It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
1.24 Security Problems
in computers and communications: Penetrations, Trojan Horses, Viruses, Time-bombs, Scams, Blackmail, and Other Problems:
..... Recent yet-to-be-merged security items:
***** Apologies. I am way behind in coping with the pervasive occurence of these cases and trying to distribute them sensibly within the subtopics. PGN
SH UK Sunday Business reported intruders seized control of a British military satellite, and demanded blackmail (R 20 23)
Sf Security flaw with frames in browsers (R 20 09); risk of coopted back - not just in JavaScript (R 20 11-12)
SAO 3Com security advisory admits to undocumented backdoor for CoreBuilder and SuperStack II switches (R 20 07)
Sf Seeming SecurID flaw granting root access on login (R 20 10) actually NIS client code flaw (R 20 11)
fS Excel 4.0 and Excel 98 mixes up hard disk and floppy, with nasty potential consquences (R 20 08); Excel messes up large numbers (R 20 14)
Sf Internet Explorer 4.01 Son of Curatango cut-and-paste flaw (R 20 09)
hi Unexpected Internet Explorer behavior when copy/pasting (R 24 24)
hi Internet Explorer changes due (after patent ruling): What You Can Expect (R 24 25) and what does not work (R 24 25)
Sf NT server worm attacks 10 MCI Worldcom networks (R 20 13)
S Win98 Trojan Horse in installation of Java/Y2K upgrade (R 20 13)
SAO PalmPilots can scan remote-control infrared codes (R 20 10,13); risks of RF garage-door openers, infrared alarm systems, etc. (R 20 13)
SM Auctioning of frequency spectrum undermines Pentagon's ability to counter interference risks on cruise missiles (AW&ST item) (R 20 07)
Descriptor Symbols
The following descriptor symbols characterize each entry.
! = Loss of life/lives; * = Potentially life-critical or safety problem
V = Overall system or subsystem surViVability problems (with respect to diVerse adVersities, including attacks and malfunctions). Startlingly many cases fit this category; many V-unflagged cases also represent failures to continue performing properly, or delays, or other cases of misuse that could have led to much more serious survivability problems.
$ = Loss of resources, primarily financial
S = Security/integrity/misuse problem; P = Privacy/rights abuse or concern
H = Intentional Human misuse (e.g., user-administrator-operator-penetrator)
h = Accidental Human misuse or other inadvertence
a = Event attributed to animal(s)
I = Insider; O = Outsider; A = Inadequate Authentication, Access control, or Accountability
d = System Development problems
e = Improper Evolution/maintenance/upgrade. (H,h,i,f,d,e involve human foibles.)
r = Problems with Requirements for system or operation (including the overall system concept)
f = Flaws (or Features in design, or hardware/software implementation)
i = MisInterpretation/confusion/human errors at a man-system Interface; documentation problems
m = Hardware Malfunction attributable to system deficiencies, the physical environment, acts of God, etc.