<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<> NetHappenings Mailing List ©1993
Subscribe - Unsubscribe - EmailPreferences http://www.edu-cyberpg.com/Community/NetHappenings.html
Educational CyberPlayGround Community Mailing Lists http://www.edu-cyberpg.com/Community/
Advertise NetHappenings Guidelines http://www.edu-cyberpg.com/Community/Subguidelines.html <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
1) The Data Theft Scandal http://www.channel4.com/news/microsites/D/dispatches2006/data_theft/index.html In a 12-month undercover investigation, Turton infiltrates criminal networks which trade British consumers' bank and other confidential information for huge profits in India, the world's new call centre capital.
2) Indian data theft 'exposed' http://www.theregister.co.uk/2006/10/05/india_exposed/ A man in India offered to sell the front man of a Channel 4 sting operation the credit card details of 200,000 people, the programme Dispatches will reveal tonight. The programme makers were inspired by a sting operation mounted on an Indian call centre last year by The Sun newspaper, in which a man allegedly sold the bank details of 1,000 British people to a journalist. The Sun story helped stoke a backlash against outsourcing to India. The Sun was subsequently accused of duping its quarry and fabricating the story about fraud in India.
Call center sting... details after the show http://www.indiainfoline.com/news/innernews.asp?storyId=17059&lmn=1 We have no further update from them (Channel 4) on their intent to share the details: NASSCOM UK-based Channel 4s sting operation, a year long effort to locate security lapses in the call center industry has caused a flutter and (National Association of Software and Services (NASSCOM) sought evidence behind the report and co-operate fully and wholeheartedly. This would have enabled prompt action against the alleged criminals. But Dispatches refused to provide that information, prior to airing of the programme.
3) Sex, gambling and computer game sites being abused by Department of Interior http://tinyurl.com/mork2 The title of a report issued this week by the Department of Interior's Inspector General -- "Excessive Indulgences: Personal Use of the Internet at the Department of the Interior" -- pretty much says it all, but here's a bit more.
4) Ghana: Cyber Crimes in Ghana http://allafrica.com/stories/200610040856.html With the increasing threat of cyber crimes to Ghana's aim of becoming the hub of the information super-highway on the west coast of Africa, Information Communication Technology (ICT) experts in the country have suggested the establishment of a well-equipped and independent national cyber crime unit to fight ICT crimes, especially cyber crimes in the country.
5) Computer System Under Attack http://www.washingtonpost.com/wp-dyn/content/article/2006/10/05/AR2006100501781.html Hackers operating through Chinese Internet servers have launched a debilitating attack on the computer system of a sensitive Commerce Department bureau, forcing it to replace hundreds of workstations and block employees from regular use of the Internet for more than a month, Commerce officials said yesterday. The attack targeted the computers of the Bureau of Industry and Security, which is responsible for controlling U.S. exports of commodities, software and technology having both commercial and military uses. The bureau has stepped up its activity in regulating trade with China in recent years as the United States increased its exports of such dual-use items to the growing Chinese market.
6) Code Search joins hackers' toolbelt http://weblog.infoworld.com/techwatch/archives/008244.html No sooner had Google launched its Code Search feature http://www.google.com/codesearch than folks figured out (surprise, surprise) that it's a pretty good tool for finding holes in software, too, as this Securiteam blog entry shows. Turns out that intrepid developers put some pretty good "tells" into their code, especially in the form of artlessly named functions and other "notes to self" planted in comments that were never meant to see the light of day. Google has shown us sooo many times before how it can lay bare that which was not meant to be seen. It's no different with uncompiled source code. So developers -- clean up that code before the Googlebot finds it first! My favorite Google Code Search hack so far? "backdoor password" (courtesy of Chris at Vulnwatch)
7) Marketers Miss the Mark on Privacy Crisis Containment http://www.destinationcrm.com/articles/default.asp?ArticleID=6381 Despite all of the press and political rhetoric regarding security concerns, only 29 percent of marketers say that their firm has a crisis containment plan in case of a security breach, according to the findings of a CMO Council report, "Secure the Trust of Your Brand: How Security and IT Integrity Influence Corporate Brands." Without such a plan and other security strategies in place, companies are at risk of losing hundreds of millions of dollars in market value and through loss of reputation and brand trust, according to Scott Van Camp, CMO council editorial director and author of the study.
8) Hacker attacks hit home computers 50 times a night http://technology.guardian.co.uk/news/story/0,,1891177,00.html Home computers can be attacked by hackers more than 50 times a night, the results of an experiment showed today. Every time a test PC was connected to the internet, it was targeted by viruses and attempts to gain access to the information it contained. The experiment, carried out by the BBC News website, used a "honeypot" PC, which looked like a normal computer to potential hackers but secretly recorded every attempt to gain access to it.
9) The Military Education/University Industrial Complex The Automation of Higher Education http://tinyurl.com/jpz8p
"Getting Together at Educause" The annual Educause conference brings together company and college officials from all over the country to discuss recent trends in higher education and technology. Officials are also using this year's event in Dallas to announce strategic partnerships between their organizations. The IMS Global Learning Consortium, a nonprofit organization that creates education-technology standards, has announced the development of open standards for online learning to be adopted by least 30 organizations. Called the Common Cartridge, the production standards for e-learning systems and their contents will allow faculty members to exchange online course information betweem different technology platforms. Among the organizations signing on to the new standards are the Sakai Project, an open-source software organization; McGraw-Hill Education, a publishing company; and Angel Learning, a course-management-software company. Products made under the new standards could be available as soon as spring 2007, IMS officials said. In a separate announcement at Educause, Blackboard Inc., the education-software company, and SAP, which sells administrative technology, have unveiled their own partnership to integrate their platforms. The two giants in higher education are offering a Web service that will allow users to share information between the two companies' administrative and course-management technology systems. The companies said the partnership would not only add convenience, but would also make it easier for college officials to track educational outcomes of students and institutions. --Dan Carnevale
10) Medicare and Medicaid Security Gaps Are Found http://www.nytimes.com/2006/10/08/washington/08health.html WASHINGTON, Oct. 7 Federal investigators say they have found serious computer security flaws that could lead to the improper disclosure of sensitive medical information on people enrolled in Medicare and Medicaid. In a new report, the investigators, from the Government Accountability Office, said key information security controls were missing from a huge communication network used by the federal Centers for Medicare and Medicaid Services. As a result, they said, sensitive, personally identifiable information could be improperly modified, disclosed or deleted. Moreover, the report said, these weaknesses could lead to disruptions in services to millions of Medicare and Medicaid beneficiaries.
11) International Film and TV Production Directory + http://www.edu-cyberpg.com/Arts/Film_Web_Site.html
The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format:
EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright
http://www.edu-cyberpg.com/Community/NetHappenings.html
FREE EDUCATION VENDOR DIRECTORY LISTING http://www.edu-cyberpg.com/Directory/
HOT LIST REGISTRY OF K12 SCHOOLS ONLINE http://www.edu-cyberpg.com/Schools/ <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>