Cybercrime

Daily CyberCrime and Security Report for April 1, 2002


A daily survey of the latest cybercrime news from around the world.


InformationWeek: Help To Combat the Next Big Blended Threat 01-Apr-02 09:41:58 ET

Story Highlights:“No one knows when it will happen, but most security experts expect that the day is coming–and soon–when a sophisticated ‘blended threat’ attack will again wreak havoc on businesses’ networks…”

* * *

“Last year, Nimda and Code Red were the first to combine virus and worm propagation techniques with automated hacking capabilities in separate deadly programs, causing billions of dollars in damage to companies…”

Full Story on InformationWeek


The Register: Cumulative IE Patch for Malicious Cookies 01-Apr-02 07:55:54 ET

Story Highlights:“A fairly serious flaw in Internet Explorer which would enable a malicious Web page or e-mail to drop a cookie containing an HTML script on a victim’s machine and run it in the ‘Local Computer’ zone rather than the Internet zone to avoid restrictions has just been patched…”

* * *

“The script would run with the user’s level of permission, and could therefore do considerable damage depending on its design…”

Full Story on The Register


ABCNews: A Site for Cyber-Defense 01-Apr-02 07:41:27 ET

Story Highlights:“Since the Sept. 11 terrorist attacks, Americans have been warned to be on a heightened sense of alert to future attacks especially in cyberspace…”

* * *

“But what can you do to protect your part of cyberspace? The Internet has the answers…”

Full Story on ABCNews


InfoWorld: McAfee Ships ThreatScan 01-Apr-02 07:21:44 ET

Story Highlights:“Looking to extend the purview of its antivirus software and to help its customers discover network vulnerabilities that viruses might exploit, McAfee Security, a division of Network Associates, Monday announced the release of McAfee ThreatScan, a virus vulnerability assessment tool…”

* * *

“ThreatScan is a new application that works in conjunction with McAfee’s ePolicy Orchestrator management console to scan all IP (Internet Protocol)-addressable devices on a network and determine if those devices have any vulnerabilities…”

Full Story on InfoWorld


For more of the latest e-business and technology news from around the world, updated 24 hours a day, visit TechNewsWorld.com.


Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

Technewsworld Channels