|
Message Digest
Volume 28 : Issue 233 : "text" Format
Messages in this Issue:
How Hackers Snatch Real-Time Security ID Numbers
A Lawsuit Tries to Get at Hackers Through the Banks They Attack
AT&T's Response regarding Google Voice for iPhone Application
Google's Response regarding Google Voice for iPhone Application
====== 27 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.
===========================
Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent. Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime. Geoffrey Welsh
===========================
See the bottom of this issue for subscription and archive details
and the name of our lawyer, and other stuff of interest.
----------------------------------------------------------------------
Date: Sun, 23 Aug 2009 11:29:12 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: How Hackers Snatch Real-Time Security ID Numbers
Message-ID: <p062408ebc6b70ff69ce3@[10.0.1.3]>
How Hackers Snatch Real-Time Security ID Numbers
By Saul Hansell
August 20, 2009, 1:20 pm
The world's savviest hackers are on to the "real-time Web" and using
it to devilish effect. The real-time Web is the fire hose of
information coming from services like Twitter. The latest generation
of Trojans - nasty little programs that hacking gangs use to burrow
onto your computer - sends a Twitter-like stream of updates about
everything you do back to their controllers, many of whom,
researchers say, are in Eastern Europe. Trojans used to just
accumulate secret diaries of your Web surfing and periodically sent
the results on to the hacker.
The security world first spotted these new attacks last year. I ran
into it again while reporting an article in Thursday's Times about a
lawsuit meant to help track down the perpetrators of these attacks.
By going real time, hackers now can get around some of the roadblocks
that companies have put in their way. Most significantly, they are
now undeterred by systems that create temporary passwords, such as
RSA's SecurID system, which involves a small gadget that displays a
six-digit number that changes every minute based on a complex formula.
If you computer is infected, the Trojan zaps your temporary password
back to the waiting hacker who immediately uses it to log onto your
account. Sometimes, the hacker logs on from his own computer,
probably using tricks to hide its location. Other times, the Trojan
allows the hacker to control your computer, opening a browser session
that you can't see.
...
http://bits.blogs.nytimes.com/2009/08/20/how-hackers-snatch-real-time-security-id-numbers/
------------------------------
Date: Sun, 23 Aug 2009 11:29:12 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: A Lawsuit Tries to Get at Hackers Through the Banks They Attack
Message-ID: <p062408ecc6b7104cb14c@[10.0.1.3]>
A Lawsuit Tries to Get at Hackers Through the Banks They Attack
By SAUL HANSELL
The New York Times
August 20, 2009
A lawsuit filed on Wednesday against some of the most shadowy
Internet criminals - gangs based in Eastern Europe that
electronically break into business computers, steal banking passwords
and transfer themselves money - is being used to pry information from
a group that is nearly as reclusive as the hackers: banks whose
computers have been compromised.
The suit by Unspam Technologies, which organizes volunteers to track
down information about spammers and other online rogues, was filed in
United States District Court for the Eastern District of Virginia.
The lawyer for Unspam, Jon L. Praed, concedes he is unlikely ever to
discover the names of the hackers. But he hopes to get the details of
the thefts, the names of victims and other information from the banks
that can be used to improve security and possibly identify the
hackers.
Mr. Praed, the head of the Internet Law Group, which is based in
Arlington, Va., has used the technique successfully on behalf of AOL
and Verizon to identify people sending spam to their customers. The
same legal method was used by the recording industry to force
Internet providers to name customers who were exchanging copyrighted
songs.
More recently, Mr. Praed has used these "John Doe suits" - so called
because the unnamed defendant is identified only as John Doe - to get
information from third parties that can then be passed to law
enforcement officials and online security experts and used as the
basis for other civil suits.
In 2007, Mr. Praed filed a suit on behalf of Unspam that was aimed at
gathering information on illegal Internet pharmacies and the
companies that support them. He declined to discuss any actions taken
as a result.
The suit filed Wednesday invokes the federal Can-Spam Act because
some of the malicious programs that infect corporate computers are
sent in the form of attachments to e-mail messages. It is more common
these days for computers to become infected when users visit Web
sites that have been secretly taken over by hackers and unknowingly
download computer code that then controls their computers.
...
http://www.nytimes.com/2009/08/20/technology/20hacker.html
http://graphics8.nytimes.com/packages/pdf/technology/onlinebanking.pdf
------------------------------
Date: Sun, 23 Aug 2009 11:46:49 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: AT&T's Response regarding Google Voice for iPhone Application
Message-ID: <p062408edc6b712e24c59@[10.0.1.3]>
http://wireless.fcc.gov/releases/8212009_ATT_Response_FCC_iPhone_Letter.pdf
http://graphics8.nytimes.com/packages/pdf/technology/20090821_ATT_Response.pdf
------------------------------
Date: Sun, 23 Aug 2009 11:46:49 -0400
From: Monty Solomon <monty@roscom.com>
To: redacted@invalid.telecom.csail.mit.edu
Subject: Google's Response regarding Google Voice for iPhone Application
Message-ID: <p062408eec6b714089121@[10.0.1.3]>
http://wireless.fcc.gov/releases/8212009_google_filing_iPhone_Inquiry_PUBLIC_REDACTED.pdf
http://wireless.fcc.gov/releases/8212009_Google_Filing_iPhone_Inquiry_CONFIDENTIALITY.pdf
http://graphics8.nytimes.com/packages/pdf/technology/20090821_Google_Filing.pdf
------------------------------
TELECOM Digest is an electronic journal devoted mostly to telecom-
munications topics. It is circulated anywhere there is email, in
addition to Usenet, where it appears as the moderated newsgroup
'comp.dcom.telecom'.
TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.
The Telecom Digest is currently being moderated by Bill Horne while
Pat Townson recovers from a stroke.
Contact information: Bill Horne
Telecom Digest
43 Deerfield Road
Sharon MA 02067-2301
781-784-7287
bill at horne dot net
Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom
Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom
This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then. Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!
URL information: http://telecom-digest.org
Copyright (C) 2009 TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.
************************
---------------------------------------------------------------
Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list.
All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.
End of The Telecom digest (4 messages)
******************************
|