|
News for 111798.html
contributed by demoniz
HcV, the hacking group that has been linked to the Rootshell, Angel Fire, funkheim and most recently the Hack-Net hacks speaks out to BHZ. BcV has targeted AntiOnline as its next hack victim.
HcV interview
|
BO monitoring tool released
|
|
contributed by Space Rogue
A Back Orifice monitoring tool has been released by Agents technologies Corp to help ISPs identify which users have been infected with the back door program.
BO Tracker Agent will scan an ISPs IP range while customers are online. If it finds BO installed on a machine it can then send out an email to the customer warning them and explaining how to remove the program. BO Tracker Agent starts at $5,000 for 1,024
IP addresses.
Internet World
|
All XS4ALL witnesses denied
|
|
contributed by demoniz
Things are looking bad for XS4ALL. The Dutch ISP has been summoned into
court this Friday in connection to its refusal to obey a government
ordered wire tap. Today the district attorney denied all called witnesses
and expert witnesses of XS4ALL. The district attorney substantiated his
denial by saying the called witnesses could not contribute to the fact
that XS4ALL refused to comply with the court order to monitor all traffic of one of its
users. According to XS4ALL the court order was not within the limits of the law.
XS4ALL - In Dutch
XS4ALL - Background info in English
|
Did milw0rm steal the hack?
|
|
contributed by demoniz
The dissection of a hack. A step by step blow of how t3k-9 and IronLogik beat milw0rm when hacking into the Bhabha Atomic Research Center in India over the summer. Fairly technically detailed for a mainstream media article.
Forbes
|
Feds spend dough to prevent cyberattack.
|
|
contributed by Space Rogue
Funds may be included in the FY2000 budget for protecting US Government computers from physical and cyber attack.
Federal Computer Week
|
contributed by _GryPhoNN_
Seems Back orifice is popular in Australia. Shake Communications scanned 92 Australian ISP's and found 1400 users affected. The report also says about 79% of the major ISP's in Australia '...had one or more users infected with the virus trojan.' The repor
t goes on to say that only 4% of providers have implemented 31337 port blocking. One hacker has already been busted because he didn't disable caller I.D. on His phone.
Shake Communications
Wired
|
contributed by Alascom
Yesterday we mentioned that a Washington DC area hacker would be releasing a major hack tool.
It would appear that the license mechanism in the ISS Security Scanner can be easily bypassed. Once bypassed the demo version of the scanner, available from the ISS website for free, can be made to allow the scanning of any host.
The demo usually limits scanning to 127.0.0.1 or the localhost. With this soon to be released tool the demo can be made to scan any host or even entire networks.
We will provide more information when it becomes available.
ISS Security Scanner Download page
|
|

|