Updated: 24.11.2002; 17:03:59 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Thursday, August 29, 2002

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

Should I buy this Book?

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Author: Ejovi Nuwere; $17.47 (Pre Order, release date October, 2002)
[Amazon Books: hacker]
23:59 # G!

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

Should I buy this Book?

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Author: Ejovi Nuwere; $17.47 (Pre Order, release date October, 2002)
[Amazon Books: hacker]
23:59 # G!

Computerkriminalitaet: Jedes zweite Unternehmen betroffen

M[integral]NCHEN (COMPUTERWOCHE) - Mindestens jedes zweite Unternehmen war bereits Opfer von Hackern oder Saboteuren aus dem eigenen Haus, hat die Unternehmensberatung Mummert + Partner ermittelt. Dabei w[florin]rden die Angriffe oft nicht erkannt und ihre Folgen als technisches Problem abgetan. Die Experten gehen davon aus, dass bereits im Jahr 2005 [florin]ber 90 Prozent aller Firmen betroffen sein werden. Der Einsatz von Antivirensoftware und Firewalls helfe dagegen nicht. Die Berater empfehlen deshalb, ein Intrusion Detection System zu installieren, um Unternehmensnetze vor Datendieben zu sch[florin]tzen. [ComputerWoche: Nachrichten]
23:53 # G! Translate

Computerkriminalitaet: Jedes zweite Unternehmen betroffen

M[integral]NCHEN (COMPUTERWOCHE) - Mindestens jedes zweite Unternehmen war bereits Opfer von Hackern oder Saboteuren aus dem eigenen Haus, hat die Unternehmensberatung Mummert + Partner ermittelt. Dabei w[florin]rden die Angriffe oft nicht erkannt und ihre Folgen als technisches Problem abgetan. Die Experten gehen davon aus, dass bereits im Jahr 2005 [florin]ber 90 Prozent aller Firmen betroffen sein werden. Der Einsatz von Antivirensoftware und Firewalls helfe dagegen nicht. Die Berater empfehlen deshalb, ein Intrusion Detection System zu installieren, um Unternehmensnetze vor Datendieben zu sch[florin]tzen. [ComputerWoche: Nachrichten]
23:53 # G! Translate

Who's spying on my Hotmail? - Hotmail sniffer.

With new spyware, even your private Yahoo, Hotmail e-mails can be seen

Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. A new version of eBlaster spyware will secretly forward all e-mail coming and going through such Web-based accounts to a spy's e-mail, allowing anyone to "ride-along" even the supposedly private e-mail.

[ ... ]

But word of the software's new feature disturbed privacy advocate Richard Smith of ComputerBytesMan.com -- and he suggested potential users think twice before installing the software,

"This is e-mail wiretapping," Smith said. "I would put up a big warning flag. Anybody who would consider buying this product should check with a lawyer first. There is a high probability it runs afoul of the Electronic Communications Privacy Act. I would not take the company's word that it's legal." Enacted in 1986, the Electronic Communications Privacy Act prohibits interception and disclosure of wire, oral, or electronic communications in most cases.

Spyware like that produced by SpectorSoft and competitor WinWhatWhere Corp. has not yet faced a definitive courtroom test. But David Sobel, general counsel of the Electronic Privacy Information Center, equated private Web-based e-mail account with an employee receiving a personal letter through the company mailroom. The contents of such a letter are protected by U.S. mail regulations.

"The question is: Is there a reasonable expectation of privacy? I would argue that if a company.com account is provided to me for company business, I can assume it might be subject to monitoring ... but if I take additional step to set up a Hotmail account that I occasionally access from my desktop at work, I think that could be construed as an expression of an expectation of privacy."

Nevertheless, the spyware makers generally argue that employers have the right to observe anything that happens on company-owned computers.

[Privacy Digest]

I wonder very much how this should work. I never used Hotmail but the webmailsers I know all use SSL/TLS encrypted connections. While SSL/TLS can be attacked (man-in-the-middle, attacking the Client OS, fallback from https to http etc.) I wonder if and how this can be rolled in a commercial product.
If this product really works as advertised idt poses all sorts of interesting questions about its use by law enforcement.
23:34 # G!

Who's spying on my Hotmail? - Hotmail sniffer.

