The network community and the security community need to collaborate as much as possible to defeat the threats. I'm British and i'm hoping to make UK as secure as possible. We can only do this by pulling together and reporting intelligence between community's, either if that's on an open list such as Nanog or by invitation only lists run by law enforcement. It doesn't matter as long as both community's are focused on cyber security. Many thanks, Andrew On Sat, Apr 18, 2009 at 3:07 AM, Steve Pirk <orion@pirk.com> wrote:
I get it now... Chaim Rieger = netdev Nice trick.
-- Steve
On Sat, 18 Apr 2009, Chaim Rieger wrote:
And I want cnet to not report this crap.
They glamorise it. ------Original Message------ From: andrew.wallace To: nanog@nanog.org To: n3td3v Subject: Re: Michael Mooney releases another worm: Law Enforcement / Intelligence Agency's do nothing Sent: Apr 17, 2009 18:38
So if Al-Qaeda blow up a shopping centre and the guy who masterminded it turns out to be 17 he gets a job in MI5?
OH MY GOD.
On Sat, Apr 18, 2009 at 2:28 AM, Jack Bates <jbates@brightok.net> wrote:
andrew.wallace wrote:
I want this individual made an example of and im not joking.
And I'd like an example made of companies that ignore reports of security flaws and leave their customers open to such worms; not to mention giving the impression to misguided teenagers that the only way they will be heard is to release a worm.
Historically, I believe some companies have ignored security concerns until someone (sometimes non-maliciously) released a worm. Of course, even non-malicious worms can have unpredictable results which result in catastrophic behavior. The earliest examples predate my residence on the network, but I've read a small bug made them extremely bad.
Jack
Sent via BlackBerry from T-Mobile