Pat, the Editor

27 Years of the Digest ... founded August 21, 1981

Classified Ads
TD Extra News

Add this Digest to your personal   or  

 
 
Message Digest 
Volume 28 : Issue 233 : "text" Format

Messages in this Issue:
  How Hackers Snatch Real-Time Security ID Numbers
  A Lawsuit Tries to Get at Hackers Through the Banks They Attack
  AT&T's Response regarding Google Voice for iPhone Application
  Google's Response regarding Google Voice for iPhone Application


====== 27 years of TELECOM Digest -- Founded August 21, 1981 ====== Telecom and VOIP (Voice over Internet Protocol) Digest for the Internet. All contents here are copyrighted by Patrick Townson and the individual writers/correspondents. Articles may be used in other journals or newsgroups, provided the writer's name and the Digest are included in the fair use quote. By using -any name or email address- included herein for -any- reason other than responding to an article herein, you agree to pay a hundred dollars to the recipients of the email. =========================== Addresses herein are not to be added to any mailing list, nor to be sold or given away without explicit written consent. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome. We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. Geoffrey Welsh =========================== See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest. ---------------------------------------------------------------------- Date: Sun, 23 Aug 2009 11:29:12 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: How Hackers Snatch Real-Time Security ID Numbers Message-ID: <p062408ebc6b70ff69ce3@[10.0.1.3]> How Hackers Snatch Real-Time Security ID Numbers By Saul Hansell August 20, 2009, 1:20 pm The world's savviest hackers are on to the "real-time Web" and using it to devilish effect. The real-time Web is the fire hose of information coming from services like Twitter. The latest generation of Trojans - nasty little programs that hacking gangs use to burrow onto your computer - sends a Twitter-like stream of updates about everything you do back to their controllers, many of whom, researchers say, are in Eastern Europe. Trojans used to just accumulate secret diaries of your Web surfing and periodically sent the results on to the hacker. The security world first spotted these new attacks last year. I ran into it again while reporting an article in Thursday's Times about a lawsuit meant to help track down the perpetrators of these attacks. By going real time, hackers now can get around some of the roadblocks that companies have put in their way. Most significantly, they are now undeterred by systems that create temporary passwords, such as RSA's SecurID system, which involves a small gadget that displays a six-digit number that changes every minute based on a complex formula. If you computer is infected, the Trojan zaps your temporary password back to the waiting hacker who immediately uses it to log onto your account. Sometimes, the hacker logs on from his own computer, probably using tricks to hide its location. Other times, the Trojan allows the hacker to control your computer, opening a browser session that you can't see. ... http://bits.blogs.nytimes.com/2009/08/20/how-hackers-snatch-real-time-security-id-numbers/ ------------------------------ Date: Sun, 23 Aug 2009 11:29:12 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: A Lawsuit Tries to Get at Hackers Through the Banks They Attack Message-ID: <p062408ecc6b7104cb14c@[10.0.1.3]> A Lawsuit Tries to Get at Hackers Through the Banks They Attack By SAUL HANSELL The New York Times August 20, 2009 A lawsuit filed on Wednesday against some of the most shadowy Internet criminals - gangs based in Eastern Europe that electronically break into business computers, steal banking passwords and transfer themselves money - is being used to pry information from a group that is nearly as reclusive as the hackers: banks whose computers have been compromised. The suit by Unspam Technologies, which organizes volunteers to track down information about spammers and other online rogues, was filed in United States District Court for the Eastern District of Virginia. The lawyer for Unspam, Jon L. Praed, concedes he is unlikely ever to discover the names of the hackers. But he hopes to get the details of the thefts, the names of victims and other information from the banks that can be used to improve security and possibly identify the hackers. Mr. Praed, the head of the Internet Law Group, which is based in Arlington, Va., has used the technique successfully on behalf of AOL and Verizon to identify people sending spam to their customers. The same legal method was used by the recording industry to force Internet providers to name customers who were exchanging copyrighted songs. More recently, Mr. Praed has used these "John Doe suits" - so called because the unnamed defendant is identified only as John Doe - to get information from third parties that can then be passed to law enforcement officials and online security experts and used as the basis for other civil suits. In 2007, Mr. Praed filed a suit on behalf of Unspam that was aimed at gathering information on illegal Internet pharmacies and the companies that support them. He declined to discuss any actions taken as a result. The suit filed Wednesday invokes the federal Can-Spam Act because some of the malicious programs that infect corporate computers are sent in the form of attachments to e-mail messages. It is more common these days for computers to become infected when users visit Web sites that have been secretly taken over by hackers and unknowingly download computer code that then controls their computers. ... http://www.nytimes.com/2009/08/20/technology/20hacker.html http://graphics8.nytimes.com/packages/pdf/technology/onlinebanking.pdf ------------------------------ Date: Sun, 23 Aug 2009 11:46:49 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: AT&T's Response regarding Google Voice for iPhone Application Message-ID: <p062408edc6b712e24c59@[10.0.1.3]> http://wireless.fcc.gov/releases/8212009_ATT_Response_FCC_iPhone_Letter.pdf http://graphics8.nytimes.com/packages/pdf/technology/20090821_ATT_Response.pdf ------------------------------ Date: Sun, 23 Aug 2009 11:46:49 -0400 From: Monty Solomon <monty@roscom.com> To: redacted@invalid.telecom.csail.mit.edu Subject: Google's Response regarding Google Voice for iPhone Application Message-ID: <p062408eec6b714089121@[10.0.1.3]> http://wireless.fcc.gov/releases/8212009_google_filing_iPhone_Inquiry_PUBLIC_REDACTED.pdf http://wireless.fcc.gov/releases/8212009_Google_Filing_iPhone_Inquiry_CONFIDENTIALITY.pdf http://graphics8.nytimes.com/packages/pdf/technology/20090821_Google_Filing.pdf ------------------------------ TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Patrick Townson. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is currently being moderated by Bill Horne while Pat Townson recovers from a stroke. Contact information: Bill Horne Telecom Digest 43 Deerfield Road Sharon MA 02067-2301 781-784-7287 bill at horne dot net Subscribe: telecom-request@telecom-digest.org?body=subscribe telecom Unsubscribe: telecom-request@telecom-digest.org?body=unsubscribe telecom This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2009 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA. ************************ --------------------------------------------------------------- Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization. End of The Telecom digest (4 messages) ******************************

Return to Archives**Older Issues