With new spyware, even your private Yahoo, Hotmail e-mails can be seen

Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. A new version of eBlaster spyware will secretly forward all e-mail coming and going through such Web-based accounts to a spy's e-mail, allowing anyone to "ride-along" even the supposedly private e-mail.

[ ... ]

But word of the software's new feature disturbed privacy advocate Richard Smith of ComputerBytesMan.com -- and he suggested potential users think twice before installing the software,

"This is e-mail wiretapping," Smith said. "I would put up a big warning flag. Anybody who would consider buying this product should check with a lawyer first. There is a high probability it runs afoul of the Electronic Communications Privacy Act. I would not take the company's word that it's legal." Enacted in 1986, the Electronic Communications Privacy Act prohibits interception and disclosure of wire, oral, or electronic communications in most cases.

Spyware like that produced by SpectorSoft and competitor WinWhatWhere Corp. has not yet faced a definitive courtroom test. But David Sobel, general counsel of the Electronic Privacy Information Center, equated private Web-based e-mail account with an employee receiving a personal letter through the company mailroom. The contents of such a letter are protected by U.S. mail regulations.

"The question is: Is there a reasonable expectation of privacy? I would argue that if a company.com account is provided to me for company business, I can assume it might be subject to monitoring ... but if I take additional step to set up a Hotmail account that I occasionally access from my desktop at work, I think that could be construed as an expression of an expectation of privacy."

Nevertheless, the spyware makers generally argue that employers have the right to observe anything that happens on company-owned computers.

[Privacy Digest]

I wonder very much how this should work. I never used Hotmail but the webmailsers I know all use SSL/TLS encrypted connections. While SSL/TLS can be attacked (man-in-the-middle, attacking the Client OS, fallback from https to http etc.) I wonder if and how this can be rolled in a commercial product.
If this product really works as advertised idt poses all sorts of interesting questions about its use by law enforcement.
23:34 # G!

Does Internet Crime Pay More?

Given the increased anonymity and decreased physical danger associated with criminal activity online, NewsFactor asks if crime actually does pay more on the Internet. The required skill level for entry into the virtual crime scene may be higher, but just think of how much you'll save on ski masks and loot sacks ;) [Kill-HUP.com]
23:18 # G!

Does Internet Crime Pay More?

Given the increased anonymity and decreased physical danger associated with criminal activity online, NewsFactor asks if crime actually does pay more on the Internet. The required skill level for entry into the virtual crime scene may be higher, but just think of how much you'll save on ski masks and loot sacks ;) [Kill-HUP.com]
23:18 # G!

What is software? What are Computers?

An drew Raff asks What is software? and drifts to an interesting discussion how software should be protected:

Talk amongst yourselves. Topic: Should software be covered by copyright or patent? For how long?

Ideas from Daves and Larrys: Weinberger, Winer, Sifry, Staton and Lessig (and more Lessig.)

[Andrew Raff: Shameless Self Promotion]

An other interesting question is What is a computer? There are many Laws worldide punishing certain actions to a computer or using a computer. It is not hard to imagine what legislators had in mind when writing "computer" (this mainframe and PC things) but this alon can't be the foundation of computer crime dogmatics. If we define computer as "machine that computes" or even "thing with microchips in it" we will get into a situation a few years in the future where it will be very difficult to commit any crime without commiting a computer crime.

Every tool more complex than a hammer, every building, every cashier and nearly all other man made stuff will contain a 'computer'. So most of the crimes involving this objects will involve manipulating or harming the computers in them. So all this crimes are potential computer crimes which does not seem to be apropriate. We need something better.
23:01 # G!

What is software? What are Computers?

An drew Raff asks What is software? and drifts to an interesting discussion how software should be protected:

Talk amongst yourselves. Topic: Should software be covered by copyright or patent? For how long?

Ideas from Daves and Larrys: Weinberger, Winer, Sifry, Staton and Lessig (and more Lessig.)

[Andrew Raff: Shameless Self Promotion]

An other interesting question is What is a computer? There are many Laws worldide punishing certain actions to a computer or using a computer. It is not hard to imagine what legislators had in mind when writing "computer" (this mainframe and PC things) but this alon can't be the foundation of computer crime dogmatics. If we define computer as "machine that computes" or even "thing with microchips in it" we will get into a situation a few years in the future where it will be very difficult to commit any crime without commiting a computer crime.

