viruses infect 37 computers

1
Abstracts of Recent Articles and Literature illegal software a disciplinary offcnce. The FAST Unix group bclicvcs that 50% of Unix software currently installed is illegal. The group was formed in the UK by: Informix, Santa Cruz Operation (SCO) and U m‘pl cx. Charles Anderson, a founding member of the group, commented, “With much Unix piracy occurring at the point of salt, a few rogue suppliers jcopardisc both the reputation of the industry and the businesses of their custonlcrs.n Computer Weekly, April 2, 1992, p. 2. Bombed Out. Computer security consultants have reported an incrcasc in incidents of mal- practice by contract programmers. Programmers arc often commissioned to design and implement systems for companies which have little in-house IT cxpcrtisc. Thcsc systems may well bc written in a high level database language such as: dBase, Paradox or Advanced Revelation, which can bc tokcnizcd to incrcasc operational speed. Often, the company will have cntcrcd into a maintcnancc contract with the dcsigncr, and this position of knowledge and trust can easily bc abused if the dcsigncr wcrc to install a logic bomb into the system. The system would then crash, the pro- grammcr called out (at a price) and the bomb rcsct to go off at a later date. Steps that can bc taken to minimize the risk of such malpractice include: system dcvclopcd with auto-logging software; obtain topics of source code and passwords used during dcvclopmcnt; possession of source code file for each of compiled or tokcnizcd object files; peer rcvicw to analyst source code; obtain assistance from the company that supplied the programming language. Virus Bulletin, May 1992, p. 2. Viruses Infect 37 Computers. The Japancsc Information Technology Promotion Agency, an organization affiliated with the Ministry of Intcr- national Trade and Industry (MITI), has stated that the number of systems damaged through virus infection has been rapidly increasing. Thirty-scvcn damaging computer viruses wcrc rcportcd bctwccn January and March this year, whilst only 57 casts wcrc reported during the whole of 199 1. An agency official said that thcrc has been incrcascd public concern over viruses as a result of the Michel-Angelo outbreak, although the number of damage claims currently filed relating to virus infection is probably only the tip of the iceberg. The first reported case of a computer virus in Japan was discovered in the late 1980’s, and MITI’s campaign to control the spread of viruses was started in April 1990. TheJapan Times, May 3, 1992. Typeface Vendors Gang Up on Pirates, Tony Smith. Following a recent US ruling that computer fonts arc protected by software copyright laws, a number of typcfacc vendors have formed an anti- piracy grouping. The group will stand alongside the BSA and FAST, and prcscnt a united strategy on font licensing and protection. Adobe’s manager for type products, Tony Arcari, described the group as a loose affiliation and said the firms would pay bounties to dealers who play an active role in fight- ing font piracy. MicroScope, March 25, 1992, p. 1. Rain Sickens Data Centre. Wycombc Gcncral Hospital, in Buckinghamshirc, UK, had its ICL 2958 mainframe put out of action when pipes running along the data ccntrc’s ceiling burst and fifty gallons of water pout-cd straight through the machine and over the main storage boards. The patient administration system was lost immcdiatcly and administration was handled manually for six days while cngincers worked to restore the main- frame. Patient records stored on back-up tapes wcrc rescued from the flood. Computing, April 30, 1992,~. 1. US Banks Can Buy Cover Against Computer Crime, Mike Moelkr. US banks arc now able to buy a $50 million insurance protection against computer crime and communication failure. The policy, Accent, from Aetna Casualty and Surety, provides cover from fraud involving systems, wire money transfers, forged faxes, viruses, software piracy, toll-call fraud, voice initiated money trans- fers and scrvicc bureau faults. Paul Healy, vicc-pre- sident of fidelity bonds at Aetna, commented, “Right now WC arc concentrating on banks in the US but in the future WC may move internationally. 488

Post on 21-Jun-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Abstracts of Recent Articles and Literature

illegal software a disciplinary offcnce. The FAST Unix group bclicvcs that 50% of Unix software currently installed is illegal. The group was formed in the UK by: Informix, Santa Cruz Operation (SCO) and U m ‘pl cx. Charles Anderson, a founding member of the group, commented, “With much Unix piracy occurring at the point of salt, a few rogue suppliers jcopardisc both the reputation of the industry and the businesses of their custonlcrs.n Computer Weekly, April 2, 1992, p. 2.

Bombed Out. Computer security consultants have reported an incrcasc in incidents of mal- practice by contract programmers. Programmers arc often commissioned to design and implement systems for companies which have little in-house IT cxpcrtisc. Thcsc systems may well bc written in a high level database language such as: dBase, Paradox or Advanced Revelation, which can bc tokcnizcd to incrcasc operational speed. Often, the company will have cntcrcd into a maintcnancc contract with the dcsigncr, and this position of knowledge and trust can easily bc abused if the dcsigncr wcrc to install a logic bomb into the system. The system would then crash, the pro- grammcr called out (at a price) and the bomb rcsct to go off at a later date. Steps that can bc taken to minimize the risk of such malpractice include: system dcvclopcd with auto-logging software; obtain topics of source code and passwords used during dcvclopmcnt; possession of source code file for each of compiled or tokcnizcd object files; peer rcvicw to analyst source code; obtain assistance from the company that supplied the programming language. Virus Bulletin, May 1992, p. 2.

Viruses Infect 37 Computers. The Japancsc Information Technology Promotion Agency, an organization affiliated with the Ministry of Intcr- national Trade and Industry (MITI), has stated that the number of systems damaged through virus infection has been rapidly increasing. Thirty-scvcn damaging computer viruses wcrc rcportcd bctwccn January and March this year, whilst only 57 casts wcrc reported during the whole of 199 1. An agency official said that thcrc has been incrcascd

public concern over viruses as a result of the Michel-Angelo outbreak, although the number of damage claims currently filed relating to virus infection is probably only the tip of the iceberg. The first reported case of a computer virus in Japan was discovered in the late 1980’s, and MITI’s campaign to control the spread of viruses was started in April 1990. The Japan Times, May 3, 1992.

Typeface Vendors Gang Up on Pirates, Tony Smith. Following a recent US ruling that computer fonts arc protected by software copyright laws, a number of typcfacc vendors have formed an anti- piracy grouping. The group will stand alongside the BSA and FAST, and prcscnt a united strategy on font licensing and protection. Adobe’s manager for type products, Tony Arcari, described the group as a loose affiliation and said the firms would pay bounties to dealers who play an active role in fight- ing font piracy. MicroScope, March 25, 1992, p. 1.

Rain Sickens Data Centre. Wycombc Gcncral Hospital, in Buckinghamshirc, UK, had its ICL 2958 mainframe put out of action when pipes running along the data ccntrc’s ceiling burst and fifty gallons of water pout-cd straight through the machine and over the main storage boards. The patient administration system was lost immcdiatcly and administration was handled manually for six days while cngincers worked to restore the main- frame. Patient records stored on back-up tapes wcrc rescued from the flood. Computing, April 30, 1992,~. 1.

US Banks Can Buy Cover Against Computer Crime, Mike Moelkr. US banks arc now able to buy a $50 million insurance protection against computer crime and communication failure. The policy, Accent, from Aetna Casualty and Surety, provides cover from fraud involving systems, wire money transfers, forged faxes, viruses, software piracy, toll-call fraud, voice initiated money trans- fers and scrvicc bureau faults. Paul Healy, vicc-pre- sident of fidelity bonds at Aetna, commented, “Right now WC arc concentrating on banks in the US but in the future WC may move internationally.

488