Spyware, Viruses, & Security forum

General discussion

News - May 12, 2004

by Donna Buenaventura / May 11, 2004 6:48 PM PDT

Judge ties antispammer's hands

A Northern California District Court judge issued a temporary restraining order to prevent SpamCop, an antispam operation, from interfering with messages sent by alleged junk e-mailer OptInRealBig.com.

The court granted the restraining order last Tuesday, and it is scheduled to reconvene May 20. E-mail server company IronPort Systems, owner of SpamCop, filed an appeal Monday asking the judge to dissolve the order before the hearing date, on the grounds that it breaches first amendment rights and damages the company's operations.

The dispute involves practices of SpamCop, an operator of an antispam blocklist that third-parties reference to block bogus mail. SpamCop fields people's complaints about unwanted mail and their senders and uses that information to list the offending Internet Protocol addresses used to send the messages.


Discussion is locked
You are posting a reply to: News - May 12, 2004
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: News - May 12, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Zone-H: Weekly Defacement Commentary 03 - 10 May
by Donna Buenaventura / May 12, 2004 1:15 AM PDT
In reply to: News - May 12, 2004

Special defacements this week for the brazilian group hax0rs lab


that defaced important company like FIAT and BMW in minor countries. But more than that in 2004/05/10 they successfully owned TDK official site in Japan apparently taking advantage of the new bug for SSL in Windows 2000.

Mirror TDK.co.jp http://www.zone-h.org/en/defacements/mirror/id=1185217

We already said a lot about Lycos (https://insite.lycos.com) defaced by Data Cha0s last week. For more info read z\ article http://www.zone-h.org/en/news/read/id=4200

MASS defacement against Government of Brazil done by S4t4n1c S0uls and TechTeam, both brazilians, in a Microsoft Windows 2000 Server bugged of THC IISlame exploit and in a Linux Server with PHP modules bugged of file inclusion.

All deface of S4t4n1c S0uls:


Special MASS gov.br


This deface bringed S4t4n1c S0uls in position 4 of Special defacements Top Attackers of Zone-H.org http://www.zone-h.org/en/hallofshame/special

All deface of TechTeaM:


Special MASS gov.br


Still Brasilians

Still Microsoft Windows 2000

Still SSL bug of IIS 5

Still THC IISlame exploits for various servers of United States Government defaced by S4t4n1c_S0uls, Ir4dex and L0rd_Skull.


Another mass defacement was done by The Ghost Boys but not properly notified, here is the screenshot:


And the list of the sites defaced with this banner at the top (the server was probably hacked using the SSL vulnerability):

www.dgs.ca.gov State of California, Department of General Services

Few other special defacements of last week linking here


SPAX Zone-H Admin

Source: http://www.zone-h.org/en/news/read/id=4224/

Collapse -
by Donna Buenaventura / May 12, 2004 1:30 AM PDT
In reply to: News - May 12, 2004

May 12, 2004 - Macrovision Corporation, the leader in content protection technologies, announced that it will launch its "Hacker University" at this year's E3 Expo in Los Angeles in conjunction with SafeDisc Security API Software Developer Program.

Hacker University is a comprehensive workshop for publishers and developers that focuses on the impact and methodology of game piracy and provides effective defense techniques to minimize this threat.

The Software Developer Program allows developers to leverage Macrovision's technology, resources and anti-piracy methodologies on an ongoing basis to more effectively protect games they develop.

Hacker University is in session in Macrovision's booth #6945 in Kentia Hall at the Los Angeles Convention Center on Wednesday, May 12 and Thursday, May 13. Workshops will be held at 11:00 a.m. and 2:00 p.m. each day. Interested software publishers and developers are encouraged to attend and may sign up for the sessions by visiting the Macrovision booth.

A whitepaper on anti-hack security entitled "The Impact of Game Piracy and Effective Defense Techniques" can be obtained by visiting the Macrovision booth or downloaded from Macrovision's website at www.macrovision.com


Collapse -
German police raid homes in Sasser computer worm probe
by Donna Buenaventura / May 12, 2004 1:33 AM PDT
In reply to: News - May 12, 2004

German police have raided the homes of five people who had been in contact with a teenager arrested last week on suspicion of creating the Sasser computer worm, a spokesman said.