Every tool more complex than a hammer, every building, every cashier and nearly all other man made stuff will contain a 'computer'. So most of the crimes involving this objects will involve manipulating or harming the computers in them. So all this crimes are potential computer crimes which does not seem to be apropriate. We need something better.
23:01 # G!

UK: Big fine handed down for mobile spamming

Sending out unsolicited text messages that misled mobile users to believe they had won a £500 prize proves to be rather expensive ZDnet via [Moreover - moreover...] also [silicon.com]
22:26 # G!

UK: Big fine handed down for mobile spamming

Sending out unsolicited text messages that misled mobile users to believe they had won a £500 prize proves to be rather expensive ZDnet via [Moreover - moreover...] also [silicon.com]
22:26 # G!

CodeCon 2.0 Call For Papers

CodeCon is the premier showcase of active hacker projects. It is an excellent opportunity for developers to demonstrate their work, and for coding hackers to find out about what's going on in their community.

All presentations must be accompanied by functional applications, ideally open source. Presenters must be one of the active developers of the code in question. We emphasize that demonstrations be of *working* code, and reproducible by other people. Throughout the event, we will have several kiosks and local servers available for demonstration purposes.

We hereby solicit papers and demonstrations.

  • Papers and proposals due: December 1, 2002
  • Authors notified: December 15, 2002
  • Demonstration materials due: January 15, 2003

    The focus of CodeCon is on working applications which:

    • enhance individual power and liberty
    • can be discussed freely, either by virtue of being open source or having a published protocol, and preferably free of intellectual property restrictions
    • are generally useful, either directly to a large number of users, or as an example of technology applicable to a larger audience
    • demonstrate novelty in technical approaches, security assumptions, and end-user functionality
    [via "ISN"]
    20:49 # G!

CodeCon 2.0 Call For Papers

CodeCon is the premier showcase of active hacker projects. It is an excellent opportunity for developers to demonstrate their work, and for coding hackers to find out about what's going on in their community.

All presentations must be accompanied by functional applications, ideally open source. Presenters must be one of the active developers of the code in question. We emphasize that demonstrations be of *working* code, and reproducible by other people. Throughout the event, we will have several kiosks and local servers available for demonstration purposes.

We hereby solicit papers and demonstrations.

  • Papers and proposals due: December 1, 2002
  • Authors notified: December 15, 2002
  • Demonstration materials due: January 15, 2003

    The focus of CodeCon is on working applications which:

    • enhance individual power and liberty
    • can be discussed freely, either by virtue of being open source or having a published protocol, and preferably free of intellectual property restrictions
    • are generally useful, either directly to a large number of users, or as an example of technology applicable to a larger audience
    • demonstrate novelty in technical approaches, security assumptions, and end-user functionality
    [via "ISN"]
    20:49 # G!

Electronic Data Discovery Primer

Law.com has an article by Albert Barsocchini called "Electronic Data Discovery Primer " which is a nice introducion on Computer forensics and how to get there.
20:22 # G!

Electronic Data Discovery Primer

Law.com has an article by Albert Barsocchini called "Electronic Data Discovery Primer " which is a nice introducion on Computer forensics and how to get there.
20:22 # G!

20-23.4.:FiestaCrow 2003 Call-for-Papers

FiestaCrow 2003 Call-for-Papers

Outlined below are the theme and session topics for the 2003 FiestaCrow Symposium. This is an initial call for papers of interest related to the overall theme and these technical sessions. Papers are due by 15 November 2002.

THEME: FULL SPECTRUM OPERATIONS FOR FUTURE CONFLICTS AND HOMELAND DEFENSE

The FiestaCrow 2003 theme will draw on current world events and actions related to the counter-terrorism conflicts as well as the heightened interest in Homeland Defense of the United States. After the events of Sep 11, new interest and focus has evolved on the use of Information Warfare (IW) to support full spectrum operations. Increased emphasis on areas such as integrated air, space, and information operations; effects based operations (both defensive and offensive); the weaponization process for IW, and expanded use of the perception management portions of IW are all worth exploring through the technical track of FiestaCrow 2003.

