|
Thursday, August 29, 2002 |
M[integral]NCHEN (COMPUTERWOCHE) - Mindestens jedes zweite Unternehmen war bereits Opfer von Hackern oder Saboteuren aus dem eigenen Haus, hat die Unternehmensberatung Mummert + Partner ermittelt. Dabei w[florin]rden die Angriffe oft nicht erkannt und ihre Folgen als technisches Problem abgetan. Die Experten gehen davon aus, dass bereits im Jahr 2005 [florin]ber 90 Prozent aller Firmen betroffen sein werden. Der Einsatz von Antivirensoftware und Firewalls helfe dagegen nicht. Die Berater empfehlen deshalb, ein Intrusion Detection System zu installieren, um Unternehmensnetze vor Datendieben zu sch[florin]tzen. [ComputerWoche: Nachrichten]
23:53
#
G!
Translate
| |
M[integral]NCHEN (COMPUTERWOCHE) - Mindestens jedes zweite Unternehmen war bereits Opfer von Hackern oder Saboteuren aus dem eigenen Haus, hat die Unternehmensberatung Mummert + Partner ermittelt. Dabei w[florin]rden die Angriffe oft nicht erkannt und ihre Folgen als technisches Problem abgetan. Die Experten gehen davon aus, dass bereits im Jahr 2005 [florin]ber 90 Prozent aller Firmen betroffen sein werden. Der Einsatz von Antivirensoftware und Firewalls helfe dagegen nicht. Die Berater empfehlen deshalb, ein Intrusion Detection System zu installieren, um Unternehmensnetze vor Datendieben zu sch[florin]tzen. [ComputerWoche: Nachrichten]
23:53
#
G!
Translate
| |
With new spyware, even your private Yahoo, Hotmail e-mails can be seen Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. A new version of eBlaster spyware will secretly forward all e-mail coming and going through such Web-based accounts to a spy's e-mail, allowing anyone to "ride-along" even the supposedly private e-mail. [ ... ] But word of the software's new feature disturbed privacy advocate Richard Smith of ComputerBytesMan.com -- and he suggested potential users think twice before installing the software, "This is e-mail wiretapping," Smith said. "I would put up a big warning flag. Anybody who would consider buying this product should check with a lawyer first. There is a high probability it runs afoul of the Electronic Communications Privacy Act. I would not take the company's word that it's legal." Enacted in 1986, the Electronic Communications Privacy Act prohibits interception and disclosure of wire, oral, or electronic communications in most cases. Spyware like that produced by SpectorSoft and competitor WinWhatWhere Corp. has not yet faced a definitive courtroom test. But David Sobel, general counsel of the Electronic Privacy Information Center, equated private Web-based e-mail account with an employee receiving a personal letter through the company mailroom. The contents of such a letter are protected by U.S. mail regulations. "The question is: Is there a reasonable expectation of privacy? I would argue that if a company.com account is provided to me for company business, I can assume it might be subject to monitoring ... but if I take additional step to set up a Hotmail account that I occasionally access from my desktop at work, I think that could be construed as an expression of an expectation of privacy." Nevertheless, the spyware makers generally argue that employers have the right to observe anything that happens on company-owned computers. [Privacy Digest]
I wonder very much how this should work. I never used Hotmail but the webmailsers I know all use SSL/TLS encrypted connections. While SSL/TLS can be attacked (man-in-the-middle, attacking the Client OS, fallback from https to http etc.) I wonder if and how this can be rolled in a commercial product.
If this product really works as advertised idt poses all sorts of interesting questions about its use by law enforcement.
23:34
#
G!