Investigators "suspect that other people took part in spreading the worm. The Verden prosecutors office ordered five raids in the Rotenburg an der Wuemme region," police spokesman Detlef Ehrike said in a statement.

http://story.news.yahoo.com/news?tmpl=story&ncid=1212&e=1&u=/afp/20040512/tc_afp/internet_virus_germany&sid=96001018 (with photos)

Collapse -
Meet the hackers - Raven Alder: Girl power
by Donna Buenaventura / May 12, 2004 1:45 AM PDT
In reply to: News - May 12, 2004

Raven Alder: Girl power

The first woman to deliver a technical presentation at the famed DefCon hacker conference, talks about "gender wars" in the hacking realm.

Name: Raven Alder
Handle(s): Raven
Age: 28
Place of birth: Mississippi, USA
Marital status: Single
Current residence: Maryland, USA
Job: Security consultant, True North Solutions
First computer: Home-built 8088 machine in 1988
Best known for: Tracing spoofed distributed denial of service attacks
Area(s) of expertise: ISP backbone networking, protocol decoding and design, Linux/BSD security, and cryptography

Read more about Raven Alder (with photos) at http://insight.zdnet.co.uk/0,39020415,39154438,00.htm

Collapse -
Law and order
by Donna Buenaventura / May 12, 2004 2:58 AM PDT
In reply to: News - May 12, 2004

Spamming set to become illegal in the Netherlands and other legislative news...

Spamming is about to become illegal in The Netherlands, after the upper house of the Dutch parliament approved changes to telecoms legislation late last month. However, the legislation - which is likely to become law in May or June - only covers spam sent to individual users; spam sent to businesses is unaffected.

Under the new law unsolicited commercial email may not lawfully be sent to consumers unless they have opted in to receive messages. The Dutch Minister of Economic Affairs, Laurens Jan Brinkhorst, has answered critics concerned about the lack of protection afforded to businesses, by promising to undertake 'initiatives' to ensure that anti-spam protection is extended to the business community.

In other legislative news, the Federal Spam Act 2003 took effect in Australia on 11 April. Companies found to be in breach of the legislation will be fined up to AU$220,000 per day or AU$1.1 million for repeat offences. The Australian Computer Society has released a five-step guide for businesses to make sure they are compliant with the new legislation.


Collapse -
Phatbot arrest throws open trade in zombie PCs
by Donna Buenaventura / May 12, 2004 3:01 AM PDT
In reply to: News - May 12, 2004

The arrest of the suspected author of the Phatbot Trojan could lead to valuable clues about the illicit trade in zombie PCs. The arrest of the alleged Phatbot perp was overshadowed by the unmasking of the admitted Sasser author, Sven Jaschan. But the Phatbot case may shed the mostlight into the dark recesses of the computer underground.

Phatbot is much less common than NetSky but is linked much more closely with the trade in compromised PCs to send spam or for other nefarious purposes. Viruses such as My-Doom and Bagle (and Trojans such as Phatbot) surrender the control of infected PCs to hackers. This expanding network of infected, zombie PCs can be used either for spam distribution or as platforms for DDoS attacks, such as those that many online bookies have suffered in recent months. By using compromised machines - instead of open mail relays or unscrupulous hosts - spammers can bypass IP address blacklists.


Collapse -
Crackers declare cyberwar on USA
by Donna Buenaventura / May 12, 2004 6:01 AM PDT
In reply to: News - May 12, 2004

Famous Brazilian newspapers have been informed that a new hacking group composed of worldwide individuals (from Brazil, China, Hong Kong and Russia) has declared cyberwar on the United States of America.
Its name is Hackers Against America (HAA) and their web site is hosted on a Russian server. According to what is written on the main page, they plan to integrate new members and launch attacks against computers based in the US (cracking some of them but also use worms, viruses) in order to steal private documents. Some samples of documents and codes are available on the web site, although they don't seem to be secret at all and possible to find by using search engines.