Session 1: Effects based operations and Information Operations.
Session 2: Information Operations and the role of strategic influence and perception management.
Session 3: IO/IW in support of Homeland Defense. What role can and is the military playing?
[via "ISN"]
20:16 # G!

20-23.4.:FiestaCrow 2003 Call-for-Papers

FiestaCrow 2003 Call-for-Papers

Outlined below are the theme and session topics for the 2003 FiestaCrow Symposium. This is an initial call for papers of interest related to the overall theme and these technical sessions. Papers are due by 15 November 2002.

THEME: FULL SPECTRUM OPERATIONS FOR FUTURE CONFLICTS AND HOMELAND DEFENSE

The FiestaCrow 2003 theme will draw on current world events and actions related to the counter-terrorism conflicts as well as the heightened interest in Homeland Defense of the United States. After the events of Sep 11, new interest and focus has evolved on the use of Information Warfare (IW) to support full spectrum operations. Increased emphasis on areas such as integrated air, space, and information operations; effects based operations (both defensive and offensive); the weaponization process for IW, and expanded use of the perception management portions of IW are all worth exploring through the technical track of FiestaCrow 2003.

Session 1: Effects based operations and Information Operations.
Session 2: Information Operations and the role of strategic influence and perception management.
Session 3: IO/IW in support of Homeland Defense. What role can and is the military playing?
[via "ISN"]
20:16 # G!

WiLDing FUD

["ISN"] reports another WiLDing/Airboxing/Warchalcing/Wardriving story by the Sunday Mirror going around britisch government buildings. As far as I can understand the story all they got was WEP encrypted traffic although there was talk about catching sensive emails which didn't make sense to me in the context of the rest of the story. While it is well known thai plain WEP is inadequate for keeping your data secure and all the WEP-beef-ups showing up have problems, the article doesn't have the imagination to consider, if there is some other security layer inside the WEP packets. May be the have a firewalled-to-death IPsec VPN in it.

Some Quotes from th article for your amusement:

Using a laptop computer in the shadow of Big Ben, we identified 26 parcels of confidential computer information. The secret identity code of the Government network - which the Sunday Mirror will not reveal for security reasons - flashed up on the screen in a small box with a connection confirmation signal.

The data box timed the session as lasting 11 minutes and 48 seconds but the connection was not detected.

The Sunday Mirror has learned that several big banks have hidden copies of sensitive files at secret websites to counter this threat.

[...]

The Sunday Mirror commissioned Britain's top wireless security expert Phil Cracknell to test the Government's security. He used a £2500 handheld Compaq computer, modified to scan radiowaves, to measure the strength of leaks from Whitehall buildings.

[...]

itor the flow of electronic data around Portcullis House. For example, every time an email was sent it registered on a box on our laptop screen. It clicked up 26 times in the time it took to turn the corner of the building in a car.

To take the experiment to the next level and open the emails and files and read their contents, all we would have needed was a a specially-designed programme called Airsnort, freely available on the internet and simple to use.

Cracknell estimated that this would take between one and two hours - but it is illegal under the Telecommunications Act and possibly the Official Secrets Act.
12:55 # G!

WiLDing FUD

["ISN"] reports another WiLDing/Airboxing/Warchalcing/Wardriving story by the Sunday Mirror going around britisch government buildings. As far as I can understand the story all they got was WEP encrypted traffic although there was talk about catching sensive emails which didn't make sense to me in the context of the rest of the story. While it is well known thai plain WEP is inadequate for keeping your data secure and all the WEP-beef-ups showing up have problems, the article doesn't have the imagination to consider, if there is some other security layer inside the WEP packets. May be the have a firewalled-to-death IPsec VPN in it.

Some Quotes from th article for your amusement:

Using a laptop computer in the shadow of Big Ben, we identified 26 parcels of confidential computer information. The secret identity code of the Government network - which the Sunday Mirror will not reveal for security reasons - flashed up on the screen in a small box with a connection confirmation signal.

The data box timed the session as lasting 11 minutes and 48 seconds but the connection was not detected.

The Sunday Mirror has learned that several big banks have hidden copies of sensitive files at secret websites to counter this threat.

[...]

