New Virginia Spam Law
A new anti-spam law, created to rectify the current anti-spam law, has been advanced by the Virginia House today. The new bill targets unsolicited commercial email that attempts to hide the source of its sender. This new bill was proposed to correct the current bill which the Virginia Supreme Court ruled in September 2008 to be overbroad and unconstitutional.
Posts tonen met het label news. Alle posts tonen
Posts tonen met het label news. Alle posts tonen
donderdag 28 mei 2009
woensdag 27 mei 2009
MIT Spam Conference
MIT Spam Conference
The Upcoming MIT Spam Conference is looking for people to submit original, unpublished papers on any aspect of spam and other types of electronic communications brand malware. Some of the topics of interest include:
• phishing, spyware
• spit (spam over internet telephony)
• spim (spam over instant messenger)
• SMS spam
• MMORPG spam
• blog spam
• trackback spam
• image spam
• stock pump-and-dumps
• email con games
• exploit marketing
• identity theft
• zombie bots and bot armies
• antispam systems
• hardware antispam countermeasures
• software antispam countermeasures
• wetware (a.k.a., liveware, meatware, i.e., user errors)
• blue-ware (i.e. employing the police).
The conference welcomes submissions from anyone doing work on spam, anti-spam, or any other related cyber crime. Registration for the conference is free for all interested parties.
Program Co-chairs Kathy J. Liszka Professor, Computer Science The University of Akron
William Yerazunis Senior Research Scientist Mitsubishi Electric Research Laboratories
The Upcoming MIT Spam Conference is looking for people to submit original, unpublished papers on any aspect of spam and other types of electronic communications brand malware. Some of the topics of interest include:
• phishing, spyware
• spit (spam over internet telephony)
• spim (spam over instant messenger)
• SMS spam
• MMORPG spam
• blog spam
• trackback spam
• image spam
• stock pump-and-dumps
• email con games
• exploit marketing
• identity theft
• zombie bots and bot armies
• antispam systems
• hardware antispam countermeasures
• software antispam countermeasures
• wetware (a.k.a., liveware, meatware, i.e., user errors)
• blue-ware (i.e. employing the police).
The conference welcomes submissions from anyone doing work on spam, anti-spam, or any other related cyber crime. Registration for the conference is free for all interested parties.
Program Co-chairs Kathy J. Liszka Professor, Computer Science The University of Akron
William Yerazunis Senior Research Scientist Mitsubishi Electric Research Laboratories
dinsdag 26 mei 2009
New Spam Treath
Getting Around Spam Laws
Companies are getting around anti-spam laws by calling consumers and hanging up after the first ring. The consumer then calls the number back in an effort to discover whose call they missed. Upon dialing the number, consumers are confronted with an answering service that promises them a free gift if they leave their details and phone number. This call is paid for by the consumers themselves. The spammers then call the consumer back, no longer violating anti-spam laws, because the consumer himself provided his details to the spammer. Many of the companies then promote their free gift, which of course can be shipped for an exorbitant fee costing more than the worth of the gift itself.
Companies are getting around anti-spam laws by calling consumers and hanging up after the first ring. The consumer then calls the number back in an effort to discover whose call they missed. Upon dialing the number, consumers are confronted with an answering service that promises them a free gift if they leave their details and phone number. This call is paid for by the consumers themselves. The spammers then call the consumer back, no longer violating anti-spam laws, because the consumer himself provided his details to the spammer. Many of the companies then promote their free gift, which of course can be shipped for an exorbitant fee costing more than the worth of the gift itself.
maandag 25 mei 2009
Iowa Courts Award Money To ISPs Over Spam
Iowa Courts Award Damages to ISPs Over Spam
Iowa courts awarded money for damages caused to Internet Service Providers (ISPs) harmed by spam activities. The court decision was reached based on the Iowa anti-spamming and anti-spoofing act which prohibits the sending of bulk electronic mail. ISPs claimed that the sending of this mail has caused damage to their business due to the time lost fighting spam and due to the customers lost because of uncontrollable spam.