Even if this threat appears to be tiny now, it is probably not a hoax and it could grow in the future, just keep an eye on it.


Collapse -
'Whispering keyboards' could be next attack trend
by Donna Buenaventura / May 12, 2004 6:06 AM PDT
In reply to: News - May 12, 2004

Listen to this: Eavesdroppers can decipher what is typed by simply listening to the sound of a keystroke, according to a scientist at this week's IEEE Symposium of Security and Privacy in Oakland, Calif.

Each key on computer keyboards, telephones and even ATM machines makes a unique sound as each key is depressed and released, according to a paper entitled "Keyboard Acoustic Emanations" presented Monday by IBM research scientist Dmitri Asonov.

All that is needed is about $200 worth of microphones and sound processing and PC neural networking software.

Read more at http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci963348,00.html

Collapse -
AirDefense sniffs out Bank of America Bluetooth-based ID system
by Donna Buenaventura / May 12, 2004 3:14 PM PDT
In reply to: News - May 12, 2004

The bank says the system is designed to reduce ID theft

Bank of America Corp. has started testing a Bluetooth-based, biometric customer identification system that uses the short-range wireless technology to transmit and release account information to a teller.
Jay Chaudhary, chairman of AirDefense Inc., an Alpharetta, Ga.-based wireless security company, said he accidentally discovered the Bank of America Bluetooth-based ID system while waiting in line at a local bank branch last week. When he booted up his company's Bluewatch detection and sniffing tool, it detected transmissions related to the Touch ID system being tested by Charlotte, N.C.-based Bank of America.


Collapse -
Mac under fake Word 2004 attack
by Donna Buenaventura / May 12, 2004 3:17 PM PDT
In reply to: News - May 12, 2004

Macworld UK has learned of a dangerous malware that deletes the Home folder on a Mac. The file is cunningly disguised as a Word 2004 for Mac demo – from the forthcoming Office 2004 for Mac suite.

A Macworld reader alerted the magazine to the malware after he downloaded the file from Limewire. The reader told Macworld: "I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta. The file unzipped, and to my delight the Microsoft icon looked genuine and trustworthy."

However, he added: "I clicked on the installer file, and to my horror in 10 seconds the attachment had wiped my entire Home folder!"


Collapse -
Intego warns of second Trojan Horse; Apple, MS respond
by Donna Buenaventura / May 12, 2004 3:23 PM PDT
In reply to: News - May 12, 2004

For the second time in just over a month, Macintosh security company, Intego has issued an advisory warning customers of a Trojan Horse (AS.MW2004.Trojan) on Mac OS X. The latest advisory, posted to the company's Web site on Wednesday, warns of a Trojan Horse downloaded from the LimeWire peer-to-peer network -- the file had an icon that appeared to be an installer for Microsoft Office 2004. Microsoft warned users of downloading from sources other than them and analysts even question using the term "Trojan" for the advisory.

"This so-called Trojan horse demonstrates the dangers of file trading and downloading files from untrusted sources," Joe Wilcox, senior analyst for Jupiter Research, told MacCentral. "I say so-called because this file appears to be nothing more sophisticated than a simple AppleScript. Calling it a Trojan is a long stretch of the word's meaning."

British publication, Macworld UK, alerted Intego to the Trojan Horse earlier today after a reader reported downloading the file from LimeWire. When the reader double-clicked the file it apparently wiped out his entire Home Folder. Intego reports the Trojan Horse is a 108 KB self-contained AppleScript applet.

Yahooo has more http://story.news.yahoo.com/news?tmpl=story&cid=77&ncid=1211&e=4&u=/mc/20040512/tc_mc/integowarnsofsecondtrojanhorseapplemsrespond

Popular Forums
Computer Newbies 10,686 discussions
Computer Help 54,365 discussions
Laptops 21,181 discussions
Networking & Wireless 16,313 discussions
Phones 17,137 discussions
Security 31,287 discussions
TVs & Home Theaters 22,101 discussions
Windows 7 8,164 discussions
Windows 10 2,657 discussions


Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?