Monday, July 26, 2010

Indication that banks have known about this of years and never told their customers? Apparently they haven't fixed it either. Not the best way to inspire confidence...

http://yro.slashdot.org/story/10/07/25/1954216/Online-Banking-Trojan-Stole-Money-From-Belgians?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Online Banking Trojan Stole Money From Belgians

Posted by kdawson on Monday July 26, @04:37AM

"Belgian authorities uncovered an international network of online banking fraud (Google translation; Dutch original), which has been going on since 2007. The fraud targeted customers of several major banks, which used supposedly secure two-factor systems that require the customer to generate authorization codes from transaction information (random code and amount or recipient's account number) that is manually keyed into a cryptographic device (Flash demo from one of the banks; manufacturer's website). Trojan horses that were planted onto the victims' computers would generate a fake error message and request that the victim re-enter the authorization code. This way, amounts up to €4,000 were transferred to money mules and thence to Eastern Europe. The worrying part is that many cases were never reported to the police, because the bank preferred to refund the money to the victim rather than risking its reputation. The extent of this type of fraud is unknown."

The article mentions in passing that similar crimes are occurring in Germany and Sweden.



Perhaps now that Big Brother will have to share all those video cameras with Eurasia, and Eastasia the average citizen will wake up?

http://www.pogowasright.org/?p=12337

Britons to be spied on by foreign police

July 26, 2010 by Dissent

Tom Whitehead and Andrew Porter report:

Britons face being spied on and pursued by foreign police officers even for the most minor offences in an European agreement the Home Office will sign up to tomorrow.

The power allows prosecutors from any EU country to demand details such as DNA or even bank and phone records on anyone they suspect of a crime.

Officers in the UK would be almost powerless to refuse the request even if they believed it was disproportionate to the alleged offence being investigated.

They could also be told to carry out investigations and live surveillance for their EU counterparts, despite already stretched resources.

Read more in the Telegraph.



As I read it, this means that as long as I have the right to use the software (my license is current) I can bypass (or remove?) all those irritating technological protections.

http://yro.slashdot.org/story/10/07/25/1646256/Court-Rules-That-Bypassing-Dongle-Is-Not-a-DMCA-Violation?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Court Rules That Bypassing Dongle Is Not a DMCA Violation

Posted by kdawson on Sunday July 25, @03:53PM

tcrown007 sends along an appeals court ruling that, for once, limits the reach of the Digital Millennium Copyright Act's anti-circumvention clause.

"MGE UPS makes UPS systems and software that are protected by hardware dongles. After the dongles expired, GE bypassed the dongles and continued to use the software. MGE sued, won, and has now lost on GE's appeal. Directly from the court's ruling (PDF): "Merely bypassing a technological protection that restricts a user from viewing or using a work is insufficient to trigger the DMCA's anti-circumvention provision... The owner's technological measure must protect the copyrighted material against an infringement of a right that the Copyright Act protects, not from mere use or viewing.' Say what? I think I just saw a pig fly by."



Five articles on risk. Two I think are generally useful.

http://www.deloitte.com/view/en_US/us/Insights/hot-topics/your-turn-risk/index.htm?id=USRSS&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+DeloitteUs+%28Deloitte+LLP+Top+Stories%29

Your Turn: Risk

Most business leaders today understand what risk management is and why it’s important — but they’re still wrestling with questions about how to make it work in real life. What does your organization need to do to manage risk effectively? Who should be responsible for what? What tools and technologies do they need?

Asking the right questions and finding effective answers are at the heart of becoming what we call a Risk Intelligent EnterpriseTM. Explore our latest resources to get started.

Creating a Risk Intelligent Infrastructure

Explore our most current thinking on building effective risk management practices into the fabric of your organization.

E-Discovery: Mitigating Risk Through Better Communication

A survey of legal, risk, compliance and information technology (IT) functions identified three interrelated challenges.



Have the Chinese found another 'opiate of the people?”

http://politics.slashdot.org/story/10/07/25/1454255/Porn-Sites-Still-Exposed-In-China?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Porn Sites Still Exposed In China

Posted by Soulskill on Sunday July 25, @12:07PM

"Could it be that internet censorship in China has a pecking order? Politics and human rights are bad — but porn is okay? The porn sites that suddenly popped up in China two months ago are still accessible, leaving people wondering if it's a change in policy, a glitch, or maybe a test by the Chinese Internet police. The Chinese government isn't saying, but one Internet analyst speculates, 'Maybe they are thinking that if Internet users have some porn to look at, then they won't pay so much attention to political matters.'"



With my handwriting, this is also a one-way encryption tool!

http://www.makeuseof.com/dir/pilothandwriting-type-in-your-own-handwriting

PilotHandWriting: Type In Your Own Handwriting & Email

Here’s how it works – you sign up with them, start with the process and print out a template which is nothing but a sheet containing 26 squared blocks for all the alphabets. Now you type in the letters on those blocks using a pen, switch on the webcam through the site’s interface and then hold the paper right in front of it, so that the tool can capture the letters.

Once it’s done, you get an opportunity to edit the letters and make them more beautiful. Finally, you can type in a letter in the same interface using your keyboard. This time, the fonts would be what you always wanted – handwritten. Finally, send the email with the click of a button. Neat, isn’t it?

www.pilothandwriting.com/en

Similar tools: YourFonts, FontStruct as well as our recent article, Two Free Tools To Make Your Very Own Fonts.

No comments: