http://www.databreaches.net/?p=7952
McDonald’s Canada targeted by debit fraud
October 23, 2009 by admin Filed under Breach Incidents, Business Sector, ID Theft, Non-U.S., Skimmers
McDonald’s Canada is co-operating with Winnipeg police as they investigate allegations of debit card fraud targeting at least one of the fast-food chain’s local outlets and ranging as far as Quebec.
The news Thursday came one day after Winnipeg police said hundreds of people were victimized after debit card machines and PIN pads had been compromised by thieves at a few local restaurants.
Police would not comment on specific names or locations of the restaurants but said their investigation so far has revealed fewer than five establishments are involved.
Read more on CBC News.
Worth a read?
http://www.databreaches.net/?p=7938
Group looks at ID theft definitions, research
October 22, 2009 by admin Filed under Commentaries and Analyses
A new workshop report from the Identity Theft Prevention and Identity Management Standards Panel (IDSP) addresses various facets of how research companies measure identity theft. The report finds that disparities exist in the way that terms are defined in statute versus in practice—terms such as identity theft, identity fraud and data breach.
[...]
Rick Kam, president of ID Experts, led a team that cataloged 166 research studies on identity theft and data breach trends, identity theft protection services, and information security solutions. “Our group observed some contradictory results in research findings attributable to differences in terminology, research methodology, and even potential bias in research sponsorship,” said Kam. “We also noted a number of gaps in existing research such as the effects of identity theft versus identity fraud, breach correlation to identity theft, and the effectiveness of identity theft protection services and information security solutions.”
Read more on DigitalIDNews.
Related: IDSP Workshop Report: Measuring Identity Theft (download with free ANSI registration)
What happens on the net, stays on the net. (Perhaps it didn't come with an instruction manual?)
Dutch Gov't Has No Idea How To Delete Tapped Calls
Posted by timothy on Friday October 23, @04:41AM from the these-days-neither-do-the-swiss dept.
McDutchie writes
"The law in the Netherlands says that intercepted phone calls between attorneys and their clients must be destroyed. But the Dutch government has been keeping under wraps for years that no one has the foggiest clue how to delete them (Google translation). Now, an email (PDF) from the National Police Services Agency (KLPD) has surfaced, revealing that the working of the technology in question is a NetApp trade secret. The Dutch police are now trying to get their Israeli supplier Verint to tell them how to delete tapped calls and comply with the law. Meanwhile, attorneys in the Netherlands remain afraid to use their phones."
(Related) We don't know how voting machines work either.
http://www.wired.com/threatlevel/2009/10/audit-log/
California Investigating Problems With Voting-Machine Audit Logs
By Kim Zetter October 22, 2009 11:06 am
LOS ANGELES — California is conducting a months-long investigation into audit logs inside the state’s electronic voting systems after reports of serious flaws with the logs — including the ability for an election official or someone else to delete votes without leaving an electronic trail.
800 down, a googolplex left to shut down. Not clear from the articles how the victim notification will work.
http://yro.slashdot.org/story/09/10/23/009244/Nigerian-Scam-Police-Shut-Down-800-Web-Sites?from=rss
Nigerian "Scam Police" Shut Down 800 Web Sites
Posted by timothy on Thursday October 22, @10:22PM from the had-to-pay-shipping-on-them-first dept.
Sooner Boomer writes
"Nigerian police in what is named Operation 'Eagle Claw' have shut down 800 scam web sites, and arrested members of 18 syndicates behind the fraudulent scam sites. Reports on Breitbart.com and Pointblank give details on the busts. The investigation was done in cooperation with Microsoft, to help develop smart technology software capable of detecting fraudulent emails. From Breitbart 'When operating at full capacity, within the next six months, the scheme, dubbed "Eagle Claw," should be able to forewarn around a quarter of million potential victims.'"
For my Business Continuity class.
http://news.cnet.com/8301-13639_3-10381621-42.html?part=rss&subj=news&tag=2547-1_3-0-20
Congressional commission focuses on China's cyberwar capability
by Mark Rutherford October 22, 2009 5:03 PM PDT
In war and possibly in peace, China will wage cyberwar to control the information flow and dominate the battle space, according to a new report compiled for a congressional commission.
Chinese military strategists see information dominance as the key to overall success in future conflicts and will continue to expand the country's computer network exploitation capabilities, according to the report, titled "Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation."
… In a conflict, China will likely target the U.S. government and private industry with long-term, sophisticated computer network exploitation and intelligence collection campaigns, the report concludes. U.S. security agencies can expect to face disciplined, standardized operations; sophisticated techniques; high-end software; and a deep knowledge of the U.S. networks, according to the report (PDF).
In for a penny, in for a £ (Also installs Windows7)
http://news.cnet.com/8301-13579_3-10381419-37.html?part=rss&subj=news&tag=2547-1_3-0-20
Psystar releases Mac clone software
by Jim Dalrymple October 22, 2009 2:01 PM PDT
Psystar, the clone company Apple is suing for selling generic hardware with the Mac OS pre-installed, is expanding its business to include selling software that will allow anyone to install Apple's operating system.
Psystar said on Thursday that its Rebel EFI suite is available for download from its Web site. The software will allow anyone to install any modern operating system on their computer, including Apple's Mac OS X Snow Leopard.
… A demo version of the software is available for download so users can "test-drive" it before they buy. Psystar says the demo would allow users to install Mac OS X, but with "limited hardware functionality as compared with the full version."
Always looking. I signed up as a beta tester.
http://news.cnet.com/8301-19882_3-10381520-250.html?part=rss&subj=news&tag=2547-1_3-0-20
iCurrent: A news aggregator that works
by Rafe Needleman October 22, 2009 2:54 PM PDT
… iCurrent rewards the engaged reader, but it doesn't require much work at all to make it a compelling experience. As I said at the top of this story, there's nothing really amazing here, just a good understanding of how today's users consume news, and enough technology to put that news in front of them.
… The product is in private beta now and should be available shortly. You can sign up to be alerted when it goes public. I recommend that.
Rao says iCurrent will make money from advertising. It might. It's more likely it'll make money when Yahoo or Microsoft buys it.
Tools & Techniques for the Swiss Army folder
OpenWith.org
OpenWith.org provides detailed information about most file extension and links to free programs that can open and create each type of file.
I've mentioned Lulu before. Since I've posted at least 10,000 articles, I may publish “The Collected Wisdom of Centennial-Man”
http://www.makeuseof.com/tag/how-to-publish-your-own-book-in-print-cheaply/
How To Publish Your Own Book (In Print) Cheaply
Oct. 22nd, 2009 By Jack Cola
… The only downside with eBooks is that it is only available online in an electronic format. What happens if you want to publish it and have it in print? You are up for a lot of fees, printing, and publication costs. You need to get legal advice, find a publisher to publish your book and the list goes on.
Thankfully there is a solution where you can publish your own book, or sell it in a bookshop. The best thing is, you don’t even have to spend a cent. And here’s how.
Lulu.com allows you to sell your book in bookshops, online and allow buyers to purchase printed copies in a simple 5-step process. If you have created eBooks before, this is a service that you must use. You easily and cheaply get your book published in a printed format with its own ISBN number.
I think my website students will like this one. Collects the images from listed sites.
Spectives
follow sites visually
No comments:
Post a Comment