The Sunday Mirror commissioned Britain's top wireless security expert Phil Cracknell to test the Government's security. He used a £2500 handheld Compaq computer, modified to scan radiowaves, to measure the strength of leaks from Whitehall buildings.

[...]

itor the flow of electronic data around Portcullis House. For example, every time an email was sent it registered on a box on our laptop screen. It clicked up 26 times in the time it took to turn the corner of the building in a car.

To take the experiment to the next level and open the emails and files and read their contents, all we would have needed was a a specially-designed programme called Airsnort, freely available on the internet and simple to use.

Cracknell estimated that this would take between one and two hours - but it is illegal under the Telecommunications Act and possibly the Official Secrets Act.
12:55 # G!

(Ur-)Oma-Geburtstag.

Zur Erinnerung. Gefeiert wird Sonntag 12:30 im Lokal

Burgfreund
Burgstr. 2
45289 Essen-Burgaltendorf

Das ganze ist gut beim Stadtplandienst zu finden.
12:10 # G!

(Ur-)Oma-Geburtstag.

Zur Erinnerung. Gefeiert wird Sonntag 12:30 im Lokal

Burgfreund
Burgstr. 2
45289 Essen-Burgaltendorf

Das ganze ist gut beim Stadtplandienst zu finden.
12:10 # G!

18. FIfF-Jahrestagung

18. FIfF-Jahrestagung: TECHNIK, GESCHLECHT, GESELLSCHAFT

Die diesj...hrige Jahrestagung des Forum InformatikerInnen f[florin]r Frieden und gesellschaftliche Verantwortung (FIfF) e. V. findet vom 18. bis 20. Oktober 2002 in Freiburg i. Br. statt. Von Freitag Abend bis Sonntag Mittag besch...ftigen sich mehrere Hauptvortr...ge und Arbeitsgruppen mit Fragen der Ver...nderungen durch IuK-Technik, die sowohl Frauen wie M...nner als auch das Geschlechterverh...ltnis betreffen. Wie immer werden am Samstag in halb- oder ganzt...gigen Arbeitsgruppen auch andere aktuelle Probleme der IuK-Technologien behandelt, wobei das Thema ?[integral]berwachung? einen weiteren Schwerpunkt der Tagung bilden wird. Am Sonntag schlie§t die Tagung mit einem Vortrag von Prof. Akbar Popal, Pr...sident der Universit...t Kabul, und einer Podiumsdiskussion zum Thema [integral]berwachung.

Wer sich noch bis zum 1. September 2002 anmeldet und den Teilnahmebeitrag [florin]berweist, hat den Vorteil von g[florin]nstigen Tagungsgeb[florin]hren: 80E f[florin]r Erwerbst...tige, 30E f[florin]r nicht Erwerbst...tige. Danach kostet es f[florin]r Erwerbst...tige 120? und f[florin]r nicht Erwerbst...tige 50E. Die Geb[florin]hren schlie§en die Verpflegung auf der Tagung mit ein.

Weitere Informationen, das aktuelle Programm und die Online-Anmeldung sind zu finden unter: http://mod.iig.uni-freiburg.de/fiff-JT2002 ["infowar.de"]
11:59 # G! Translate

18. FIfF-Jahrestagung

18. FIfF-Jahrestagung: TECHNIK, GESCHLECHT, GESELLSCHAFT

Die diesj...hrige Jahrestagung des Forum InformatikerInnen f[florin]r Frieden und gesellschaftliche Verantwortung (FIfF) e. V. findet vom 18. bis 20. Oktober 2002 in Freiburg i. Br. statt. Von Freitag Abend bis Sonntag Mittag besch...ftigen sich mehrere Hauptvortr...ge und Arbeitsgruppen mit Fragen der Ver...nderungen durch IuK-Technik, die sowohl Frauen wie M...nner als auch das Geschlechterverh...ltnis betreffen. Wie immer werden am Samstag in halb- oder ganzt...gigen Arbeitsgruppen auch andere aktuelle Probleme der IuK-Technologien behandelt, wobei das Thema ?[integral]berwachung? einen weiteren Schwerpunkt der Tagung bilden wird. Am Sonntag schlie§t die Tagung mit einem Vortrag von Prof. Akbar Popal, Pr...sident der Universit...t Kabul, und einer Podiumsdiskussion zum Thema [integral]berwachung.

