Educational CyberPlayGround NetHappenings News, Headlines, and Resources

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Mon, 09 Oct 2006 23:49:50 -0400

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
NetHappenings Mailing List ©1993

Subscribe - Unsubscribe - EmailPreferences 
http://www.edu-cyberpg.com/Community/NetHappenings.html


Educational CyberPlayGround Community Mailing Lists http://www.edu-cyberpg.com/Community/

Advertise NetHappenings Guidelines
http://www.edu-cyberpg.com/Community/Subguidelines.html
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>



Google-YouTube deal joins Net search and video forces
http://tinyurl.com/qu6lc
YouTube co-founders Chad Hurley, left, and Steven Chen get creative with a camera and laptop in March.
A landmark in the future of media happened over a meal at Denny's.
Last week, as multiple offers swirled around YouTube, Google
co-founder Larry Page and CEO Eric Schmidt met YouTube founders
Chad Hurley and Steve Chen at a Silicon Valley Denny's.
"We discussed the possibilities and the excitement we both shared"
for video on the Internet, Hurley says. "They have the resources to help us accelerate that."
STORY: Google snaps up YouTube for $1.65B
http://tinyurl.com/pqoyj
Google is buying YouTube for $1.65 billion, the companies said Monday. The biggest force in search and Internet advertising is soaking up the biggest force in online video. But the combination means more than that.
<snip>


1)
The Data Theft Scandal
http://www.channel4.com/news/microsites/D/dispatches2006/data_theft/index.html
In a 12-month undercover investigation, Turton infiltrates criminal
networks which trade British consumers' bank and other confidential
information for huge profits in India, the world's new call centre
capital.

2)
Indian data theft 'exposed'
http://www.theregister.co.uk/2006/10/05/india_exposed/
A man in India offered to sell the front man of a Channel 4 sting
operation the credit card details of 200,000 people, the programme
Dispatches will reveal tonight.
The programme makers were inspired by a sting operation mounted on an
Indian call centre last year by The Sun newspaper, in which a man
allegedly sold the bank details of 1,000 British people to a journalist.
The Sun story helped stoke a backlash against outsourcing to India. The
Sun was subsequently accused of duping its quarry and fabricating the
story about fraud in India.

Call center sting... details after the show
http://www.indiainfoline.com/news/innernews.asp?storyId=17059&lmn=1
We have no further update from them (Channel 4) on their intent to share
the details: NASSCOM
UK-based Channel 4s sting operation, a year long effort to locate
security lapses in the call center industry has caused a flutter and
(National Association of Software and Services (NASSCOM) sought evidence
behind the report and co-operate fully and wholeheartedly. This would
have enabled prompt action against the alleged criminals. But Dispatches
refused to provide that information, prior to airing of the programme.



3)
Sex, gambling and computer game sites being
abused by Department of Interior
http://tinyurl.com/mork2
The title of a report issued this week by the Department of Interior's
Inspector General -- "Excessive Indulgences: Personal Use of the
Internet at the Department of the Interior" -- pretty much says it all,
but here's a bit more.

4)
Ghana: Cyber Crimes in Ghana
http://allafrica.com/stories/200610040856.html
With the increasing threat of cyber crimes to Ghana's aim of becoming
the hub of the information super-highway on the west coast of Africa,
Information Communication Technology (ICT) experts in the country have
suggested the establishment of a well-equipped and independent national
cyber crime unit to fight ICT crimes, especially cyber crimes in the
country.

5)
Computer System Under Attack
http://www.washingtonpost.com/wp-dyn/content/article/2006/10/05/AR2006100501781.html
Hackers operating through Chinese Internet servers have launched a
debilitating attack on the computer system of a sensitive Commerce
Department bureau, forcing it to replace hundreds of workstations and
block employees from regular use of the Internet for more than a month,
Commerce officials said yesterday.
The attack targeted the computers of the Bureau of Industry and
Security, which is responsible for controlling U.S. exports of
commodities, software and technology having both commercial and military
uses. The bureau has stepped up its activity in regulating trade with
China in recent years as the United States increased its exports of such
dual-use items to the growing Chinese market.


