XP: Hope, Risk Run High. Read more

www.pcworld.com:
Microsoft Improves Security Plans. Read more

web.lexis-nexis.com:
Predictive Systems to Host ''Hack, Counter-Hack'' Free Seminar Series Detailing the Newest Information Security Risks and Responses. Read more

europe.cnn.com:
China unblocks news Web sites. Read more

16 October 2001

New Trojan
Nethief 1.8

www.securiteam.com:
HylaFax Format String Vulnerabilities (Exploit Code). Read more

www.securiteam.com:
Ipswitch IMail Multiple Security Vulnerabilities. Read more

www.businesstoday.com:
U.S. could close Gates on hackers, terrorists. Read more

starnews.com:
War on terror breeds patriotic 'hactivists'. Read more

abcnews.go.com:
Hacking for the Cause. Read more

defaced.alldas.de:
YIHAT" (Young Intelligent Hackers Against Terrorism). Read more

www.sfgate.com:
FBI's controversial cyber-snooping system plays key part in terrorism probe. Read more

www.pcworld.com:
Former Fed Says XP Poses a Security Threat. Read more

news.excite.com:
'Govnet' would be costly, prone to failure-experts. Read more

news.ninemsn.com.au:
Britain is vulnerable to hackers: expert. Read more

www.timesofindia.com:
Keeping track of changes vital for cyber crime cell. Read more

www.azcentral.com:
New hackers wreak havoc. Read more

www.ecommercetimes.com:
The Security Side of Windows XP: Hope, Risk Run High. Read more

www.informationweek.com:
Encryption: How Prevalent Is It? Read more

news.excite.com:
Network Adminstrator Found Guilty of Computer Sabotoge in Philadelphia. Read more

canberra.yourguide.com.au:
E-mail viruses are growing rapidly, but protection is getting better. Read more

news.cnet.com:
Are viruses really so bad? Read more

www.dmusic.com:
The RIAA, Hackers in Training. Read more

www.wired.com:
RIAA Wants to Hack Your PC. Read more

www.canada.com:
Cyber-doomsayers offer chilling vision. Read more

15 October 2001

New Trojan
Acid Reign

www.securiteam.com:
UnixWare 7 lpsystem Exploit Code Released. Read more

www.securiteam.com:
Additional Details Released on the Zone Spoofing Vulnerability. Read more

www.securiteam.com:
Ipswitch Web Calendaring Buffer Overflow. Read more

www.securiteam.com:
Security Bug Found in PostNuke (and possibly PHPNuke). Read more

news.cnet.com:
Anthrax found in Microsoft office. Read more

www.computing.vnunet.com:
US government to build its own Net. Read more

www.zdnet.com:
Online blackmailer leaks hacked data. Read more

www.usatoday.com:
Agencies censor sites deemed useful to terrorists. Read more

www.computing.vnunet.com:
FBI shuts down 'IRA' website. Read more

www.siliconvalley.com:
Software sought to expose terrorist cells. Read more

www.wired.com:
Terror Bill Limits Gambling, Too. Read more

www.computing.vnunet.com:
Napster turns the tables. Read more

www.securityfocus.com:
Nimda: a flash in the pan. Read more

www.securityfocus.com:
The crypto genie is out of the bottle. Read more

14 October 2001

New Trojans
Gift 2.4 with download.

Ghost 2.1

Microsoft Security Bulletin MS01-051
Malformed Dotless IP Address Can Cause Web Page to be Handled in Intranet Zone. Read more

europe.cnn.com:
Anthrax found in Nevada Microsoft subsidiary. Read more

www.theregister.co.uk:
Anthrax-laced letter to MS license div Confirmed. Read more

www.theregister.co.uk:
Anti-terror bill may regulate Carnivore use. Read more

www.wartimeliberty.com:
WorldNetDaily Reports WTC Terrorists Used Encryption. Read more

news.independent.co.uk:
Company secrets fall straight in a hacker's lap. Read more

www.siliconvalley.com:
White House asks companies for help with new government computer network. Read more