| |
With new spyware, even your private Yahoo, Hotmail e-mails can be seen Think using Yahoo or Hotmail e-mail at work protects you from your boss' prying eyes? Think again. New spy software essentially lets employers or parents co-pilot virtually any kind of e-mail account, including private Web-based e-mail accounts like Yahoo and Hotmail. A new version of eBlaster spyware will secretly forward all e-mail coming and going through such Web-based accounts to a spy's e-mail, allowing anyone to "ride-along" even the supposedly private e-mail. [ ... ] But word of the software's new feature disturbed privacy advocate Richard Smith of ComputerBytesMan.com -- and he suggested potential users think twice before installing the software, "This is e-mail wiretapping," Smith said. "I would put up a big warning flag. Anybody who would consider buying this product should check with a lawyer first. There is a high probability it runs afoul of the Electronic Communications Privacy Act. I would not take the company's word that it's legal." Enacted in 1986, the Electronic Communications Privacy Act prohibits interception and disclosure of wire, oral, or electronic communications in most cases. Spyware like that produced by SpectorSoft and competitor WinWhatWhere Corp. has not yet faced a definitive courtroom test. But David Sobel, general counsel of the Electronic Privacy Information Center, equated private Web-based e-mail account with an employee receiving a personal letter through the company mailroom. The contents of such a letter are protected by U.S. mail regulations. "The question is: Is there a reasonable expectation of privacy? I would argue that if a company.com account is provided to me for company business, I can assume it might be subject to monitoring ... but if I take additional step to set up a Hotmail account that I occasionally access from my desktop at work, I think that could be construed as an expression of an expectation of privacy." Nevertheless, the spyware makers generally argue that employers have the right to observe anything that happens on company-owned computers. [Privacy Digest]
I wonder very much how this should work. I never used Hotmail but the webmailsers I know all use SSL/TLS encrypted connections. While SSL/TLS can be attacked (man-in-the-middle, attacking the Client OS, fallback from https to http etc.) I wonder if and how this can be rolled in a commercial product.
If this product really works as advertised idt poses all sorts of interesting questions about its use by law enforcement.
23:34
#
G!
| |
Given the increased anonymity and decreased physical danger associated with criminal activity online, NewsFactor asks if crime actually does pay more on the Internet. The required skill level for entry into the virtual crime scene may be higher, but just think of how much you'll save on ski masks and loot sacks ;) [Kill-HUP.com]
23:18
#
G!
| |
Given the increased anonymity and decreased physical danger associated with criminal activity online, NewsFactor asks if crime actually does pay more on the Internet. The required skill level for entry into the virtual crime scene may be higher, but just think of how much you'll save on ski masks and loot sacks ;) [Kill-HUP.com]
23:18
#
G!
| |
An drew Raff asks What is software? and drifts to an interesting discussion how software should be protected:
Talk amongst yourselves. Topic: Should software be covered by copyright or patent? For how long?
Ideas from Daves and Larrys: Weinberger, Winer, Sifry, Staton and Lessig (and more Lessig.) [Andrew Raff: Shameless Self Promotion]
An other interesting question is What is a computer? There are many Laws worldide punishing certain actions to a computer or using a computer. It is not hard to imagine what legislators had in mind when writing "computer" (this mainframe and PC things) but this alon can't be the foundation of computer crime dogmatics. If we define computer as "machine that computes" or even "thing with microchips in it" we will get into a situation a few years in the future where it will be very difficult to commit any crime without commiting a computer crime.
Every tool more complex than a hammer, every building, every cashier and nearly all other man made stuff will contain a 'computer'. So most of the crimes involving this objects will involve manipulating or harming the computers in them. So all this crimes are potential computer crimes which does not seem to be apropriate.
We need something better.
23:01
#
G!
| |
An drew Raff asks What is software? and drifts to an interesting discussion how software should be protected:
Talk amongst yourselves. Topic: Should software be covered by copyright or patent? For how long?
Ideas from Daves and Larrys: Weinberger, Winer, Sifry, Staton and Lessig (and more Lessig.) [Andrew Raff: Shameless Self Promotion]
An other interesting question is What is a computer? There are many Laws worldide punishing certain actions to a computer or using a computer. It is not hard to imagine what legislators had in mind when writing "computer" (this mainframe and PC things) but this alon can't be the foundation of computer crime dogmatics. If we define computer as "machine that computes" or even "thing with microchips in it" we will get into a situation a few years in the future where it will be very difficult to commit any crime without commiting a computer crime.
Every tool more complex than a hammer, every building, every cashier and nearly all other man made stuff will contain a 'computer'. So most of the crimes involving this objects will involve manipulating or harming the computers in them. So all this crimes are potential computer crimes which does not seem to be apropriate.
We need something better.
23:01
#
G!
| |
Sending out unsolicited text messages that misled mobile users to believe they had won a £500 prize proves to be rather expensive
ZDnet via [Moreover - moreover...] also [silicon.com]
22:26
#
G!
| |
Sending out unsolicited text messages that misled mobile users to believe they had won a £500 prize proves to be rather expensive
ZDnet via [Moreover - moreover...] also [silicon.com]
22:26
#
G!
| |
CodeCon is the premier showcase of active hacker projects. It is an
excellent opportunity for developers to demonstrate their work, and
for coding hackers to find out about what's going on in their
community.
