|
News for 120199
contributed by Evil Wench
By applying a simple compression scheme (Neolite) to the well known
destructive virus WormExplorer it is possible to sneak the old worm by
antivirus software. This 'new' version of WormExplorer is being called
MiniZip. The worm uses MAPI-capable e-mail programs to propagate, such
as Microsoft Corp.'s Outlook, Microsoft Corp.'s Outlook Express and
Microsoft Corp.'s Exchange. At least twenty companies and several
thousand systems have been infected so far. (It is pretty sad that
with todays technology a simple compression routine is enough to bypass
antivirus technology. Pattern detection is not the answer. Sure hope the
AV companies have something better up their sleeves.)
ZD
Net
MSNBC
Associated
Press - via Baltimore Sun
|
contributed by Weld Pond
Staples Inc. has filed a lawsuit in US District Court in Boston charging
that "John Doe," an unidentified cyber intruder, illegally accessed the
company's Web site and damaged the company by stealing e-commerce
business. The defacement that occurred on October 9th, featured
advertisements for products at Home Depot. Staples hope to identify the
intruder shortly. (How do you sue an unknown person?)
Boston
Globe
Associated
Press
|
contributed by Ted
Yesterday Comet Systems Inc. was accused of collecting data on consumers
web surfing practices with their free cursor changing software. The
software Comet Cursor, is installed on over 16 million systems and
tracks web usage of over 60,000 web sites. Following rampant consumer
outcry over the practice Comet Systems has agreed to allow consumers to
delete the serial number used to track individual web surfing habits and
will also seek certification from Truste, the industry privacy watchdog
group. Truste's certification of Comet Systems could take 45 to 60 days.
Associated
Press - via San Jose Mecury News
|
contributed by Astroboyz and dj.tazz
The personal information on almost 2,700 Internet users in Manitoba
Canada was stolen and spread across the Internet. Users of the Videon
Wave's Internet cable services had thier account numbers, along with
customer names, addresses, phone numbers, user names and passwords
stolen. The intrusion into Videon systems took place almost two weeks
ago however the company never notified any of the effected customers.
The incident has not been reported to the local Police or the RCMP.
Winnipeg
Free Press
Does anyone have a better link? This one is about to expire.
|
contributed by Galleon
A 21-year-old student has been accused of illegally distributing over
170 titles of game software for different Nintendo machines. This is
the first case of an unauthorized delivery of game software via the
Internet in Japan.
Asia
Biz Tech
|
contributed by Weld Pond
A national program known as InfraGuard, developed by the FBI to promote
information sharing among law enforcement, industry, the academic
community and the public about computer network intrusions and computer
system vulnerabilities, was officially launched in Ohio yesterday. Over
200 people where expected at the kickoff meeting. (Watch for an
exclusive insiders report on InfraGuard coming soon to HNN.)
The Cincinnati
Post
|
contributed by Weld Pond
A national gun database, Online Lead, was activated Tuesday at all
331 branches of the Treasury Department's Bureau of Alcohol, Tobacco and
Firearms. The system is available to police and other local law
enforcement officials through ATF offices. The database included the
gun's make and
serial number, and the complete chain of sale from manufacturer to
wholesaler or distributor to the first retail sale by a federally
licensed gun dealer. Officials have said that security measures to
protect the database from malicious intruders has been taken but did not
elaborate.
Associated
Press
|
contributed by Nitr0BurN
We have received an unconfirmed report that Darkness, a member of the
group [sSh], has been raided due to his involvement with the defacement
of numerous .mil and .gov sites. It is rumoured that he was
specifically involved with (blackdog.larcmo.ecs.nasa.gov) and
(misr.larcmo.ecs.nasa.gov). It is belived that his ISP reported him
after noticing suspicous activity on their servers. Again we have
absolutely no confirmation of this information.
[sSh]
|
|
|