news.cnet.com:
Microsoft closes window to customer data. Read more

www.theregister.co.uk:
Networking bug makes Macs hang up. Read more

13 October 2001

New Trojan
Nerte 7.0.3

www.newsbytes.com:
'Terror Killers' Go On Site Defacement Spree. Read more

www.theregister.co.uk:
Anti-terror bill may regulate Carnivore use. Read more

www.eetimes.com:
Wiretap legislation passes Senate, moves to House. Read more

www.computing.vnunet.com:
Terror hysteria dismissed by experts. Read more

web.lexis-nexis.com:
WEB OF TERROR. Read more

www.eetimes.com:
Net security research languishing, Congress told. Read more

www.newsbytes.com:
Allegedly Hacked Bank Denies Bin Laden Connection. Read more

www.computing.vnunet.com:
Encryption technology is not an enemy of the state. Read more

web.lexis-nexis.com:
Terrorists could have used modern 'covered writing'. Read more

www.dallasnews.com:
Possible terrorist use of Internet encryption debated. Read more

web.lexis-nexis.com:
Hijackers may have sent coded messages on Internet. Read more

www.usatoday.com:
Agencies censor sites deemed useful to terrorists. Read more

www.usatoday.com:
Phone hub security sought. Read more

www.theregister.co.uk:
SirCam due to wipe Windows PCs next Tuesday. Read more

www.europemedia.net:
Spain has lower computer virus incidence than rest of EU. Read more

www.theregister.co.uk:
What the hell is Microsoft's new software licensing programme? Read more

www.crn.com:
Partners React To Network Associates’ Plan To Drop PGP. Read more

www.theregister.co.uk:
Network Associates puts PGP up for sale. Read more

12 October 2001

New Trojans
Guangwai Girl 1.0 alpha

Phoenix II 1.63

www.windowsitsecurity.com:
Multiple Vulnerabilities in Microsoft Internet Explorer. Read more

www.securiteam.com:
OpenProjects IRCD Allows DNS Spoofing. Read more

www.vnunet.com:
Open source tool put on red alert. Read more

www.zdnet.com:
Security updates deliver a problem. Read more

news.bbc.co.uk:
Doomsday fears of terror cyber-attacks. Read more

www.nj.com:
Computer experts warn of combined terrorist assault and cyber-attack. Read more

www.theregister.co.uk:
Tables turns on Bin Laden 'bank crackers. Read more

www.silicon.com:
Hacker says hacker is irresponsible. Read more

www.newsbytes.com:
Anti-Terror Hackers Claim Arab National Bank Breach. Read more

www.wired.com:
Fighting Evil Hackers With Bucks. Read more

www.japantimes.co.jp:
Interministerial team to target cyberterrorism. Read more

www.usatoday.com:
Cyberspace could be next target. Read more

www.wired.com:
Cyberwar Foundering on Feuds? Read more

www.nzherald.co.nz:
Cyber-raid hobbles web users. Read more

web.lexis-nexis.com:
Bracing for cyberwar. Read more

web.lexis-nexis.com:
Terrorists may have used hidden messages to plan attacks. Read more

web.lexis-nexis.com:
Investigators Try to Trace Terrorists' Footprints in Cyberspace. Read more

www.idg.net:
U.S. government seeks input to build its own Net. Read more

europe.cnn.com:
IT workers chew over 'Carnivore' bill. Read more

www.securityfocus.com:
The Value of Honeypots, Part One: Definitions and Values of Honeypots. Read more

www.zdnet.com:
Online blackmailer leaks hacked data. Read more

www.theregister.co.uk:
Web server attacks doubled over the last year. Read more

www.infoworld.com:
Hacker claims next round in banner-ad battle. Read more

www.securityfocus.com:
Truth Could Be the Web's First Casualty. Read more

www.themoscowtimes.com:
Hackers Thrive on Sloppy Employees. Read more

www.theregister.co.uk:
MS security glitch allowed access to customer records on web. Read more

