|
News for
081699
contributed by evilwench
They aren't giving up. The Cyberspace Electronic Security Act is
currently being drafted by the Clinton administration. In this latest
bill, the administration proposes that law enforcement agents have
access to decryption keys held by recovery agents. The proposed law
also allows the government to obtain search warrants to find decryption
keys if they are not held by recovery agents. (Maybe the feeling is
that if they keep submitting new bills, one of them, eventually, will
get through. Unfortunately they are probably correct.)
Federal
Computer Week
|
contributed by Brian Oblivion
Cyberspace Electronic Security Act, CALEA, OECD, The Wassenaar
Arrangement, SAFE, HR-2616, S798, HR-2617, UCITA, and on and on and on.
Just what the hell is going on? The government wants crypto controls
and the public doesn't.
Buffer Overflow
|
contributed by ladysharrow
After being chastised by his former employer, Scott Reid, 23, broke
into the The Vodaphone paging network and told 32,000 international
users that they had won a free car. To claim the car all they needed to
do was call GS (UK), his former employer. GS (UK), is a Nottingham firm
supplying software for the embroidery industry. This caused a massive
denial of service against the companies phone system that lasted for
three days. He also emailed the colormatch virus to GS (UK) and other
firms in the embroidery business. He has been sentenced to three months
in jail and has had his computer confiscated.
The
UK Telegraph
|
contributed by mdfranz
Besides numerous bug fixes and feature enhancements, this latest
version of Trinux now provides several new or previously unavailable
tools. Including ngrep, hunt and evilwm. Trinux is a secure
distribution of Linux that boots from floppy into RAM. If you have
console access you own the box.
Trinux
|
contributed by dis-crete
A report released by Mi2g software claims that the Black Hand, a
Serbian paramilitary group, attacked more than 170 organizations
worldwide via the internet during the Kosovan conflict. Evidently M12g
was able to trace these attacks that were spread out among various
organizations back to people associated with the Black Hand group in
Belgrade. (Sure would like a copy of this report to pick apart, too
bad they make you pay for it. Hmmm, interesting, they also sell
security consulting services. Can you say FUD?)
The
Times
Mi2g
|
contributed by Dr. Who
If you didn't make it to Defcon, or blew your dough at the roulette
table you can still get your Defcon 7 t-shirts. Leftover Defcon 7
shirts are being sold on E-Bay.
E-Bay
Don't forget to grab your HNN shirt as well.
HNN T-Shirts
|
contributed by archive
They are back and raring to go. Electronic Underground Affiliation
has released the new August edition of the EUA Monthly. Coverage of
the Mitnick Trial * LAN WAN Security * Phreaking for Dummies * Zip
Boxes * and lot's more. This zine is done in PDF format to be web
friendly.
EUA Monthly
|
contributed by BinaryZer0
Black.Box is an electronic magazine dealing with security issues,
technology, documentation, information, various OS information, as well
as humour-related articles.
Black Box
|
|

|