Educational CyberPlayGround NetHappenings Headlines and Resources

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Thu, 26 Oct 2006 12:01:25 -0400

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
NetHappenings Mailing List ©1993

Subscribe - Unsubscribe - EmailPreferences 
http://www.edu-cyberpg.com/Community/NetHappenings.html


Educational CyberPlayGround Community Mailing Lists http://www.edu-cyberpg.com/Community/

Advertise NetHappenings Guidelines
http://www.edu-cyberpg.com/Community/Subguidelines.html
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>



--------------------------------------------------------------------------
Please link to the Educational CyberPlayGround
http://www.edu-cyberpg.com from your website.

Improving literacy through arts education and advocacy by providing
collaborative and interdisciplinary resources for understanding world
culture and our national culture.

Share this with a friend
http://www.youtube.com/watch?v=c4EoMte4fqI
---------------------------------------------------------------------------


Greetings,

Hope you enjoy today's nuggets.


best,

<Karen>


1) Hackers Zero In on Online Stock Accounts http://www.washingtonpost.com/wp-dyn/content/article/2006/10/23/AR2006 102301257.html Hackers have been breaking into customer accounts at large online brokerages in the United States and making unauthorized trades worth millions of dollars as part of a fast-growing new form of online fraud under investigation by federal authorities. E-Trade Financial Corp., the nation's fourth-largest online broker, said last week that "concerted rings" in Eastern Europe and Thailand caused their customers $18 million in losses in the third quarter alone.

2)
Microsoft: Bot, Trojan Infections High; Rootkits Low
http://www.eweek.com/article2/0,1895,2036439,00.asp
New statistics from Microsoft's anti-malware engineering team have
confirmed fears that backdoor Trojans and bots present a "significant"
threat to Windows users.
However, according to data culled from the software maker's security
tools, stealth rootkit infections are on the decrease, perhaps due to
the addition of anti-rootkit capabilities in security applications.
The latest malware infection data, released at the RSA Europe conference
in Nice, France, covers the first half of 2006. During that period,
Microsoft found more than 43,000 new variants of bots and backdoor
Trojans that control millions of hijacked Windows machines in for-profit
botnets.

Spoofing bug found in IE 7
<http://news.com.com/Spoofing+bug+found+in+IE+7/2100-1002_3-6129626.html>
Security experts have found a weakness in Internet Explorer 7 that could
help crooks mask phishing scams, the type of attack Microsoft designed
the browser to thwart.
IE 7, released last week, allows a Web site to display a pop-up that can
contain a spoofed Web address, security monitoring company Secunia said
Wednesday. An attacker could exploit this weakness to trick people into
believing they are on a trusted Web site when in fact they are viewing a
malicious page, Secunia said in an alert.

3)
At U.S. Borders, Laptops Have No Right to Privacy
http://travel2.nytimes.com/2006/10/24/business/24road.html
customs officials have the authority to scrutinize the
contents of travelers laptops and even confiscate laptops for a period
of time, without giving a reason.They don't
need probable cause to perform these searches under the current law.
They can do it without suspicion or without really revealing their
motivations.

Airline Passenger Profiling for Profit
http://www.schneier.com/blog/archives/2006/10/airline_passeng_1.html


4) UK firms must wake up to security <http://www.computerweekly.com/Home/Articles/2006/10/24/219296/UK+firm s+must+wake+up+to+security.htm> This month's Channel 4 Dispatches documentary on data being stolen from Indian call centres. But behind the headlines, the issue for UK business goes deeper, with far too many firms not yet having addressed or assessed their core data security risks, or even ensured compliance with the UK's Data Protection Act.

5)
Infertility and Cell Phone Usage
http://www.edu-cyberpg.com/technology/cell_phone.html
"Anytime minutes" may not be the only thing that decreases with
prolonged cell phone usage. According to a study presented at the 62nd
annual meeting of the American Society for Reproductive Medicine,
sperm count and quality may as well. The study, of 361 men undergoing
evaluation for infertility, found that the more time men spent on
their cell phones each day, the unhealthier their sperm. Specifically,
men who spent more than four hours a day on their cell phones had
lower sperm counts, less motile sperm and more irregularly shaped
sperm than men who didn't use cell phones.

6)
A new DoD Internet voting scheme
http://servesecurityreport.org/ivas.pdf
A short paper about the government's IVAS system that
involves absentee voting using email and fax and ballot distribution
over the Internet.
Summary:
1. Tool One exposes soldiers to risks of identity theft.
2. Returning voted ballots by email or fax creates an opportunity for
hackers, foreign governments, or other parties to tamper with those
ballots while they are in transit.
3. Ballots returned by email or fax may be handled by the DoD in some
cases.

7)
Dynamic IP address confusion results in wrong family raided
http://arstechnica.com/news.ars/post/20061024-8062.html
When an armed porn raid took place *at the wrong physical address*
apparently based solely on ISP information derived from an IP
address, the results could have been deadly.  It appears that a
dynamic IP address was incorrectly mapped to a subscriber.
Red flag for virtually all Internet users.

8)
The Digital Freedom Campaign
http://www.digitalfreedom.org/
launched to fight against the  big recording labels & studios
who are trying to restrict individual rights to use new digital technologies.

9)
Why File Sharing is Not Theft
http://tinyurl.com/g5lqb

10)
DVD Jon Reverse Engineers the iPod
http://tinyurl.com/qnmbt
DVD Jon has reversed-engineered the FairPlay
encryption technology that prevents users from playing iTunes files on
"unauthorized" computers or devices. Johansen, through his firm Double
Twist Ventures, is beginning to license the "work-around" to content
providers that want to target the huge iPod market.


<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Copyright statements to be included when reproducing
annotations from NetHappenings the largest
and oldest K12 Education Mailing List exploring and using the World Wide Web.



The single phrase below is the copyright notice to be used when reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright
http://www.edu-cyberpg.com/Community/NetHappenings.html

FREE EDUCATION VENDOR DIRECTORY LISTING http://www.edu-cyberpg.com/Directory/

HOT LIST REGISTRY OF K12 SCHOOLS ONLINE
http://www.edu-cyberpg.com/Schools/
<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts: