Daily CyberCrime and Security Report for September 30, 2002


A daily survey of the latest cybercrime news from around the world.


CNN: Secret Service Probes Wireless Networks 30-Sep-02 11:12:07 ET

Story Highlights:“Secret Service agents are putting a high-tech twist on the idea of a cop walking the beat…”

* * *

“Using a laptop computer and an antenna fashioned from a Pringles potato chip can, they are looking for security holes in wireless networks in the nation’s capital…”

Full Story on CNN


PCWorld: Talk of Iraq Conflict Raises Cyberattack Fears 27-Sep-02 11:09:20 ET

Story Highlights:“If history is a guide, any Bush administration plan to remove Saddam Hussein from power in Iraq would likely set off a firestorm of hacker activity targeting U.S. networks and infrastructure…”

* * *

“And those attacks could be greater in number and affect a broader cross-section of U.S. businesses than anything seen before, according to intelligence experts…”

Full Story on PCWorld


The Register: U.S. P2P Hacking Bill Draws Support, Critics 30-Sep-02 05:09:26 ET

Story Highlights:“US lawmakers last week sat down with proponents and opponents of a controversial bill that would allow copyright holders to use techniques critics compare to ‘hacking’ to prevent content being pirated on peer-to-peer networks…”

* * *

“At a hearing of the House Judiciary Committee’s Subcommittee on Courts, the Internet and Intellectual Property, a senior record industry executive and the bill’s sponsors argued that the bill is the best way to stop P2P being used to pirate, while a public domain lobbyist said the bill was too vague and potentially dangerous…”

Full Story on The Register


PCWorld: Hole in Open Souce File Viewers Lets Hackers In 27-Sep-02 16:10:21 ET

Story Highlights:“A security flaw in commonly distributed file-viewing programs may make it possible for attackers to use Adobe Systems PDF and PostScript files to run malicious code on machines using the Unix or Linux operating systems…”

* * *

“The open source viewing programs, named gv, kghostview and ggv, are used to view PDF and PostScript files and are commonly packaged with popular versions of the Linux operating systems including those by Red Hat and the Debian Project, as well as common flavors of Unix such as those by Sun Microsystems…”

Full Story on PCWorld


InformationWeek: Process for Publicizing Software Flaws Discussed 27-Sep-02 23:08:46 ET

Story Highlights:“A group of software companies, security vendors, and researchers has launched the Organization for Internet Safety to develop a standard process for reporting security flaws in software…”

* * *

“Some security experts release information about flaws before giving vendors time to patch holes, while others release code that hackers can use to exploit flaws and attack vulnerable systems…”

Full Story on InformationWeek


For more of the latest e-business and technology news from around the world, updated 24 hours a day, visit TechNewsWorld.com.


Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

How often do you update your passwords?
Loading ... Loading ...

Technewsworld Channels