Wer sich noch bis zum 1. September 2002 anmeldet und den Teilnahmebeitrag [florin]berweist, hat den Vorteil von g[florin]nstigen Tagungsgeb[florin]hren: 80E f[florin]r Erwerbst...tige, 30E f[florin]r nicht Erwerbst...tige. Danach kostet es f[florin]r Erwerbst...tige 120? und f[florin]r nicht Erwerbst...tige 50E. Die Geb[florin]hren schlie§en die Verpflegung auf der Tagung mit ein.

Weitere Informationen, das aktuelle Programm und die Online-Anmeldung sind zu finden unter: http://mod.iig.uni-freiburg.de/fiff-JT2002 ["infowar.de"]
11:59 # G! Translate

Tillers on Evidence: commentary and perspective on evidence by Peter Tillers

Evidence Of Intelligent Life. The folks at JURIST are going blawg wild: "JURIST is pleased to present Tillers on Evidence, the first of a series of new JURIST web logs offering ongoing commentary and perspective from law professors on specific areas of legal doctrine. An acclaimed evidence scholar and lately Visiting Professor at Harvard Law School, Peter Tillers is Professor of Law, Benjamin N. Cardozo School of Law, Yeshiva University, New York." [Bag and Baggage]
11:05 # G!

Tillers on Evidence: commentary and perspective on evidence by Peter Tillers

Evidence Of Intelligent Life. The folks at JURIST are going blawg wild: "JURIST is pleased to present Tillers on Evidence, the first of a series of new JURIST web logs offering ongoing commentary and perspective from law professors on specific areas of legal doctrine. An acclaimed evidence scholar and lately Visiting Professor at Harvard Law School, Peter Tillers is Professor of Law, Benjamin N. Cardozo School of Law, Yeshiva University, New York." [Bag and Baggage]
11:05 # G!

Call for Papers: RSA Conference 2003

The RSA Conference 2003 will be held in San Francisco on April 13-17. Deadline for submissions is September 16. [Dr. Dobb's]
11:01 # G!

Call for Papers: RSA Conference 2003

The RSA Conference 2003 will be held in San Francisco on April 13-17. Deadline for submissions is September 16. [Dr. Dobb's]
11:01 # G!

Adrian Lamo bumped from NBC after hacking them for them

The helpful hacker demonstrates his techniques on camera for the NBC Nightly News, but lawyers kill the story when he cracks the broadcast network's own systems. [Help Net Security - News] also [The Register] and [SecurityFocus]

I have troubles understanding why acessing NBCs Copmputer Network with NBCs consent should be computer crime like NBCs lawyers assumed. But I guess they had greater insight in the case.
10:08 # G!

Adrian Lamo bumped from NBC after hacking them for them

The helpful hacker demonstrates his techniques on camera for the NBC Nightly News, but lawyers kill the story when he cracks the broadcast network's own systems. [Help Net Security - News] also [The Register] and [SecurityFocus]

I have troubles understanding why acessing NBCs Copmputer Network with NBCs consent should be computer crime like NBCs lawyers assumed. But I guess they had greater insight in the case.
10:08 # G!

Executing Code From Non-executable Files

In "Executing Code From Non-executable Files" Brian Hatch explores exactly this by looking man pages/troff files and postscript. Not terribly relevant because every sane person uses stuff like -dSAFER> but nevertheless a nice read. Reminds me on the DOS/BBS Times ANSI stuff via [LinuxSecurity.com - Latest News]
9:49 # G!

Executing Code From Non-executable Files

In "Executing Code From Non-executable Files" Brian Hatch explores exactly this by looking man pages/troff files and postscript. Not terribly relevant because every sane person uses stuff like -dSAFER> but nevertheless a nice read. Reminds me on the DOS/BBS Times ANSI stuff via [LinuxSecurity.com - Latest News]
9:49 # G!

ZD Pays Subscribers for Security Breach

Ziff Davis Media has settled out of a neglicence investigation led by three states, following a security lapse that exposed billing and personal information for thousands of subscribers to Electronic Gaming Monthly on the magazine's web site. The compromised data was accessible for nearly a month, and included over fifty credit card numbers, some of which were stolen and used fraudulently. Under the terms of the settlement, ZD will pay 500 to each customer whose credit card was exposed, as well as 75,000 to the states of California, Vermont, and New York to pay for the investigation. [Hideaway.Net]
8:56 # G!