All presentations must be accompanied by functional applications,
ideally open source. Presenters must be one of the active developers
of the code in question. We emphasize that demonstrations be of
*working* code, and reproducible by other people. Throughout the
event, we will have several kiosks and local servers available for
demonstration purposes.
We hereby solicit papers and demonstrations.
| |
CodeCon is the premier showcase of active hacker projects. It is an
excellent opportunity for developers to demonstrate their work, and
for coding hackers to find out about what's going on in their
community.
All presentations must be accompanied by functional applications,
ideally open source. Presenters must be one of the active developers
of the code in question. We emphasize that demonstrations be of
*working* code, and reproducible by other people. Throughout the
event, we will have several kiosks and local servers available for
demonstration purposes.
We hereby solicit papers and demonstrations.
| |
Law.com has an article by Albert Barsocchini called "Electronic Data Discovery Primer
" which is a nice introducion on Computer forensics and how to get there.
20:22
#
G!
| |
Law.com has an article by Albert Barsocchini called "Electronic Data Discovery Primer
" which is a nice introducion on Computer forensics and how to get there.
20:22
#
G!
| |
FiestaCrow 2003 Call-for-Papers
Outlined below are the theme and session topics for the 2003
FiestaCrow Symposium. This is an initial call for papers of interest
related to the overall theme and these technical sessions.
Papers are due by 15 November 2002.
THEME: FULL SPECTRUM OPERATIONS FOR FUTURE CONFLICTS AND HOMELAND
DEFENSE
The FiestaCrow 2003 theme will draw on current world events and
actions related to the counter-terrorism conflicts as well as the
heightened interest in Homeland Defense of the United States. After
the events of Sep 11, new interest and focus has evolved on the use of
Information Warfare (IW) to support full spectrum operations.
Increased emphasis on areas such as integrated air, space, and
information operations; effects based operations (both defensive and
offensive); the weaponization process for IW, and expanded use of the
perception management portions of IW are all worth exploring through
the technical track of FiestaCrow 2003.
Session 1: Effects based operations and Information Operations.
Session 2: Information Operations and the role of strategic influence
and perception management.
Session 3: IO/IW in support of Homeland Defense. What role can and is
the military playing?
[via "ISN"]
20:16
#
G!
| |
FiestaCrow 2003 Call-for-Papers
Outlined below are the theme and session topics for the 2003
FiestaCrow Symposium. This is an initial call for papers of interest
related to the overall theme and these technical sessions.
Papers are due by 15 November 2002.
THEME: FULL SPECTRUM OPERATIONS FOR FUTURE CONFLICTS AND HOMELAND
DEFENSE
The FiestaCrow 2003 theme will draw on current world events and
actions related to the counter-terrorism conflicts as well as the
heightened interest in Homeland Defense of the United States. After
the events of Sep 11, new interest and focus has evolved on the use of
Information Warfare (IW) to support full spectrum operations.
Increased emphasis on areas such as integrated air, space, and
information operations; effects based operations (both defensive and
offensive); the weaponization process for IW, and expanded use of the
perception management portions of IW are all worth exploring through
the technical track of FiestaCrow 2003.
Session 1: Effects based operations and Information Operations.
Session 2: Information Operations and the role of strategic influence
and perception management.
Session 3: IO/IW in support of Homeland Defense. What role can and is
the military playing?
[via "ISN"]
20:16
#
G!
| |
["ISN"] reports another WiLDing/Airboxing/Warchalcing/Wardriving story by the Sunday Mirror going around britisch government buildings. As far as I can understand the story all they got was WEP encrypted traffic although there was talk about catching sensive emails which didn't make sense to me in the context of the rest of the story. While it is well known thai plain WEP is inadequate for keeping your data secure and all the WEP-beef-ups showing up have problems, the article doesn't have the imagination to consider, if there is some other security layer inside the WEP packets. May be the have a firewalled-to-death IPsec VPN in it.
Some Quotes from th article for your amusement:
Using a laptop computer in the shadow of Big Ben, we identified 26 parcels of confidential computer information. The secret identity code of the Government network - which the Sunday Mirror will not reveal for security reasons - flashed up on the screen in a small box with a connection confirmation signal.
The data box timed the session as lasting 11 minutes and 48 seconds but the connection was not detected.
The Sunday Mirror has learned that several big banks have hidden copies of sensitive files at secret websites to counter this threat.
[...]
The Sunday Mirror commissioned Britain's top wireless security expert Phil Cracknell to test the Government's security. He used a £2500 handheld Compaq computer, modified to scan radiowaves, to measure the strength of leaks from Whitehall buildings.