11 October 2001

New Trojans
Dark IRC 4.0

Winshell 1.0

www.securiteam.com:
Security Bug Found in W3Mail Webmail. Read more

www.sky.com:
Terrorists Use Secret Internet Code. Read more

www.nj.com:
Computer experts warn of combined terrorist assault and cyber-attack. Read more

www.nandotimes.com:
Hacker's war on terrorism draws tepid response from experts. Read more

www.ireland.com:
Company decodes bin Laden Internet activity. Read more

www.vnunet.com:
Hacker slammed for anti-terror crusade. Read more

www.japantimes.co.jp:
Interministerial team to target cyberterrorism. Read more

news.bbc.co.uk:
US names cyber-terrorism czar. Read more

www.nandotimes.com:
U.S. State Department reports surge in website hits after terror attacks. Read more

www.washtech.com:
U.S. Seeks To Build Secure Online Network. Read more

www.worldnews.com:
White House Seeks Cyber Security Aid. Read more

www.zdnet.com:
ISP to banish virus spreaders. Read more

www0.mercurycenter.com:
More women joining the ranks of hackers. Read more

www.nandotimes.com:
Supreme Court refuses to hear Microsoft case. Read more

10 October 2001

New Trojan
WAY 2.5

www.hackbusters.net:
LaBrea is a program that creates a tarpit or, as some has called it, a "sticky honeypot". LaBrea takes over unused IP addresses on a network and creates "virtual machines" that answer to connection attempts. Read more

www.securiteam.com:
Microsoft Excel/PowerPoint Documents can Bypass Microsoft Macro Security Checking. Read more

www.securiteam.com:
Symantec LiveUpdate Vulnerable to Security Attacks. Read more

www.securiteam.com:
Detection of Promiscuous Nodes Using ARP Packets. Read more

www.ananova.com:
'Hackers unite' call from German millionaire. Read more

www.themoscowtimes.com:
Companies Seek Online Security After Attacks. Read more

www.defenselink.mil:
DoD 'Safecrackers' Help Safeguard Pentagon Documents. Read more

www.theregister.co.uk:
KaZaA the Virus Desktop. Read more

www.stuff.co.nz:
Wrightson reacts to Nimda virus attack. Read more

www.newsbytes.com:
88% Of Firms Nailed By Viruses, Worms In Last Year – Survey. Read more

www.stuff.co.nz:
Viruses twice as common. Read more

web.lexis-nexis.com:
Web Server Attacks Double Year-To-Year. Read more

www.wired.com:
Mitnick Warns Other 'Scapegoats'. Read more

www.theregister.co.uk:
Dubai hacker losses appeal. Read more

www.themoscowtimes.com:
Survey: Hackers Thrive on Sloppy Employees. Read more

www.theregister.co.uk:
MS bends volume licensing rules. Read more

www.zdnet.com:
At last! At last! New security measures from Microsoft. Read more

www.zdnet.com:
Supreme Court denies Microsoft appeal. Read more

www.law.com:
Federal Circuit Vacates Judgment for Internet Security Company. Read more

www.cmpnetasia.com:
Hongkong Post, Diversinet launch Mobile e-Cert for secure m-commerce. Read more

09 October 2001

New Trojans:
Ultimate RAT 2.01

Phoenix II 1.61

Internet Security Systems Security Alert Summary AS01-01

www.securiteam.com:
UnixWare 7 lpsystem Vulnerable to an Exploitable Buffer Overflow. Read more

www.securiteam.com:
OpenBSD Bug Allows Unprivileged Users to Send SIGURG and SIGIO Signals. Read more

www.infoworld.com:
Many companies still vulnerable to DNS outage. Read more

www.phenoelit.de:
Version 1.4 of LiveUpdate (shipped with Norton Antivirus 5.x) can be used for rapid deployment of hostile code (backdoors, trojan applications, viruses, worms - if unknow to the NAV pattern file) and for remote penetration of systems running LiveUpdate via redirection of the initial connection to a server controlled by the attacker. Read more

www.securitywatch.com:
Dot coms don't safeguard their dns entries. Read more

CERT® Advisory CA-1999-02
Trojan Horses. Read more

www.nandotimes.com:
Internet proves easy way for terrorists to communicate. Read more