ZD Pays Subscribers for Security Breach

Ziff Davis Media has settled out of a neglicence investigation led by three states, following a security lapse that exposed billing and personal information for thousands of subscribers to Electronic Gaming Monthly on the magazine's web site. The compromised data was accessible for nearly a month, and included over fifty credit card numbers, some of which were stolen and used fraudulently. Under the terms of the settlement, ZD will pay 500 to each customer whose credit card was exposed, as well as 75,000 to the states of California, Vermont, and New York to pay for the investigation. [Hideaway.Net]
8:56 # G!

Judge Demands FBI Defend Its Terror Investigation

A federal judge is demanding that the FBI explain how it examined computers that terrorism defendant Zacarias Moussaoui said he used and also explain why the bureau couldn't find traces of his e-mail account. Moussaoui, who is representing himself, had asked U.S. District Judge Leonie M. Brinkema in Virginia weeks ago to force prosecutors to turn over any information they uncovered about the account. [Law.com] also [CNN]

I observe some tendence by law enforcement to get more tech savy (good) and tell the court in trial he wouldn't understand the detais shouldn't ask and discussing the way they did 'cyber-investigations' in courd would harm law enforcement in the fututre (bad). In this case they have to explain why their investigation didn't work as good as claimed.
8:11 # G!

Judge Demands FBI Defend Its Terror Investigation

A federal judge is demanding that the FBI explain how it examined computers that terrorism defendant Zacarias Moussaoui said he used and also explain why the bureau couldn't find traces of his e-mail account. Moussaoui, who is representing himself, had asked U.S. District Judge Leonie M. Brinkema in Virginia weeks ago to force prosecutors to turn over any information they uncovered about the account. [Law.com] also [CNN]

I observe some tendence by law enforcement to get more tech savy (good) and tell the court in trial he wouldn't understand the detais shouldn't ask and discussing the way they did 'cyber-investigations' in courd would harm law enforcement in the fututre (bad). In this case they have to explain why their investigation didn't work as good as claimed.
8:11 # G!

RIAA Web site hack allows music file downloads

The Recording Industry Association of America Inc.'s (RIAA) Web site apparently was hacked today, forcing the music industry backer into a most unnatural act -- providing free music for download.

[...]

A message on the apparently hacked RIAA Web site said, "The RIAA wishes to apologize for the heavy-handed manner in which the popular chinese [sic] site Listen4Ever was closed down, and would like to present the following items for free download as a token of its goodwill." The altered RIAA home page included a link to that message.

The message went on to say, "Of course the list is relatively small, but please be patient -- we expect to offer over 300 next week. We also intend to offer pre-released movies in the coming months."

Some users were apparently able to download songs from the RIAA site for several hours early today until it became unreachable due either to heavy traffic or to the RIAA taking the site down. [ComputerWorld - Security Knowledge Center] see also [Wired]
8:03 # G!

RIAA Web site hack allows music file downloads

The Recording Industry Association of America Inc.'s (RIAA) Web site apparently was hacked today, forcing the music industry backer into a most unnatural act -- providing free music for download.

[...]

A message on the apparently hacked RIAA Web site said, "The RIAA wishes to apologize for the heavy-handed manner in which the popular chinese [sic] site Listen4Ever was closed down, and would like to present the following items for free download as a token of its goodwill." The altered RIAA home page included a link to that message.

The message went on to say, "Of course the list is relatively small, but please be patient -- we expect to offer over 300 next week. We also intend to offer pre-released movies in the coming months."

Some users were apparently able to download songs from the RIAA site for several hours early today until it became unreachable due either to heavy traffic or to the RIAA taking the site down. [ComputerWorld - Security Knowledge Center] see also [Wired]
8:03 # G!

ActiveX Control Could Allow Certificate Deletion

[Kill-HUP.com]
7:56 # G!

ActiveX Control Could Allow Certificate Deletion

[Kill-HUP.com]
7:56 # G!

Maximillian Dornseif, 2002.
 
August 2002
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Jul   Sep

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.