Iowa courts awarded money for damages caused to Internet Service Providers (ISPs) harmed by spam activities. The court decision was reached based on the Iowa anti-spamming and anti-spoofing act which prohibits the sending of bulk electronic mail. ISPs claimed that the sending of this mail has caused damage to their business due to the time lost fighting spam and due to the customers lost because of uncontrollable spam.
zondag 24 mei 2009
New Threat May Be Unstoppable
New Threat May Be Unstoppable
According to Val Smith, founder of Attack Research, traditional computer security systems may be ineffective when dealing with web attacks launched by countries. Recent attacks have been seen on high-traffic sites and have targeted these sites with blog spam. The attacks have mostly originated in Russia and China. Clicking on links within these seemingly legitimate blogs takes users to other pages resembling blogs but which are really pages containing malware. This then causes these sites to become "malware depots," essentially ruining the sites. Because the attackers are legitimately posting blogs on these sites, traditional forms of security are unable to stop these disseminators of malware.
According to Val Smith, founder of Attack Research, traditional computer security systems may be ineffective when dealing with web attacks launched by countries. Recent attacks have been seen on high-traffic sites and have targeted these sites with blog spam. The attacks have mostly originated in Russia and China. Clicking on links within these seemingly legitimate blogs takes users to other pages resembling blogs but which are really pages containing malware. This then causes these sites to become "malware depots," essentially ruining the sites. Because the attackers are legitimately posting blogs on these sites, traditional forms of security are unable to stop these disseminators of malware.
zaterdag 23 mei 2009
Retailers Sending Unsolicited Mes
Retailers Sending Customers Unsolicited Promotional Messages
According to a study conducted by Return Path, 31% of e-retailers have added customers to their email lists without permission. However, Return Path argues that sending buyers these promotional emails without permission does not necessarily violate the federal CAN-SPAN Act, but rather sours a company's relationship with its customers. "When customers get e-mail that they have not requested, they perceive it to be spam, regardless of what the letter of the law says," the study reported.
According to a study conducted by Return Path, 31% of e-retailers have added customers to their email lists without permission. However, Return Path argues that sending buyers these promotional emails without permission does not necessarily violate the federal CAN-SPAN Act, but rather sours a company's relationship with its customers. "When customers get e-mail that they have not requested, they perceive it to be spam, regardless of what the letter of the law says," the study reported.
vrijdag 22 mei 2009
MobiFone Cuts Off Spammers
A leading mobile phone network, MobiFone, is canceling its contracts with any content providers who are found to be using the network to send spam messages. This decision comes after 3 years of unsuccessful attempts to prevent their subscribers from receiving spam messages. MobiFone has also said it will report to the Department of Information and Communications any evidence of spam delivery it finds.
donderdag 21 mei 2009
Utah Senate President Threatening Spam Suit
Utah Senate President Threatening Spam Suit
Utah's Senate President is threatening to sue disbarred lawyer Jack Thompson over the unsolicited sending of emails. Thompson, who made a name for himself as a lawyer blaming violent acts on violent video games, has spent his post-lawyer years attempting to convince states to pass anti-violent video game laws. Utah, the only state who considered passing the bill, eventually vetoed it but this has not stopped Thompson from emailing members of the Utah Senate in order to change their minds. Now the president of the Utah Senate is threatening to sue Thompson under the CAN-SPAM anti-spam law and wrote Thompson saying,"I asked you before to remove me from your mailing list. I supported your bill but because of the harassment will not again. If I am not removed I will turn you over to the AG for legal action."
Utah's Senate President is threatening to sue disbarred lawyer Jack Thompson over the unsolicited sending of emails. Thompson, who made a name for himself as a lawyer blaming violent acts on violent video games, has spent his post-lawyer years attempting to convince states to pass anti-violent video game laws. Utah, the only state who considered passing the bill, eventually vetoed it but this has not stopped Thompson from emailing members of the Utah Senate in order to change their minds. Now the president of the Utah Senate is threatening to sue Thompson under the CAN-SPAM anti-spam law and wrote Thompson saying,"I asked you before to remove me from your mailing list. I supported your bill but because of the harassment will not again. If I am not removed I will turn you over to the AG for legal action."