eprairie.com:
Terrorism and the Tactics of Network Destruction. Read more

www.theregister.co.uk:
The Times misquoted me - crypto expert. Read more

www.kill.net:
Young Intelligent Hackers Against Terror. Read more

www.vnunet.com:
Hackers launch cyberwar on terrorists. Read more

web.lexis-nexis.com:
Web could be new front for U.S. enemies. Read more

news.zdnet.co.uk:
Hackers face backlash. Read more

www.newsfactor.com:
Cyber Security Key to New U.S Initiative. Read more

www.idg.ne:
Build our security infrastructure. Read more

europe.cnn.com:
PC World poll highlights privacy concerns. Read more

www.sunspot.net:
Q & A Safe and secure. Read more

www.newsbytes.com:
AOL Stops One Security Breach, Fails To Stop Another. Read more

itmanagement.earthweb.com:
Viruses -- Easily Avoidable? Read more

www.esj.com:
Microsoft Responds to Hacker Attacks. Read more

www.theregister.co.uk:
WinXP activation harmless, cuddly, says MS chief. Again. Read more

08 October 2001

New Trojans:
Nerte 7.3.0

Nethief 1.5

www.securiteam.com:
Cisco PIX Firewall Authentication Denial of Service. Read more

www.securiteam.com:
Site Protector Password Cracker. Read more

www.securiteam.com:
Oracle Application Server Discloses Full Path for Missing JSP Files. Read more

www.pcadvisor.co.uk:
From hackers to terrorists. Read more

www.sfgate.com:
New encryption laws for e-mail unlikely. Read more

www.washtimes.com:
Encryption a battle front in terrorism war. Read more

www.mb.com.ph:
ITECC closely reviewing privacy, security in fight against cyberterrorism. Read more

www.thetimes.co.uk:
This is war calling. Read more

www.chron.com:
Electronic surveillance gets speedy evolution. Read more

news.cnet.com:
IBM launches wireless security package. Read more

www.sundaymail.co.uk:
CHAOS AT UNIVERSITY AFTER HACKERS STRIKE. Read more

seattletimes.nwsource.com:
Protecting yourself from nosy e-snoops. Read more

www.zawya.com:
Dubai court finds hacker guilty on two charges. Read more

web.lexis-nexis.com:
LACK OF EXPERTISE AIDS SPREAD OF COMPUTER VIRUS IN CITY SCHOOLS. Read more

07 October 2001

New Trojans:
Muska52 1.2

Remote Revise 1.5 by W@SyL. Now with download.

www.outguess.org:
Stegdetect is an automated tool for detecting steganographic content in images which is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Read more

www.rawlogic.com:
NetBrute Scanner, Windows Shares Audits. Read more

www.securiteam.com:
H-Sphere CGI Information Disclosure Vulnerability. Read more

www.securiteam.com:
Lotus Notes API Unauthorized Access to File Attachments. Read more

www.securiteam.com:
A Security Vulnerability in AIM Causes a DoS (Exploit). Read more

www.securiteam.com:
HylaFAX Format String Vulnerabilities (faxrm, faxalter). Read more

www.securitywatch.com:
Crashing your buddies. Read more

www.idg.net:
Private sector wants say in protecting infrastructure. Read more

europe.cnn.com:
NSA offers supersecure Linux. Read more

web.lexis-nexis.com:
Bracing for cyberwar. Read more

content.techweb.com:
Efforts To Limit Encryption Are Bad For Security. Read more

www.computeruser.com:
Anti-Nimda technology saved billions - report. Read more

www.vnunet.com:
Linux popularity breeds more worms. Read more

06 October 2001

New Trojans:
Enculator

Phoenix II 1.60

CERT® Advisory CA-2001-27
Format String Vulnerability in CDE ToolTalk. Read more

www.securiteam.com:
3Com OfficeConnect 812/840 Router DoS Exploit Code. Read more

www.securiteam.com:
Combining URLScan With FrontPage (HOWTO). Read more

www.securiteam.com:
JRun 3.1, JRun 3.0 JSP Source Viewing Vulnerability (::$DATA). Read more

www.securiteam.com:
ARCserveIT Storage Management Backup Account Password Disclosure. Read more

