[ECP] Educational CyberPlayGround NetHappenings Headlines and Resources

  • From: Educational CyberPlayGround <admin@xxxxxxxxxxxxxxx>
  • To: nethappenings@xxxxxxxxxxxxx
  • Date: Thu, 22 Mar 2007 12:52:04 -0500

¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º

Please link to the Educational CyberPlayGround
http://www.edu-cyberpg.com

Add your SCHOOL OR SCHOOL DISTRICT URL
http://www.edu-cyberpg.com/schools/

Please Share and Add Your Song
http://www.edu-cyberpg.com/ncfr/

Educational CyberPlayGround NetHappenings Mailing List ©1993

¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤ø,¸¸,ø¤º°`°º¤,¸¸,ø¤º


Howdy Everyone,

Happy Reading for today.


best,
<Karen>


1)
More professional Internet hackers fueling thriving underground economy
http://english.people.com.cn/200703/20/eng20070320_359160.html
Online hacking continued its two-year trend toward criminalization in
the last half of 2006, with data theft fueling a thriving underground
economy, according to an Internet security report released on Monday.
The semi-annual report by computer security services firm Symantec found
that people could pay for as little as 14 U.S. dollars online to buy a
new identity, and complete with working U. S. bank account, credit card
with security code, date of birth and government-issued social security
number.

2)
Internet crime pays
http://www.theregister.co.uk/2007/03/19/fbi_crime_report_2006/
Cyber-crime is alive and kicking in the USA, and playfully swimming
through its riches like Scrooge McDuck in a money vault, the FBI's
Internet Crime Complaint Center annual report [1] reveals today.
In 2006 US consumers filed 207,492 complaints about internet crime and
reported record losses of $198.4m. Online auction fraud, such as
receiving a different item than expected, topped the list, accounting
for 44.9 per cent of complaints. Undelivered merchandise and payments
were next in line, accounting for 19 per cent.
Greedy fools are still falling for the 419 scam (which the FBI calls
"Nigerian Letter Fraud"). On average, victims last year lost $5,100 a
pop to the countless princes of Nigeria, by sensibly moving their
Majesties' assets to the US.

3)
Microsoft guidelines give the bottom line on security settings
http://www.gcn.com/online/vol1_no1/43347-1.html
Microsoft Corp. has produced a set of security guidelines [1] for
Windows Vista, providing a checklist of security settings and
configurations for two levels of enhanced security in the new operating
system.


*********************************************************************
PLEASE ADD YOUR K12 SCHOOL OR SCHOOL DISTRICT
TO THE  MASTER DIRECTORY OF SCHOOLS ONLINE
http://www.edu-cyberpg.com/schools/

The registry is organized by state and by grade level.
The registry also includes sites for charter Schools, virtual schools,
school districts, state and regional education organizations, state
departments of education, state standards and state administrators.
*********************************************************************

4)
Are secure connections really that secure?
http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9013640
The little lock icon that appears on a Web browser window frame when a
secure connection exists between a browser and a Web server may be
lulling users into a false sense of security.
"There are misconceptions that technologies such as SSL indicate that a
Web site is safe when, in fact, it is not,"

5)
Denso's management of classified data lax
http://www.yomiuri.co.jp/dy/editorial/20070320TDY04005.htm
National interest at risk
Denso enjoys a high global reputation for its technologies and products.
The downloaded blueprints are for commercial products, but they could be
converted to build military hardware. Vast amounts of such data may
already have been passed to China. The case must be thoroughly
investigated to determine whether the data was stolen for commercial or
military purposes.

6)
GoDaddy, Get a Backbone and Protect Your Users' Rights
http://www.eff.org/deeplinks/archives/005168.php
A few weeks back, we wrote [1] about how domain name registrar GoDaddy
took offline Seclists.org based merely on an informal request and
without providing any meaningful notice to the site's operator.
Unfortunately, this isn't the only instance in which GoDaddy has
carelessly ignored its users' rights.

7)
Tools Fight Forensics
http://www.darkreading.com/document.asp?doc_id=119806
A breadth of anti-forensics tools -- most of them free -- is making it
easier for the bad guys to cover their tracks in malware and data theft
attacks.

8)
IT illiteracy undermines productivity
http://www.pcw.co.uk/itweek/analysis/2185783/illiteracy-undermines
While UK politicians and business leaders continue to voice concerns
over the current shortage of skilled IT professionals far less attention
has been granted to the equally serious problem posed by a deficiency of
basic IT skills amongst the general workforce.

9)
Action Jackson
<http://www.stltoday.com/stltoday/news/stories.nsf/sciencemedicine/story/26A8D24E8F39FA1C862572A3000B966C?OpenDocument>
Robot makes drip paintings like Jackson Pollock's
Mechanical engineering student Topher McFarland flipped a switch in a
Washington University lab and a robot began sucking white paint through
a tube. With another command, McFarland sent the robot into a spastic
dance, spurting paint onto cardboard scavenged from Best Buy.

10)
First Regional Cyber Security & Research Center Opens at Chandigarh
http://www.itnewsonline.com/showstory.php?storyid=9064
NASSCOM, the premier trade body and "voice" of the IT software and
services industry, in association with Chandigarh Administration has
opened the Regional Cyber Security and Research Center (RCSRC) at
Chandigarh.

11)
TJX sued by shareholder over records
http://www.businessweek.com/ap/financialnews/D8O05AT80.htm
A big shareholder of TJX Cos. has filed a lawsuit to obtain records
showing how the retailer handled computer problems that exposed customer
information to hackers.
Arkansas Carpenters Pension Fund, which owns 4,500 shares of TJX stock,
said the company rebuffed its request to see documents detailing the
safeguards on the company's computer systems and how the company
responded to the theft of customer data.
The suit was filed Monday afternoon in Delaware's Court of Chancery,
under a law that allows shareholders to sue to get access to corporate
documents for certain purposes.

TJX stolen data used in Florida crime spree
http://www.infoworld.com/article/07/03/21/HNtjxarrests_1.html
Law enforcement officials in Florida have arrested six individuals
suspected of carrying out a fraud scheme built around the misuse of
credit card data stolen from retailer TJX Companies.
In partnership with the Gainesville Police Department, officials from
the Florida Department of Law Enforcement said they have taken six of 10
suspects into custody for allegedly using the TJX customer data to
purchase large quantities of gift cards from discount chains Wal-Mart
and Sam's Club.

12)
RIM chief: Wireless security must be top priority
<http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=security&articleId=9013802>
Wireless security must be the top priority for providers doing business
with the U.S. government, Research In Motion Ltd.'s (RIM's) president
and co-CEO said Tuesday.

13)
New NSA Security Guidelines for Mac OS X Published
http://www.macobserver.com/article/2007/03/20.8.shtml
The National Security Agency (NSA) has published version 2 of its
security guidelines for Mac OS X. The security documents are available
in PDF format on their OS Guides page [1] for Mac OS X.
These documents for Mac OS X and Mac OS X Server represent best
practices for securing the OS and are widely used by the industry as
internal standards for configuring Mac OS X. The document is actually
written by experts at Apple and endorsed by the NSA which says on its
Website," It is our belief that these guides establish the latest best
practices for securing the products and recommend that traditional
customers of our security recommendations use the Apple guides when
securing Macintosh OS X 10.4.x and Macintosh OS X Server 10.4.x."

14)
Net Censorship
http://www.edu-cyberpg.com/Technology/censor.html
Great Firewall of China
Checks addresses against Chinese government Internet censorship
protocols to find if a site is blocked in China.

15.
U.S. Nuclear Plants in the 21st Century: The Risk of a Lifetime
http://www.ucsusa.org/clean_energy/nuclear_safety/us-nuclear-plants-in-the-21st-century.html
Executive summary and full text of a 2004 report that discusses the
safety of nuclear power plants "during the three stages of plant lifetime:
the break-in phase, middle life phase, and wear-out phase." The report
notes that several nuclear plant disasters, including Three Mile Island
and Chernobyl, have occurred during the "break-in" phase when there
have been "unexpected safety problems." Also considers the need for
continued regulation. From the Union of Concerned Scientists (UCS).

16.
Communist Party USA Gives Its History to N.Y.U.
http://www.edu-cyberpg.com/Music/woodieguthrie.html

17.
2006 Interent Crime Report
http://www.fbi.gov/page2/march07/ic3031607.htm

18.
Admins, Parents & Teachers Learn How to Keep Your Child
Safe on the Interent -- Trouble Areas for Kids
http://www.edu-cyberpg.com/morestuff4.html
Find out what your kids have put up online, their names,
address, pictures, what they think. This needs to be
supervised and you won't be able to keep up with
what is going on here. Chat Rooms, Blogs, Instant
Messaging, IRC, Newsgroups - they don't understand
that they have gone public and have lost their privacy.

19.
Emergency Communication Disaster Plan Check List
Get Your Personal Disaster Plan
http://www.edu-cyberpg.com/Technology/disaster.html
Is your State Prepared? Does your school have a plan?
Do you have a plan? Have we learned anything yet?

20.
"Standing In The Shadows Of Motown" Funk Brothers WEQUEST
http://www.edu-cyberpg.com/culdesac/Stars/funkbrothers.html
Chosen Best Documentary Non Fiction Category
-- New York Film Critics Circle 12/16/02
2 Grammy nominee - Best Movie Soundtrack 1/7/02
2x Grammy Winner 2003
Try the Funk Brothers Empty Nest Webquest

21.
Judge Throws Out Internet Blocking Law
http://biz.yahoo.com/ap/070322/internet_blocking.html?.v=3
Judge Tosses Law That Makes It a Crime for Web Sites to Let Kids Access
'Harmful' Material
PHILADELPHIA (AP) -- A federal judge on Thursday threw out a 1998 law
that makes it a crime for commercial Web site operators to let children
access "harmful" material.
In the ruling, the judge said parents can protect their children through
software filters and other means that do not limit the rights of
others to free speech.

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>
Educational CyberPlayGround NetHappenings Mailing List ©1993
NetHappenings: the largest and oldest K12 Education Mailing List Email Preferences -- Subscribe - Unsubscribe - Digest
http://www.edu-cyberpg.com/Community/NetHappenings.html

Copyright FAIR USE Statements to be included when reproducing
annotations from NetHappenings.

The single phrase below is the copyright notice to be used when
reproducing any portion of this report, in any format:

EDUCATIONAL CYBERPLAYGROUND http://www.edu-cyberpg.com
NetHappenings copyright

<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>~~~~~<>

Other related posts: