<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<> NetHappenings Mailing List ©1993
Subscribe - Unsubscribe - EmailPreferences http://www.edu-cyberpg.com/Community/NetHappenings.html
Educational CyberPlayGround Community Mailing Lists http://www.edu-cyberpg.com/Community/
Advertise NetHappenings Guidelines http://www.edu-cyberpg.com/Community/Subguidelines.html <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
-------------------------------------------------------------------------- Please link to the Educational CyberPlayGround http://www.edu-cyberpg.com from your website.
Improving literacy through arts education and advocacy by providing collaborative and interdisciplinary resources for understanding world culture and our national culture.
Share this with a friend http://www.youtube.com/watch?v=c4EoMte4fqI ---------------------------------------------------------------------------
Greetings,
Hope you enjoy today's nuggets.
best,
<Karen>
1) Hackers Zero In on Online Stock Accounts http://www.washingtonpost.com/wp-dyn/content/article/2006/10/23/AR2006 102301257.html Hackers have been breaking into customer accounts at large online brokerages in the United States and making unauthorized trades worth millions of dollars as part of a fast-growing new form of online fraud under investigation by federal authorities. E-Trade Financial Corp., the nation's fourth-largest online broker, said last week that "concerted rings" in Eastern Europe and Thailand caused their customers $18 million in losses in the third quarter alone.
2) Microsoft: Bot, Trojan Infections High; Rootkits Low http://www.eweek.com/article2/0,1895,2036439,00.asp New statistics from Microsoft's anti-malware engineering team have confirmed fears that backdoor Trojans and bots present a "significant" threat to Windows users. However, according to data culled from the software maker's security tools, stealth rootkit infections are on the decrease, perhaps due to the addition of anti-rootkit capabilities in security applications. The latest malware infection data, released at the RSA Europe conference in Nice, France, covers the first half of 2006. During that period, Microsoft found more than 43,000 new variants of bots and backdoor Trojans that control millions of hijacked Windows machines in for-profit botnets.
Spoofing bug found in IE 7 <http://news.com.com/Spoofing+bug+found+in+IE+7/2100-1002_3-6129626.html> Security experts have found a weakness in Internet Explorer 7 that could help crooks mask phishing scams, the type of attack Microsoft designed the browser to thwart. IE 7, released last week, allows a Web site to display a pop-up that can contain a spoofed Web address, security monitoring company Secunia said Wednesday. An attacker could exploit this weakness to trick people into believing they are on a trusted Web site when in fact they are viewing a malicious page, Secunia said in an alert.
3) At U.S. Borders, Laptops Have No Right to Privacy http://travel2.nytimes.com/2006/10/24/business/24road.html customs officials have the authority to scrutinize the contents of travelers laptops and even confiscate laptops for a period of time, without giving a reason.They don't need probable cause to perform these searches under the current law. They can do it without suspicion or without really revealing their motivations.
Airline Passenger Profiling for Profit http://www.schneier.com/blog/archives/2006/10/airline_passeng_1.html
4) UK firms must wake up to security <http://www.computerweekly.com/Home/Articles/2006/10/24/219296/UK+firm s+must+wake+up+to+security.htm> This month's Channel 4 Dispatches documentary on data being stolen from Indian call centres. But behind the headlines, the issue for UK business goes deeper, with far too many firms not yet having addressed or assessed their core data security risks, or even ensured compliance with the UK's Data Protection Act.
5) Infertility and Cell Phone Usage http://www.edu-cyberpg.com/technology/cell_phone.html "Anytime minutes" may not be the only thing that decreases with prolonged cell phone usage. According to a study presented at the 62nd annual meeting of the American Society for Reproductive Medicine, sperm count and quality may as well. The study, of 361 men undergoing evaluation for infertility, found that the more time men spent on their cell phones each day, the unhealthier their sperm. Specifically, men who spent more than four hours a day on their cell phones had lower sperm counts, less motile sperm and more irregularly shaped sperm than men who didn't use cell phones.
6) A new DoD Internet voting scheme http://servesecurityreport.org/ivas.pdf A short paper about the government's IVAS system that involves absentee voting using email and fax and ballot distribution over the Internet. Summary: 1. Tool One exposes soldiers to risks of identity theft. 2. Returning voted ballots by email or fax creates an opportunity for hackers, foreign governments, or other parties to tamper with those ballots while they are in transit. 3. Ballots returned by email or fax may be handled by the DoD in some cases.
7) Dynamic IP address confusion results in wrong family raided http://arstechnica.com/news.ars/post/20061024-8062.html When an armed porn raid took place *at the wrong physical address* apparently based solely on ISP information derived from an IP address, the results could have been deadly. It appears that a dynamic IP address was incorrectly mapped to a subscriber. Red flag for virtually all Internet users.
8) The Digital Freedom Campaign http://www.digitalfreedom.org/ launched to fight against the big recording labels & studios who are trying to restrict individual rights to use new digital technologies.
9) Why File Sharing is Not Theft http://tinyurl.com/g5lqb
10) DVD Jon Reverse Engineers the iPod http://tinyurl.com/qnmbt DVD Jon has reversed-engineered the FairPlay encryption technology that prevents users from playing iTunes files on "unauthorized" computers or devices. Johansen, through his firm Double Twist Ventures, is beginning to license the "work-around" to content providers that want to target the huge iPod market.
The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format:
EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright
http://www.edu-cyberpg.com/Community/NetHappenings.html
FREE EDUCATION VENDOR DIRECTORY LISTING http://www.edu-cyberpg.com/Directory/
HOT LIST REGISTRY OF K12 SCHOOLS ONLINE http://www.edu-cyberpg.com/Schools/ <>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>