Daily Cybercrime and Security Report for August 27, 2001

A daily survey of the latest cybercrime news from around the world.

ABCNews: U.S. Troops Take on Role of North Korean Invaders in Computer War Games 27-Aug-01 08:25:54 ET

Story Highlights:“Some 10,000 American troops are taking part in an annual joint exercise that has drawn verbal attacks from the communist North since it was first launched in 1976…”

* * *

“This year was no exception, with North Korea accusing the United States of ‘a mock cyber warfare drill’ to hone its skills at spreading computer viruses and hacking into computer networks…”

Full Story on ABCNews

MSNBC: Experts Say ‘Good Worm’ is Bad 24-Aug-01 16:37:55 ET

Story Highlights:“A new ‘worm’ software program that purports to rid computers of malicious viruses actually leaves the viruses intact and chews up files instead…”

* * *

“The worm, dubbed Win32.All3gro.A, is only posing as a ‘good worm,’ the experts said, highlighting the dangers of a new fad for creating self-propagating applications to delete malicious programs that resurfaced after the Code Red II worm scare early this month…”

Full Story on MSNBC

[email protected] Week: Offensive Trojan Horse Breaks Windows PCs 24-Aug-01 16:09:21 ET

Story Highlights:“A malicious program that masquerades as a Web page or HTML e-mail has dire consequences for those who fall for its ruse…”

* * *

“Known as Trojan.Offensive, the program takes advantage of a 10-month-old flaw in Microsoft’s version of the Java Virtual Machine to overwrite critical system settings — called the registry — leaving Windows computers unusable…”

Full Story on [email protected] Week

The Register: MS Bugware Blamed for ‘Inadvertent’ Hack 27-Aug-01 08:33:08 ET

Story Highlights:“Possible Good Samaritan Brian West of Oklahoma was using MS FrontPage when he learned (inadvertently, he claims) that he could gain privileges on the local Poteau Daily News Web site without authentication…”

* * *

“After bringing this gaffe to the paper’s attention, he got into a bit of hot water with the Feds for ‘exceeding authorization’ on the machine…”

Full Story on The Register

For more of the latest e-business and technology news from around the world, updated 24 hours a day, visit

Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

More by Elizabeth Blakey
More in Cybercrime

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels