Stories by Dan Verton

  • Multinational consensus pegs top 20 net vulnerabilities

    The US Department of Homeland Security (DHS), along with its Canadian and British counterparts and the System Administration, Networking and Security (SANS) Institute, has released a list of the top 20 security vulnerabilities most often exploited by criminal hackers.

  • Anti-Microsoft security report mired in politics

    A report that might have been a valuable contribution to the study of the security ramifications of monolithic IT infrastructures has instead become a pawn in the unending political battle between pro- and anti-Microsoft factions. And it has cost one of the co-authors his job.

  • Gates envisions secure future in world of real threats

    The threats of massive digital disruptions and other forms of cyberterrorism are real, but the effort to defend against those attacks doesn't mean Americans must give up their right to privacy, Microsoft chairman Bill Gates said on Wednesday.

  • US Army Web servers hacked

    Hackers have infiltrated an undisclosed number of US Army Web servers, taking advantage of a previously undisclosed buffer overflow vulnerability in a component of Microsoft's Windows 2000 that is used to manage the Web Distributed Authoring And Versioning (WebDAV) protocol.

  • Bin Laden associate warns of cyber attacks

    A London-based fundamentalist Islamic cleric with known ties to Osama bin Laden said al-Qaeda and various other fundamentalist Muslim groups around the world are actively planning to use the Internet as a weapon in their "defensive" jihad, or holy war, against the West.

  • Black Ice scenario sheds light on future threats

    A little-known exercise held last year to help federal, state and local officials in Utah prepare for a possible terrorist attack during the 2002 Winter Olympics may hold some of the most important lessons for critical infrastructure protection in the aftermath of the September 11 terrorist attacks, according to a key official involved in the exercise.

  • U.S. eBay users hit by alleged fraud ring

    More than half a dozen eBay users last week alerted the online auction company to an identity theft and a series of fraudulent auctions allegedly stemming from Ukraine. However, the victims of the scam are accusing eBay of being slow to respond because of its 30-day waiting policy for accepting fraud complaints online.

  • US ATTACK: FBI to investigate Internet's role in attacks

    More than 22,700 tips have poured into the special Web site set up by the FBI to manage leads in the investigation of Tuesday's terrorist attack against the World Trade Center in New York and the Pentagon, Attorney General John Ashcroft said today.

  • US ATTACK: FBI issues cyberthreat advisory

    The FBI Counterterrorism division here has issued an advisory to all public- and private-sector members of the InfraGard program to beef up physical and cybersecurity efforts in the aftermath of yesterday's deadly terrorist attacks against the World Trade Center in New York and the Pentagon.

  • IBM enlists ISVs in war against Oracle

    Strategic alliances with independent software vendors (ISV) have proved to be a successful way for IBM to gain new customers for its DB2 database software. And IBM appears to be getting help on that front of the database war from an unlikely source: Oracle.

  • Users urged to take fast action against Code Red

    The US federal government, Microsoft Corp. and multiple IT security research groups are jointly warning about an expected re-emergence of the Code Red worm today and are urging users of Microsoft's Web server software to take "immediate action" to protect their systems.