www.securiteam.com:
Format String Attacks on Alpha Systems. Read more

www.pcworld.com:
Microsoft Warns of New Security Issues in PowerPoint, Excel. Read more

www.rockymountainnews.com:
Nacchio: Protect against cyberattack. Read more

www.pcadvisor.co.uk:
Hackers yes, but terrorists? Read more

chicagotribune.com:
Web sites: Terrorist attacks cause security concerns. Read more

www.ecommercetimes.com:
Watchdog Sites Shut Down in Interest of National Security. Read more

www.nationalpost.com:
Artificial intelligence seen as security boon. Read more

www.vnunet.com:
Top company websites are hackers' dream. Read more

www.asahi.com:
Nimda virus exploiting software flaws. Read more

www.computing.vnunet.com:
Bugwatch - The virus writer's deadly cocktail. Read more

web.lexis-nexis.com:
Computer viruses get more contagious as user defences slip. Read more

www.computeruser.com:
Patriotic hackers target college, porn sites. Read more

www.newsfactor.com:
Low Demand Kills Online Anonymity, Encryption Services. Read more

www.newsbytes.com:
Court: German TV Must Return Hacked Bank Account Info. Read more

www.silicon.com:
Microsoft security moves 'too little too late'. Read more

www3.gartner.com:
Home PCs Are the Weak Link in Enterprise Network Security. Read more

cryptome.org:
Senate Anti-Terrorism Bill - USA Act of 2001. Read more

cryptome.org:
Responsibility for the terrorist atrocities. Read more

cryptome.org:
State Dept List of Terrorist Organizations. Read more

05 October 2001

New Trojan:
CoolCat 1.0.1.9

Microsoft Security Bulletin MS01-050
Malformed Excel or PowerPoint Document Can Bypass Macro Security. Read more

www.securiteam.com:
Two Problems Found with Alexis/InternetPBX from COM2001. Read more

www.securiteam.com:
PGP Keyserver's Inadequate Permissions. Read more

www.securiteam.com:
Meteor FTPD Directory Traversal. Read more

www.securiteam.com:
WebSphere Cookie and Session-id Predictability. Read more

www.securiteam.com:
No Ptrace Module (NPT). Read more

www.cisco.com:
Cisco PIX Firewall Authentication Denial of Service Vulnerability. Read more

www.pcworld.com:
Three Minutes with Rain Forest Puppy. Read more

www.pcworld.com:
Three Minutes With Microsoft's Scott Culp. Read more

www.newsbytes.com:
High-Tech Leaders Slam Encryption Back Door Bill. Read more

www.acm.org:
Letter to Senator Judd Gregg regarding his proposal to revive government controls on encryption. The proposal calls for a ban on all non-key-escrow systems. Read more

www.eff.org:
Proposed Anti-Terrorism Laws Overbroad and Overreaching. Read more

www.newsbytes.com:
Nixed 'Holy War' Web Site Offered PGP Encryption Key. Read more

mae.pennnet.com:
Navy SPAWAR turns to Promia for network-security software. Read more

www.techtv.com:
New Surveillance Proposals After the WTC Attack. Read more

www.sfgate.com:
Computer hacker -- vandal or terrorist? Read more

news.globetechnology.com:
War 2001: hacking the enemy to pieces. Read more

www.theregister.co.uk:
New anti-terror bill limits life sentence for hackers. Read more

www.computeruser.com:
Check Point mum on alleged Sudan bank hack. Read more

www.nandotimes.com:
Lawmaker proposes creation of cyber-National Guard. Read more

news.bbc.co.uk:
Turning against the web worms. Read more

www.philstar.com:
Cyberterrorism...Uuggghhh!!!! Read more

www.zdnet.com:
Zero-Knowledge pulls the mask off. Read more

hongkong1.cnet.com:
Net users lose a secret-alias tool. Read more

europe.cnn.com:
NSA offers supersecure Linux. Read more

www.msnbc.com:
Microsoft tries to allay security fears. Read more

www.smh.com.au:
Soft target Microsoft vows to make itself harder to hack. Read more