Filtering Systems Winning Against Spam
Email Filtering Systems Work Well Against Spam
Spam filters are working well at filtering your junk mail and blocking spam. Although up to 90% of all email traffic is spam, improved filtering technology has prevented the majority of these spam messages from reaching their destinations. Although the war against spam has not yet been won, many important battles have been successful due to advancements in spam protection, like filtering technology.
Spam filters are working well at filtering your junk mail and blocking spam. Although up to 90% of all email traffic is spam, improved filtering technology has prevented the majority of these spam messages from reaching their destinations. Although the war against spam has not yet been won, many important battles have been successful due to advancements in spam protection, like filtering technology.
woensdag 20 mei 2009
Electronic Privacy Bill In Works
Electronic Privacy Bill In The Works
Members of the House of Representatives have begun a series of hearings on electronic privacy and are working on a bill that would regulate the way in which companies collect data from their consumers. Lawmakers are at odds in their struggle to achieve a balance between protecting the consumer and, at the same time, allowing for web advertising which is the main revenue obtained by content sites. They are also investigating whether there should be one broad regulation or if each electronic industry should be monitored separately.
Members of the House of Representatives have begun a series of hearings on electronic privacy and are working on a bill that would regulate the way in which companies collect data from their consumers. Lawmakers are at odds in their struggle to achieve a balance between protecting the consumer and, at the same time, allowing for web advertising which is the main revenue obtained by content sites. They are also investigating whether there should be one broad regulation or if each electronic industry should be monitored separately.
dinsdag 19 mei 2009
California Anti-Spam Laws Easing
California Getting Soft On Spam - 05/10/2009
Traditionally, California has some of the strictest anti-spam laws in the USA. Anyone can sue for spam violations and can recover up to $1,000 per spam message received. However, recently two judges have issued rulings shooting down California's spam laws, instead favoring the national CAN-SPAM ACT. In the most recent case, a judge from LA dismissed a spam lawsuit against Value Click, who violated California's anti-spam law by sending as many as 45,000 emails with false or misleading headers and subject lines. The judge said the plaintiff did not manage to show that Value Click had sent more than 24 of those messages, not that this mattered because the case was also dismissed because it did not violate the CAN-SPAM act which prohibits "falsity or deception" in messages. The judge ruled that fraudulent messages are not just messages with misinformation but messages where people "relied on the message and lost money." Therefore, the judge ruled that the plaintiff had not been a victim of fraud.
maandag 18 mei 2009
Scammers Looking To Profit From Swine Flu
Scammers Looking To Profit From Swine Flu Virus
Scammers looking to profit from the swine flue virus are busily launching websites and email campaigns advertising illegal flu drugs in an effort to profit from the public's growing fear of this new flu epidemic. Victims are enticed to enter their credit card numbers into the sites in order to purchase these illegal flu drugs, and then the scammers take all they can from the credit cards. The US Computer Emergency Readiness Team has already issued a warning relating to these scams. Many of these scams will appear as spam mail (unsolicited email messages) and will contain links or attachments. Do not click on these links or attachments as you will be directed to a phishing website or expose your computer to malware.
http://www.capecodonline.com
Scammers looking to profit from the swine flue virus are busily launching websites and email campaigns advertising illegal flu drugs in an effort to profit from the public's growing fear of this new flu epidemic. Victims are enticed to enter their credit card numbers into the sites in order to purchase these illegal flu drugs, and then the scammers take all they can from the credit cards. The US Computer Emergency Readiness Team has already issued a warning relating to these scams. Many of these scams will appear as spam mail (unsolicited email messages) and will contain links or attachments. Do not click on these links or attachments as you will be directed to a phishing website or expose your computer to malware.
http://www.capecodonline.com
Abonneren op:
Posts (Atom)