[...]
itor the flow of electronic data around Portcullis House. For example, every time an email was sent it registered on a box on our laptop screen. It clicked up 26 times in the time it took to turn the corner of the building in a car.
To take the experiment to the next level and open the emails and files and read their contents, all we would have needed was a a specially-designed programme called Airsnort, freely available on the internet and simple to use.
Cracknell estimated that this would take between one and two hours - but it is illegal under the Telecommunications Act and possibly the Official Secrets Act.
12:55
#
G!
| |
["ISN"] reports another WiLDing/Airboxing/Warchalcing/Wardriving story by the Sunday Mirror going around britisch government buildings. As far as I can understand the story all they got was WEP encrypted traffic although there was talk about catching sensive emails which didn't make sense to me in the context of the rest of the story. While it is well known thai plain WEP is inadequate for keeping your data secure and all the WEP-beef-ups showing up have problems, the article doesn't have the imagination to consider, if there is some other security layer inside the WEP packets. May be the have a firewalled-to-death IPsec VPN in it.
Some Quotes from th article for your amusement:
Using a laptop computer in the shadow of Big Ben, we identified 26 parcels of confidential computer information. The secret identity code of the Government network - which the Sunday Mirror will not reveal for security reasons - flashed up on the screen in a small box with a connection confirmation signal.
The data box timed the session as lasting 11 minutes and 48 seconds but the connection was not detected.
The Sunday Mirror has learned that several big banks have hidden copies of sensitive files at secret websites to counter this threat.
[...]
The Sunday Mirror commissioned Britain's top wireless security expert Phil Cracknell to test the Government's security. He used a £2500 handheld Compaq computer, modified to scan radiowaves, to measure the strength of leaks from Whitehall buildings.
[...]
itor the flow of electronic data around Portcullis House. For example, every time an email was sent it registered on a box on our laptop screen. It clicked up 26 times in the time it took to turn the corner of the building in a car.
To take the experiment to the next level and open the emails and files and read their contents, all we would have needed was a a specially-designed programme called Airsnort, freely available on the internet and simple to use.
Cracknell estimated that this would take between one and two hours - but it is illegal under the Telecommunications Act and possibly the Official Secrets Act.
12:55
#
G!
| |
Zur Erinnerung. Gefeiert wird Sonntag 12:30 im Lokal
Burgfreund
Burgstr. 2
45289 Essen-Burgaltendorf
Das ganze ist gut beim Stadtplandienst zu finden.
12:10
#
G!
| |
Zur Erinnerung. Gefeiert wird Sonntag 12:30 im Lokal
Burgfreund
Burgstr. 2
45289 Essen-Burgaltendorf
Das ganze ist gut beim Stadtplandienst zu finden.
12:10
#
G!
| |
18. FIfF-Jahrestagung: TECHNIK, GESCHLECHT, GESELLSCHAFT
Die diesj...hrige Jahrestagung des Forum InformatikerInnen
f[florin]r Frieden und gesellschaftliche Verantwortung (FIfF) e.
V. findet vom 18. bis 20. Oktober 2002 in Freiburg i. Br.
statt. Von Freitag Abend bis Sonntag Mittag besch...ftigen
sich mehrere Hauptvortr...ge und Arbeitsgruppen mit Fragen
der Ver...nderungen durch IuK-Technik, die sowohl Frauen wie
M...nner als auch das Geschlechterverh...ltnis betreffen.
Wie immer werden am Samstag in halb- oder ganzt...gigen
Arbeitsgruppen auch andere aktuelle Probleme der
IuK-Technologien behandelt, wobei das Thema ?[integral]berwachung?
einen weiteren Schwerpunkt der Tagung bilden wird. Am
Sonntag schlie§t die Tagung mit einem Vortrag von Prof.
Akbar Popal, Pr...sident der Universit...t Kabul, und einer
Podiumsdiskussion zum Thema [integral]berwachung.
Wer sich noch bis zum 1. September 2002 anmeldet und den
Teilnahmebeitrag [florin]berweist, hat den Vorteil von g[florin]nstigen
Tagungsgeb[florin]hren: 80E f[florin]r Erwerbst...tige, 30E f[florin]r nicht
Erwerbst...tige. Danach kostet es f[florin]r Erwerbst...tige 120? und
f[florin]r nicht Erwerbst...tige 50E. Die Geb[florin]hren schlie§en die
Verpflegung auf der Tagung mit ein.
