<
 
 
 
 
×
>
hide
You are viewing a Web site, archived on 08:23:06 Oct 15, 2004. It is now a Federal record managed by the National Archives and Records Administration.
External links, forms, and search boxes may not function within this collection.
Navy Information Assurance. Dedicated to the Protection of United States Navy Information Systems, Afloat and Ashore. The current Navy Information Operations Condition (INFOCON) level is ALPHA.
 
Aluminum Bar Separator
This is an Official U.S. Navy Web Site.
Image of an Eagle
Blue Background PKI Page Documents Subscribe Training INFOSEC Products and Services Blue Background
Blue Background Home Page PMW 161 Advisories Anti Virus Tools COMPUSEC Customer Service Blue Background

Navy Links
item Navy Homepage
item Navy Recruiting
item Navy FOIA Online

Antivirus Tools
item Antivirus Software
item Virus Alerts
item INFOSEC News
item Submit a Virus

Fleet INFOSEC
item Fleet Docs
item Fleet IA Docs
item PP Presentations
item Privacy Act (1974)

Cross-Domain Security
item CDS Website
item CDSO Documents

PKI
item PKI Install Root

DoD
item IA Database

Forum INFOSEC Tips Enter PKI-Enabled Site Ask ITAC
INFOSEC 

 Chat

Contact the INFOSEC TECHNICAL ASSISTANCE CENTER (ITAC)
Toll Free: 1-800-304-4636
or
Contact the Navy Integrated Call Center (NICC)
Toll Free: 1-877-418-6824

Infosec News:

The New INFOSEC Message Board is now available. Click here for more information (PKI Cert required).

IAVA 2004-A-5001
BUFFER OVERRUN VULNERABILITY COULD ALLOW REMOTE CODE EXECUTION: This message provides information on the buffer overrun vulnerability with MS Windows processing of .jpeg files.

NAVCIRT ADVISORY 04-17
MANDATORY IP BLOCK LIST: This message provides information on the following Internet protocol (IP) addresses that have been recently been reported probing and/ or attempting illicit access to navy computer systems.

Photograph of a Sailor operating a computer.

Virus Alerts:

W32.Mydoom Variants info (Date: Ongoing) From Symantec, Trend Micro, and NAI
W32.Mydoom@mm is a mass-mailing worm that opens a backdoor and uses its own SMTP engine to spread through email.

W32.Bagle/ Beagle Variants info (Date: Ongoing) From Symantec, Trend Micro, and NAI
W32.Beagle is a mass-mailing worm that uses its own SMTP engine to spread through email and opens a backdoor on TCP port 1080. The email's subject line, body, and attachment name vary. The attachment will have a .com, .cpl, .exe, .hta, .scr, .vbs, or .zip file extension.





Questions or Comments?
Contact webmaster@infosec.navy.mil

SPAWAR Systems Center Charleston Logo
Administration provided by the SPAWAR Systems Center

Space and Naval Warfare Systems Center, Charleston SC
(SPAWARSYSCEN)
P.O. Box 190022
North Charleston, SC. 29419-9022

itac@infosec.navy.mil

This Website is Section 508 Compliant

Click HERE to view the Privacy Policy

Last Modified on: Mon Oct 04 07:44:18 EDT 2004