6) Code Search joins hackers' toolbelt http://weblog.infoworld.com/techwatch/archives/008244.html No sooner had Google launched its Code Search feature http://www.google.com/codesearch than folks figured out (surprise, surprise) that it's a pretty good tool for finding holes in software, too, as this Securiteam blog entry shows. Turns out that intrepid developers put some pretty good "tells" into their code, especially in the form of artlessly named functions and other "notes to self" planted in comments that were never meant to see the light of day. Google has shown us sooo many times before how it can lay bare that which was not meant to be seen. It's no different with uncompiled source code. So developers -- clean up that code before the Googlebot finds it first! My favorite Google Code Search hack so far? "backdoor password" (courtesy of Chris at Vulnwatch)

7)
Marketers Miss the Mark on Privacy Crisis Containment
http://www.destinationcrm.com/articles/default.asp?ArticleID=6381
Despite all of the press and political rhetoric regarding security
concerns, only 29 percent of marketers say that their firm has a crisis
containment plan in case of a security breach, according to the findings
of a CMO Council report, "Secure the Trust of Your Brand: How Security
and IT Integrity Influence Corporate Brands." Without such a plan and
other security strategies in place, companies are at risk of losing
hundreds of millions of dollars in market value and through loss of
reputation and brand trust, according to Scott Van Camp, CMO council
editorial director and author of the study.

8)
Hacker attacks hit home computers 50 times a night
http://technology.guardian.co.uk/news/story/0,,1891177,00.html
Home computers can be attacked by hackers more than 50 times a night,
the results of an experiment showed today.
Every time a test PC was connected to the internet, it was targeted by
viruses and attempts to gain access to the information it contained.
The experiment, carried out by the BBC News website, used a "honeypot"
PC, which looked like a normal computer to potential hackers but
secretly recorded every attempt to gain access to it.

9)
The Military Education/University Industrial Complex
The Automation of Higher Education
http://tinyurl.com/jpz8p

"Getting Together at Educause"
The annual Educause conference brings together company and
college officials from all over the country to discuss recent
trends in higher education and technology. Officials are also
using this year's event in Dallas to announce strategic
partnerships between their organizations. The IMS Global
Learning Consortium, a nonprofit organization that creates
education-technology standards, has announced the development of
open standards for online learning to be adopted by least 30
organizations. Called the Common Cartridge, the production
standards for e-learning systems and their contents will allow
faculty members to exchange online course information betweem
different technology platforms. Among the organizations signing
on to the new standards are the Sakai Project, an open-source
software organization; McGraw-Hill Education, a publishing
company; and Angel Learning, a course-management-software
company. Products made under the new standards could be
available as soon as spring 2007, IMS officials said. In a
separate announcement at Educause, Blackboard Inc., the
education-software company, and SAP, which sells administrative
technology, have unveiled their own partnership to integrate
their platforms. The two giants in higher education are offering
a Web service that will allow users to share information between
the two companies' administrative and course-management
technology systems. The companies said the partnership would not
only add convenience, but would also make it easier for college
officials to track educational outcomes of students and
institutions. --Dan Carnevale

10)
Medicare and Medicaid Security Gaps Are Found
http://www.nytimes.com/2006/10/08/washington/08health.html
WASHINGTON, Oct. 7  Federal investigators say they have found serious
computer security flaws that could lead to the improper disclosure of
sensitive medical information on people enrolled in Medicare and
Medicaid.
In a new report, the investigators, from the Government Accountability
Office, said key information security controls were missing from a huge
communication network used by the federal Centers for Medicare and
Medicaid Services.
As a result, they said, sensitive, personally identifiable information
could be improperly modified, disclosed or deleted. Moreover, the report
said, these weaknesses could lead to disruptions in services to millions
of Medicare and Medicaid beneficiaries.

11)
International Film and TV Production Directory +
http://www.edu-cyberpg.com/Arts/Film_Web_Site.html

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Copyright statements to be included when reproducing
annotations from NetHappenings the largest
and oldest K12 Education Mailing List exploring and using the World Wide Web.



The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright
http://www.edu-cyberpg.com/Community/NetHappenings.html

FREE EDUCATION VENDOR DIRECTORY LISTING http://www.edu-cyberpg.com/Directory/

HOT LIST REGISTRY OF K12 SCHOOLS ONLINE
http://www.edu-cyberpg.com/Schools/
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts: