Spyware, Viruses, & Security forum

General discussion

NEWS - Aug. 2, 2004

by Donna Buenaventura / August 1, 2004 7:37 PM PDT

Academics Enlist in Spam Battle

Watch out spammers. Academic researchers are raring for battle.
On Friday, the inaugural Conference on E-mail and Anti-Spam opened at Microsoft Corp's campus with a decidedly different approach to fighting unwanted e-mail.

Rather than touting products, speakers vetted research from universities and industry laboratories. Their approaches moved far beyond the Bayesian filtering of yesteryear to the use of sequencing techniques from bioinformatics, cryptography and natural language processing to tackle spam.


Discussion is locked
You are posting a reply to: NEWS - Aug. 2, 2004
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - Aug. 2, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
DNS opens networks to data attacks
by Donna Buenaventura / August 1, 2004 7:45 PM PDT
In reply to: NEWS - Aug. 2, 2004

The same technology that allows Web surfers to locate and connect to computers on the Internet can be used to create covert communications channels, bypass security measures and store distributed content, a security researcher said Saturday.

The security hack essentially uses data transferred by domain name service (DNS) servers to hide additional information in the network communications. DNS servers act as the white pages of the Internet, invisibly transforming easy-to-remember domain names--such as www.cnet.com--into the numerical network addresses used by computers. Moreover, corporate security measures, such as firewalls, tend to ignore DNS data because they assume it's harmless, said Dan Kaminsky, a security researcher for telecommunications firm Avaya and a speaker at the Defcon hacking conference.


Collapse -
US hackers plan three-day contest
by Donna Buenaventura / August 1, 2004 8:10 PM PDT
In reply to: NEWS - Aug. 2, 2004

Up to 1,000 hackers will attempt to 'capture the flag' in a fight across the Internet

If everything goes as planned, for 72 hours next February hackers from all over the United States will hit targets across the Internet in the largest mass attack to date.

But the affected systems won't be corporate Web servers or networks, they'll be computers set up and maintained by other hackers as part of a capture-the-flag game. When the digital dust clears, the team from either the East Coast or the West Coast will be named winner.


Collapse -
Anti-spam spamvertisers agree to quit
by Donna Buenaventura / August 2, 2004 2:34 AM PDT
In reply to: NEWS - Aug. 2, 2004

A Californian company last week promised to stop promoting its ad-blocking software using Internet pop-up ads. San Diego-based D Squared Solutions reportedly used the Messenger function built into Windows to spamvertise its "anti-spam" services. Its cynical marketing tactics caught the attention of regulators the Federal Trade Commission, which instigated a civil case against the two person start-up last year.

Rather than face further expensive litigation, D Squared last week pledged to stop sending pop-up ads. The firm also agreed to stop marketing ad-blocking software and to restrict itself to permission-based marketing. The FTC also has the right to monitor D Squared's business for the next five years.


Collapse -
Mozilla Foundation Announces Security Bug Bounty Program
by Donna Buenaventura / August 2, 2004 2:41 AM PDT
In reply to: NEWS - Aug. 2, 2004

Program harnesses power of the open source community to identify security vulnerabilities before they are exploited

MOUNTAIN VIEW, Calif. - August 2, 2004 - The Mozilla Foundation today announced the Mozilla Security Bug Bounty Program, an initiative that rewards users who identify and report security vulnerabilities in the open source project's software. Under the new program, users reporting critical security bugs - as judged by the Mozilla Foundation staff - will collect a $500 cash prize. The new initiative was launched with funding from leading Linux software developer Linspire, Inc., and renowned Internet entrepreneur Mark Shuttleworth.

"As Mozilla software builds momentum in the marketplace, I'm inspired by the Mozilla Foundation's enduring commitment to transparency and responsiveness on security issues, and I am happy to support this program," commented Mark Shuttleworth.

Identifying software security vulnerabilities requires constant vigilance, and preventing those issues from becoming problems necessitates a dedicated effort to provide quick and effective responses. The Mozilla project has developed a community of users and developers who are passionate about computer security and who continuously provide feedback on Mozilla software. The Mozilla Security Bug Bounty Program seeks to further encourage the community's focus on security consciousness and responsiveness.


Collapse -
Gang warfare is taking down the Net
by Marianna Schmudlach / August 2, 2004 3:43 AM PDT
In reply to: NEWS - Aug. 2, 2004

Robert Vamosi
Senior Editor, Reviews
Monday, Aug. 2

If you're having trouble viewing your favorite sites on the Internet, you're not alone. Within the last two months, we've experienced the return of the MyDoom virus as well as attacks--not on popular Web sites themselves, but on the secondary sites that power them. These two facts are related. What started as local gangs tagging and shutting down rivals has matured into a more sophisticated game that's targeting the interdependencies of the Internet itself.

More: http://reviews-zdnet.com.com/AnchorDesk/4520-7297_16-5148132.html?tag=adts

Popular Forums
Computer Newbies 10,686 discussions
Computer Help 54,365 discussions
Laptops 21,181 discussions
Networking & Wireless 16,313 discussions
Phones 17,137 discussions
Security 31,287 discussions
TVs & Home Theaters 22,101 discussions
Windows 7 8,164 discussions
Windows 10 2,657 discussions


Your favorite shows are back!

Don’t miss your dramas, sitcoms and reality shows. Find out when and where they’re airing!