|
News for
101000
contributed by weld pond
Using the FTP port as a point of entry, someone using the handle Exiled
Dave, defaced the Orange County Register's website late last month. The
intruder altered three different articles on the newspaper's website that
covered Jason Diekman's arrest for allegedly breaking into NASA's computer
system. This appears to be the first reported "subversion of
information attack." The potential for the proliferation of this type of
attack puts the online news provider industry on alert.
Inside.com
|
contributed by pyle
Hillary Clinton and Rick Lazio agreed to disagree with Federal Bill 602P
during a Senate debate over the weekend. The Federal Bill 602P, states
email senders will be charged 5 cents per sent email. Ironically, the bill
doesn't even exist. Never has and hopefully never will. Imagine that - all
that angry debating over an urban legend. However embarrassing it may have
proved to be for the candidates, it could have been far worse on their
reputations had they supported the bill.
Wired
USA
Today
Transcript
of Debate from ClueBot.com
|
contributed by weld pond
The "Spyware Control and Privacy Protection Act" has been introduced by Sen.
John Edwards, D-N.C. to address the need for customer notification of the
presence of spyware. The bill demands a notice be sent to customers
detailing the existence of spyware in a software product at which time they
can choose whether or not they wish to enable it. One of the exceptions to
this rule would be for employers who wish to monitor the online activities
of their employees.
Newsbytes
|
contributed by laney
The "White House for Kids" page appears to directly violate the Children's
Online Privacy Protection Act (COPPA) according to Privacilla.org. Most
notably, the website fails to obtain "verifiable parental consent," which is
considered a paramount part of COPPA. The White House has said it is working
on fully complying with COPPA, an act they claim to strongly support.
Newbytes
Report from Privacilla.com
|
contributed by weld pond
To understand the current policies that CERT and others have for
vulnerability disclosures, we need to take a step back and understand the
history of security flaws and how we find out about them. Vendors didn't
always listen (some say they still don't). Exploits were only available
underground (some would like it to stay that way). Rik Farrow takes us back
to see the events that have shaped the way vulnerabilities are disclosed
today.
Network
Magazine
|
|
![](right-bar.jpg)
|