Weitere Informationen, das aktuelle Programm und die
Online-Anmeldung sind zu finden unter:
http://mod.iig.uni-freiburg.de/fiff-JT2002
["infowar.de"]
11:59
#
G!
Translate
| |
18. FIfF-Jahrestagung: TECHNIK, GESCHLECHT, GESELLSCHAFT
Die diesj...hrige Jahrestagung des Forum InformatikerInnen
f[florin]r Frieden und gesellschaftliche Verantwortung (FIfF) e.
V. findet vom 18. bis 20. Oktober 2002 in Freiburg i. Br.
statt. Von Freitag Abend bis Sonntag Mittag besch...ftigen
sich mehrere Hauptvortr...ge und Arbeitsgruppen mit Fragen
der Ver...nderungen durch IuK-Technik, die sowohl Frauen wie
M...nner als auch das Geschlechterverh...ltnis betreffen.
Wie immer werden am Samstag in halb- oder ganzt...gigen
Arbeitsgruppen auch andere aktuelle Probleme der
IuK-Technologien behandelt, wobei das Thema ?[integral]berwachung?
einen weiteren Schwerpunkt der Tagung bilden wird. Am
Sonntag schlie§t die Tagung mit einem Vortrag von Prof.
Akbar Popal, Pr...sident der Universit...t Kabul, und einer
Podiumsdiskussion zum Thema [integral]berwachung.
Wer sich noch bis zum 1. September 2002 anmeldet und den
Teilnahmebeitrag [florin]berweist, hat den Vorteil von g[florin]nstigen
Tagungsgeb[florin]hren: 80E f[florin]r Erwerbst...tige, 30E f[florin]r nicht
Erwerbst...tige. Danach kostet es f[florin]r Erwerbst...tige 120? und
f[florin]r nicht Erwerbst...tige 50E. Die Geb[florin]hren schlie§en die
Verpflegung auf der Tagung mit ein.
Weitere Informationen, das aktuelle Programm und die
Online-Anmeldung sind zu finden unter:
http://mod.iig.uni-freiburg.de/fiff-JT2002
["infowar.de"]
11:59
#
G!
Translate
| |
Evidence Of Intelligent Life. The folks at JURIST are going blawg wild: "JURIST is pleased to present Tillers on Evidence, the first of a series of new JURIST web logs offering ongoing commentary and perspective from law professors on specific areas of legal doctrine. An acclaimed evidence scholar and lately Visiting Professor at Harvard Law School, Peter Tillers is Professor of Law, Benjamin N. Cardozo School of Law, Yeshiva University, New York." [Bag and Baggage]
11:05
#
G!
| |
Evidence Of Intelligent Life. The folks at JURIST are going blawg wild: "JURIST is pleased to present Tillers on Evidence, the first of a series of new JURIST web logs offering ongoing commentary and perspective from law professors on specific areas of legal doctrine. An acclaimed evidence scholar and lately Visiting Professor at Harvard Law School, Peter Tillers is Professor of Law, Benjamin N. Cardozo School of Law, Yeshiva University, New York." [Bag and Baggage]
11:05
#
G!
| |
The RSA Conference 2003 will be held in San Francisco on April 13-17. Deadline for submissions is September 16. [Dr. Dobb's]
11:01
#
G!
| |
The RSA Conference 2003 will be held in San Francisco on April 13-17. Deadline for submissions is September 16. [Dr. Dobb's]
11:01
#
G!
| |
The helpful hacker demonstrates his techniques on camera for the NBC Nightly News, but lawyers kill the story when he cracks the broadcast network's own systems. [Help Net Security - News] also [The Register] and [SecurityFocus]
I have troubles understanding why acessing NBCs Copmputer Network with NBCs consent should be computer crime like NBCs lawyers assumed. But I guess they had greater insight in the case.
10:08
#
G!
| |
The helpful hacker demonstrates his techniques on camera for the NBC Nightly News, but lawyers kill the story when he cracks the broadcast network's own systems. [Help Net Security - News] also [The Register] and [SecurityFocus]
I have troubles understanding why acessing NBCs Copmputer Network with NBCs consent should be computer crime like NBCs lawyers assumed. But I guess they had greater insight in the case.
10:08
#
G!
| |
In "Executing Code From Non-executable Files" Brian Hatch explores exactly this by looking man pages/troff files and postscript. Not terribly relevant because every sane person uses stuff like -dSAFER> but nevertheless a nice read. Reminds me on the DOS/BBS Times ANSI stuff via [LinuxSecurity.com - Latest News]
9:49
#
G!
| |
In "Executing Code From Non-executable Files" Brian Hatch explores exactly this by looking man pages/troff files and postscript. Not terribly relevant because every sane person uses stuff like -dSAFER> but nevertheless a nice read. Reminds me on the DOS/BBS Times ANSI stuff via [LinuxSecurity.com - Latest News]
9:49
#
G!
| |
Ziff Davis Media has settled out of a neglicence investigation led by three states, following a security lapse that exposed billing and personal information for thousands of subscribers to Electronic Gaming Monthly on the magazine's web site. The compromised data was accessible for nearly a month, and included over fifty credit card numbers, some of which were stolen and used fraudulently. Under the terms of the settlement, ZD will pay 500 to each customer whose credit card was exposed, as well as 75,000 to the states of California, Vermont, and New York to pay for the investigation.
[Hideaway.Net]
8:56
#
G!
| |
Ziff Davis Media has settled out of a neglicence investigation led by three states, following a security lapse that exposed billing and personal information for thousands of subscribers to Electronic Gaming Monthly on the magazine's web site. The compromised data was accessible for nearly a month, and included over fifty credit card numbers, some of which were stolen and used fraudulently. Under the terms of the settlement, ZD will pay 500 to each customer whose credit card was exposed, as well as 75,000 to the states of California, Vermont, and New York to pay for the investigation.
[Hideaway.Net]
8:56
#
G!
| |
A federal judge is demanding that the FBI explain how it examined computers that terrorism defendant Zacarias Moussaoui said he used and also explain why the bureau couldn't find traces of his e-mail account. Moussaoui, who is representing himself, had asked U.S. District Judge Leonie M. Brinkema in Virginia weeks ago to force prosecutors to turn over any information they uncovered about the account. [Law.com] also [CNN]
I observe some tendence by law enforcement to get more tech savy (good) and tell the court in trial he wouldn't understand the detais shouldn't ask and discussing the way they did 'cyber-investigations' in courd would harm law enforcement in the fututre (bad). In this case they have to explain why their investigation didn't work as good as claimed.
8:11
#
G!
| |
A federal judge is demanding that the FBI explain how it examined computers that terrorism defendant Zacarias Moussaoui said he used and also explain why the bureau couldn't find traces of his e-mail account. Moussaoui, who is representing himself, had asked U.S. District Judge Leonie M. Brinkema in Virginia weeks ago to force prosecutors to turn over any information they uncovered about the account. [Law.com] also [CNN]
I observe some tendence by law enforcement to get more tech savy (good) and tell the court in trial he wouldn't understand the detais shouldn't ask and discussing the way they did 'cyber-investigations' in courd would harm law enforcement in the fututre (bad). In this case they have to explain why their investigation didn't work as good as claimed.
8:11
#
G!
| |
The Recording Industry Association of America Inc.'s (RIAA) Web site apparently was hacked today, forcing the music industry backer into a most unnatural act -- providing free music for download.
[...]
A message on the apparently hacked RIAA Web site said, "The RIAA wishes to apologize for the heavy-handed manner in which the popular chinese [sic] site Listen4Ever was closed down, and would like to present the following items for free download as a token of its goodwill." The altered RIAA home page included a link to that message.
The message went on to say, "Of course the list is relatively small, but please be patient -- we expect to offer over 300 next week. We also intend to offer pre-released movies in the coming months."
Some users were apparently able to download songs from the RIAA site for several hours early today until it became unreachable due either to heavy traffic or to the RIAA taking the site down.
[ComputerWorld - Security Knowledge Center] see also [Wired]
8:03
#
G!
| |
The Recording Industry Association of America Inc.'s (RIAA) Web site apparently was hacked today, forcing the music industry backer into a most unnatural act -- providing free music for download.
[...]
A message on the apparently hacked RIAA Web site said, "The RIAA wishes to apologize for the heavy-handed manner in which the popular chinese [sic] site Listen4Ever was closed down, and would like to present the following items for free download as a token of its goodwill." The altered RIAA home page included a link to that message.
The message went on to say, "Of course the list is relatively small, but please be patient -- we expect to offer over 300 next week. We also intend to offer pre-released movies in the coming months."
Some users were apparently able to download songs from the RIAA site for several hours early today until it became unreachable due either to heavy traffic or to the RIAA taking the site down.
[ComputerWorld - Security Knowledge Center] see also [Wired]
8:03
#
G!
| |
Maximillian Dornseif, 2002.
|
|
|