home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
cud
/
cud525g.txt
< prev
next >
Wrap
Text File
|
1995-01-03
|
4KB
|
108 lines
Date: 28 Mar 93 15:37:16 EST
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 7--CU in the news
Virus Advert Censored
=====================
The British Advertising Standards Authority has asked Total Control
Ltd (U.K.) to stop running a particular ad for the VIS Anti Virus
Utilities package. The ad appeared in a March 1992 edition of PC
Week. ((Moderators' note: yes, 1992)
The ad features two diskettes lying on pillows next to each other
in bed. The headline read ''Before you put it in...make sure you
know where it's been!''. The Authority found this to be offensive.
(Infosecurity News. March/April 1993. Page 8)
Tiger Team Penetrate IRS Computers
===================================
A so-called ''Tiger Team'' of internal security agents has
successfully
penetrated two IRS computers, and were active in the system for
seven
days without being detected, according to a Knight-Ridder report.
Agents posed as IRS employees ((not too difficult, considering they
were! just kidding. - Moderators')) and entered facilities at
Memphis,
Tenn. and Ogden, Utah locations. Once inside they installed
programs
to steal passwords by capturing keystrokes. Later they used the
stolen passwords to infiltrate the systems.
(Infosecurity News. March/April 1993. Page 8)
Computer Sabotage By Employees
==============================
The March 8, 1993 issue of Information Week has a lengthy excerpt
from
_Sabotage In The American Workplace_. (Pressure Drop Press, San
Francisco) Although the book has anecdotes from all types of
workers,
the Information Week extracts focus on those involving the use of
computers.
The following five stories are featured:
- A programmer who planted a logic bomb.
- A technician who undermined sales efforts.
- A technical writer who works on outside projects during
throughout the day.
- A system designer who resolves problems by erasing data.
- A stockbroker who generates random buy/sell transactions
to see how the market will react.
For more information see "Sabotage: They're Mad, They're Bad, They
Just Don't Care. Workers Tell How They Use Computers to Strike
Back". Pages 34-48
Price Waterhouse's Hackers For Hire
===================================
The Big Six accounting firm of Price Waterhouse is offering clients
a "Security Penetration Study" in which former hackers and computer
security experts will assess a systems security by attempting to
break into it. Other services, such as employee awareness
programs,
are also offered.
(Information Week. March 15, 1993. Page 8)
PC's and Households
===================
A Software Publishers Association (SPA) survey of 672 US households
found that college graduates were twice as likely to have personal
computers as non-graduates. Of the homes that had PC's, 56%
boasted
a household income in excess of $50,000. The survey also found
that
75% of home computers are MS-DOS based, with more than half of
those
being 386 or 486 machines. Respondents also admitted that 40% of
their entertainment software had been copied from friends, work, or
school.
{Moderators' Note: We'd speculate that much more than 40% of
business
software used at home is copied from others.}
(Information Week. March 15, 1993. Page 66)
AT&T Collects from Jiffy Lube
=============================
A US District Judge in Maryland has ruled that the automobile
service
company Jiffy Lube is responsible for fifty thousand dollars in
unauthorized phone calls placed on its 800-number. Jiffy Lube had
argued that it shouldn't be held liable for calls it did not
authorize
nor place, but the judge found that AT&T's tarrifs specify that
customers are responsible for all calls.
(Information Week. March 22, 1993. Page ??)
Piracy Down, Jobs Still Lost
============================
Windows Magazine (March 1993, pg 32) reports that although the SPA
says business software piracy fell by 41% in 1992, it still
represents
a $1.2 Billion loss to the industry. That money is great than the
cumulative revenue of 81 of the top 100 independent software
developers.
The SPA also estimates that stolen software cost 60,000 jobs in the
industry.
Downloaded From P-80 International Information Systems 304-744-2253