www.wired.com:
MS Security Plan: OK, Kind Of. Read more

www.theregister.co.uk:
Microsoft (finally) tries to make IIS secure. Read more

www.2600.com:
2600 MEETINGS FRIDAY. Read more

04 October 2001

New Trojans:
Ghost 2.0

WAY 2.4

www.securiteam.com:
Multiple Local Sendmail Vulnerabilities. Read more

www.securiteam.com:
Multi-Vendor Format String Vulnerability in ToolTalk Service. Read more

slashdot.org:
Huge security hole in Internet Explorer for MacOS. Read more

www.nandotimes.com:
DAVE WILSON: 'Hacktivists,' caught in web of hate, deface Afghan sites. Read more

www.usatoday.com:
Hijackers' e-mails sifted for clues Computer messages were sent uncoded. Read more

www.msnbc.com:
Access Denied. Read more

www.theregister.co.uk:
Zimmermann defends strong crypto against govt assault. Read more

www.businessweek.com:
Alternative Anti-Terror Bill Rejects Life Sentence For Hackers. Read more

news.cnet.com:
Revamped anti-terrorism bill hits House. Read more

interactive.wsj.com:
Media Set Limits on Word 'Terrorist' in News Reports. Read more

australianit.news.com.au:
Privacy the price of liberty? Read more

quote.bloomberg.com:
Wipro, Satyam Plan Disaster Recovery Services as Demand Rises. Read more

www.renesys.com:
Global Routing Instabilities during Code Red II and Nimda Worm Propagation. Read more

www.computing.vnunet.com:
Firms still unprepared for email viruses. Read more

www.guardian.co.uk:
Will the worms win their fifteen minutes of infamy? Read more

www.pcworld.com:
Harmless .EXE Files Fall to Virus Threat. Read more

www.techtv.com:
Firing (and Hiring) Hackers. Read more

www.fcw.com:
Human Firewall launches campaign. Read more

www.linux.com:
A Beginner's Introduction to Network Security. Read more

www.gulf-news.com:
Need for new IT-related laws - expert. Read more

www.silicon.com:
Barclays blunders again with online banking. Read more

www.vibrantmedia.com:
Microsoft "Mobilizes" Staff and Resources to Fight Viruses. Read more

www.nzherald.co.nz:
Microsoft steps up software security. Read more

australianit.news.com.au:
Microsoft to give free virus advice. Read more

www.washtech.com:
NIST Awards $5M to Boost Infrastructure Security. Read more

03 October 2001

New Trojans:
Nerte 6.0.4

Phoenix II 1.50

Guangwai Girl 1.0.b Server

xforce.iss.net:
Multi-Vendor Format String Vulnerability in ToolTalk Service. Read more

www.securiteam.com:
CGIEmail's Command Execution Vulnerability (cgicso). Read more

www.securiteam.com:
IBM High Availability Cluster Multi-Processing (HACMP) Vulnerable to a DoS. Read more

linuxtoday.com:
Conectiva Linux Security Announcement - groff. Read more

abcnews.go.com:
Code Book Found. Investigators Study Suspect Messages. Read more

www.theregister.co.u:
Bruce Schneier on crypto, the FBI, privacy and more. Read more

www.fortune.com:
Fear Along the Firewall
America's computer databases and satellite navigation systems are vulnerable to attack. Read more

www.zdnet.com:
Weak crypto blamed on civil libertarians. Read more

www.ananova.com:
Hackers post bin Laden support on government website. Read more

www.computerworld.com:
Info Security 'Teachers' Need More Learning. Read more

www.computerworld.com:
Bush taps Clarke as cyberdefense chief. Read more

abcnews.go.com:
FBI Lists Top Computer Risks. Read more

Internet Vulnerabilities to Cyberterrorism Exposed.

www.pcworld.com:
Congress Debates Security vs. Civil Liberties. Read more

www.theregister.co.uk:
Carnivore substitute keeps Feds honest. Read more

www.reuters.com:
Web Security Firm Among Those Hit by Attacks. Read more

www.wired.com:
Experts: Easy Installations Kill. Read more

www.newsbytes.com:
Code Red II Is Dead - Experts. Read more

www.abc.net.au:
Analyst estimates Internet virus hit eight million systems. Read more

web.lexis-nexis.com:
DATA BECKER Reveals Latest in Hacking Techniques with the Publication of The Hacker Report; New Book Brings Computer Security Knowledge to Consumers. Read more

computerworld.com:
Novell sues Microsoft over advertisement. Read more

02 October 2001

New Trojans:
Konik 0.7b

Remote Revise 1.0 by W@SyL. Now with download.

