Articles and Resources
Date Fairness.com Resource Read it at: Jan 25, 2012 Build Up Your Phone’s Defenses Against Hackers
QUOTE: Technology experts expect breached, infiltrated or otherwise compromised cellphones to be the scourge of 2012. The smartphone security company Lookout Inc. estimates that more than a million phones worldwide have already been affected.
New York Times Nov 30, 2011 Is your phone telling the carrier everything you do?
QUOTE: the XDA-Developer site noticed that a preinstalled mobile app, named CarrierIQ, was logging all smartphone activities with no way to opt out....Although consumers are buying smartphones — and assume they have ownership — are the handsets theirs to do with as they please, without the carriers or handset makers know what they’re doing?
GigaOM May 31, 2011 Pentagon to Consider Cyberattacks Acts of War
QUOTE: The Pentagon, trying to create a formal strategy to deter cyberattacks on the United States, plans to issue a new strategy soon declaring that a computer attack from a foreign nation can be considered an act of war that may result in a military response.
New York Times Feb 16, 2011 New Hacking Tools Pose Bigger Threats to Wi-Fi Users
QUOTE: But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online... But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.
New York Times Jan 15, 2011 Israel Tests on Worm Called Crucial in Iran Nuclear Delay
QUOTE: [experts say that Israel at its Dimona facility] tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms.... Mr. Langner is among the experts who expressed fear that the attack had legitimized a new form of industrial warfare, one to which the United States is also highly vulnerable.
New York Times Jan 06, 2011 Hackers find new way to cheat on Wall Street -- to everyone's peril
QUOTE: 'Side-channel' attack on high-frequency trading networks could net a hacker millions of dollars in just seconds -- and leave everyone else that much poorer
InfoWorld Jan 06, 2011 Software security: Honesty is the best policy
QUOTE: Admitting to flaws in your code can be embarrassing, but OpenBSD's hunt for a backdoor proves the alternative could be much worse
InfoWorld Jul 28, 2009 How To Hijack 'Every iPhone In The World (Security)
QUOTE: Using a flaw they've found in the iPhone's handling of text messages, the researchers [Charlie Miller and Collin Mulliner] say they'll demonstrate how to send a series of mostly invisible SMS bursts that can give a hacker complete power over any of the smart phone's functions.
Forbes Jul 23, 2009 Click Fraud's New Asian Connection: Vietnam may be a new waypoint for pay-per-click scammers.
QUOTE: A report Anchor published Thursday shows that nearly half of all the advertising clicks coming from Vietnam are composed of fraudulent traffic aimed at inflating online publishers' advertising revenue...
Forbes Jul 23, 2009 UAE cellular carrier rolls out spyware as a 3G "update"
QUOTE: ...Blackberry users in the United Arab Emirates have had a spyware package placed on their devices through the actions of their carrier...
Ars Technica Nov 24, 2008 Schools, fools, and the tools of ignorance: If not for help from a handful of geeks, Connecticut school teacher Julie Amero would be in prison right now for crimes she didn't commit. What's wrong with
QUOTE: Amero's "crime": In October 2004, the substitute teacher from Norwich, Conn., was surfing the Net on a computer inside a middle school classroom when porn ads began popping up all over the screen. She didn't turn the computer off, because school officials expressly told her not to....Amero isn't totally exonerated. She agreed to plead guilty to "disorderly conduct" (a misdemeanor), pay $100, and have her teaching credentials revoked. The state still refuses to acknowledge it was mistaken.
InfoWorld Oct 31, 2008 Virtual Heist Nets 500,000+ Bank, Credit Accounts
QUOTE: A single cyber crime group has stolen more than a half million bank, credit and debit card accounts over the past two-and-a-half years using one of the most advanced strains of computer spyware in existence
Washington Post Sep 11, 2008 New tool creates fake YouTube pages for spreading malware
QUOTE: Panda Security said it has uncovered a tool circulating in underground hacking forums, dubbed YTFakeCreator, that enables anyone to easily create a fake YouTube page that surreptitiously installs a Trojan, virus, or adware on a visitor's computer, said Ryan Sherstobitoff, chief corporate evangelist of Panda Security.
CNET Jul 17, 2008 Protect yourself from software-vendor 'snarketing'
QUOTE: These days, even the software we like often comes with hidden annoyances designed to help the vendor at the expense of us poor customers. Here are five examples of sneaky marketing — snarketing, as I call it — and what you can do to mitigate the practice's ill effects.
WindowsSecrets.com Mar 25, 2008 Apple's Safari browser likened to malware: Mozilla CEO calls Apple's Software Update on Windows 'wrong'
QUOTE: "The problem here is that it lists Safari for getting an update - and has the 'Install' box checked by default - even if you haven't ever installed Safari on your PC," Lilly wrote.
InfoWorld Feb 14, 2008 Cyberthieves go phishing to rob banks
QUOTE: One sneaky thing some malware (malicious threats) does is to modify a user's server information. For example, a user types www.bankofamerica.com into his or her browser. But instead of the computer using the service provider's server, which would take the user to the real Bank of America server, the computer uses a bogus server run by phishers -- and that takes the user to a fake Bank of America server.
CNN (Cable News Network) Dec 05, 2007 Maintaining privacy is getting harder for Web surfers: Privacy alert: Cookie variants can be used to skirt blockers, anti-spyware tools
QUOTE: Just because your Web browser is set to block third-party tracking cookies, that doesn't mean all of them are being blocked. A growing number of Web sites are quietly resorting to the use of "first-party," subdomain cookies to skirt anti-spyware tools and cookie-blockers and allow third-party information-gathering and ad-serving
Computerworld Sep 12, 2007 Official: 'Massive' Damage to China From Hacking: Charge Seen as Response to Reports of Chinese Hacking in Western Countries
QUOTE: Striking a different tone, Lou said China should also consider computer-borne information in a larger sense as a threat to its security. He said the United States and other Western countries use advanced technology "to create an information hegemony" and relay unfavorable news from China, raising the risk of social instability.