FR 1.56 lite Client

www.securiteam.com:
Compaq Web-Enabled Management Software Security Vulnerability. Read more

www.sunspot.net:
Bin Laden embraces technology to thwart U.S. intelligence efforts. Read more

www.antionline.com:
Hijackers' E-Mails Sifted for Clues Computer Messages Were Sent Uncoded. Read more

www.theregister.co.uk:
'Nimda fix' Trojan disguised as security bulletin. Read more

www.canoe.ca:
Attacks prompt security review. Read more

www.ananova.com:
IT executives urge senators for rethink on encryption. Read more

www.theregister.co.uk:
Microsoft mulls patch distribution with AV updates. Read more

www.securityfocus.com:
Macro Virus Protection in the Microsoft Office Line. Read more

web.lexis-nexis.com:
The evolution of malware. Read more

news.cnet.com:
Nimda resurgence falls flat. Read more

www.newsfactor.com:
Full Disclosure: How Much Security Info Is Too Much? Read more

www.canoe.ca:
FBI aims to squash bugs. Read more

www.chron.com:
FBI moves to increase computer security. Read more

www.siliconvalley.com:
FBI, computer industry join forces against viruses, worms. Read more

www.reuters.com:
IBM Says Attacks to Boost System Security Concerns. Read more

computerworld.com:
FBI, SANS Institute: Internet 'not ready' for attack. Read more

computerworld.com:
Online Attack Concerns Grow. Read more

www.eetimes.com:
Security, biometrics research likely to get more attention. Read more

computerworld.com:
Bush taps Clarke as cyberdefense chief. Read more

web.lexis-nexis.com:
CyberDigest - 30 August 2001. Read more

www.theregister.co.uk:
Experts demolish MS anti-Apache FUD. Read more

www.theregister.co.uk:
In the event of nuclear attack, your data is safe. Read more

01 October 2001

New Trojan:
Gift 2.3

How to Exploit Format String Vulnerabilities under Alpha Linux. Includes techniques and example code. Read more

www.thehackerschoice.com:
THC-WarDrive is a tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. Read more

sourceforge.net:
802.11 network tools - allow for detection of networks and services initially using wireless extensions for linux. Read more

www.securiteam.com:
3Com Home Connect Cable Modem Vulnerable to Denial of Service. Read more

www.securiteam.com:
Vulnerability in Amtote International Homebet Self Service Wagering System. Read more

www.securiteam.com:
HP UNIX /usr/sbin/swverify Exploit Code. Read more

www.securiteam.com:
CardBoard Greeting Card CGI Allows Remote Users to Execute Arbitrary Commands. Read more

www.latimes.com:
Computer Hacking a Form of Terrorism. Read more

www.vnunet.com:
Network down? Call out the National Guard. Read more

seattletimes.nwsource.com:
Computers: Protection sought against disruption from hackers. Read more

chicagotribune.com:
Terrorist attacks prompt high-tech security review. Read more

www.computeruser.com:
In response to attacks ICANN eyes security matters. Read more

www.govexec.com:
Transportation agencies called vulnerable to cyberattacks. Read more

www.vnunet.com:
US consumer groups attack XP. Read more

it.mycareer.com.au:
Official websites easy targets for hackers: report. Read more

news.zdnet.co.uk:
Toolkit plugs security gap in e-services. Read more

linuxtoday.com:
IBM developerWorks: Improving the security of open UNIX platforms. Read more

www.computeruser.com:
Security experts: Anna K. author's sentence too light. Read more

www.theregister.co.uk:
Kournikova virus kiddie gets 150 hours community service. Read more


Copyright© MegaSecurity.org