Washington Post Aug 09, 2007 Google, Live, Yahoo run dubious scanner ads
QUOTE: For years, a Web site known as Spyware Warrior has been at the forefront of exposing fraudulent and misleading antispyware products. Its page of so-called Rogue/Suspect Anti-Spyware Products names scores of products that exhibit suspicious behaviors....Google, Yahoo, and Live.com all have policies that prohibit ads for deceptive products. Yet these search engines accept advertising for products found by Spyware Warrior to be "rogue" software....It's time for Google, Live, and Yahoo to look at their advertisers and take immediate action against deceptive products instead of accepting tainted ad dollars.
WindowsSecrets.com Jun 14, 2007 Soft-Court Porn
QUOTE: [A police detective testified that the] computer’s history file showed she intentionally accessed the website....An independent analysis of the computer’s hard drive, conducted this spring by Sunbelt Software and presented to the court for consideration, revealed that the hard drive was riddled with spyware and other programs known to cause pornographic pop-ups.
Hartford Courant (Connecticut) Feb 22, 2007 Phone threats will soon strike
QUOTE: There are two methods that scammers use to do their dirty business over phone or mobile lines -- smart phones, such as mobile, and the more PC-like phones and regular land lines.
Bankrate.com Jan 25, 2007 Substitute Teacher Faces Jail Time Over Spyware
QUOTE: A 40-year-old former substitute teacher from Connecticut is facing prison time following her conviction for endangering students by exposing them to pornographic material displayed on a classroom computer....The defense claimed the graphic images were pop-up ads generated by spyware already present on the computer prior to the teacher's arrival.
Washington Post Oct 12, 2006 MS OneCare halts flow of antivirus info
QUOTE: When Microsoft announced it was entering the antivirus biz, the usual nattering nabobs of negativism moaned and groaned about unfair competition and unlevel playing fields. But several recent events seem to confirm the worst: Microsoft may well be using its desktop monopoly to trump its AV competitors.
WindowsSecrets.com Sep 21, 2006 HP CEO Allowed 'Sting' of Reporter: HP CEO Allowed 'Sting' of Reporter
QUOTE: Hewlett-Packard Co. chief executive Mark V. Hurd approved an elaborate "sting" operation on a reporter in February in an attempt to plug leaks to the media, according to an e-mail message sent by HP Chairman Patricia C. Dunn.
Washington Post Aug 28, 2006 AOL 9.0 Slapped with 'Badware' Label
QUOTE: The high-powered StopBadware.org coalition...funded by Google, Lenovo Group and Sun Microsystems, accused AOL of installing additional software without telling the user; adding components to the browser and taskbar without disclosure; automatically updating software without user consent; and making the AOL 9.0 software difficult to fully uninstall.
eWeek Aug 10, 2006 U.S. Warns PC Users of Flaw in Windows
QUOTE: The Department of Homeland Security issued an unusual security alert...warning users of Windows-based personal computers to patch a flaw in the Microsoft operating system.
New York Times Aug 03, 2006 Cybercrooks constantly find new ways into PCs
QUOTE: While software vendors agree that security holes, once discovered, ought to be patched quickly, they've yet to adopt a common minimum standard for notifying customers and issuing a security patch
USA TODAY Aug 02, 2006 Fake Web sites: Don't buy into the lie
QUOTE: Your e-mail inbox probably overflows with eager offers to part you and your money. Many are from scammers looking to score information so they can dip their greedy fingers into your bank accounts.
Bankrate.com Apr 23, 2006 Malicious-software spreaders get sneakier, more prevalent
QUOTE: ...Cybercrime undergirded by networks of bots — PCs infected with malicious software that allows them to be controlled by an attacker — is soaring.
USA TODAY Nov 18, 2004 How to Fend off Phishing
QUOTE: The best way to avoid becoming a phishing victim is to remember that real companies almost never send e-mail asking you to submit personal data.
Washington Post Jan 07, 2002 Spyware, Part 3: is Using It Illegal…or Just Sleazy?
QUOTE: "Will I go to jail if I put a keystroke logger on someone else's computer?"... The answer to the legal question depends on who you eavesdrop on.
ZDnet Jan 04, 2002 Keep Yourself Top Secret! How to Defeat Spyware (Part 2)
QUOTE: BUT TAKE HEART. You are not defenseless in the fight against keystroke loggers.
ZDnet Jan 03, 2002 How They Know What You're Doing On Your PC (Part 1)
QUOTE: Keystroke loggers have their place--if not in espionage, certainly in law enforcement. Knowing about their use, and abuse, is just part of being a savvy computer user or system administrator. Then again, you just might be someone who's concerned that a boss is electronically looking over your shoulder.
ZDnet Nov 10, 2001 The Freedom to Innovate Includes The Freedom to Obfuscate: Why Microsoft's New "Security Framework" is Just Another .Net Vulnerability
QUOTE: In other words, Microsoft is saying "Please don't publish anything about security flaws you find in our products. All this does is spread viruses, and makes us and our products look flawed, exploitable, and bad." Or, as George Orwell once wrote, "your" ignorance is "our" strength."
Infowarrior.org Jul 31, 2001 How Far Can FBI Spying Go?
QUOTE: ...the FBI became so frustrated by Scarfo's use of Pretty Good Privacy software (PGP) to encode confidential business data that they had to resort to extraordinary means.
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!