Wednesday, October 24, 2007
· The Associated Press reports that a dump used for toxic waste, which was shut down in 1979, might be the cause of cancer and other serious diseases that residents living near the plant have developed over the years. Health officials are now investigating if these suspicions are accurate. (See item 4)
· Newsday reports that methicillin-resistant Staphylococcus aureus (MRSA) infections could develop into a major health crisis, according to doctors. They say that the organism has caused infections in hospitals for years, but now that it has spread to communities, infecting people in gyms, schools and day care centers, it might lead to a major crisis. The doctors also expressed concern because of the lack of new antibiotics to treat this specific strain. (See item 24)
27. October 23, IDG News Service – (National) ID thieves have a 50-50 chance of going to prison. If you are a convicted identity thief, you have about a 50 percent chance of avoiding jail. That is one of the findings of a new study of closed U.S. Secret Service case files, released Monday by Utica College's Center for Identity Management and Information Protection. This is the first time researchers have been allowed to sift through the Secret Service’s data. The study's authors based their findings on an analysis of 500 closed Secret Service cases. “Prosecutors had a slightly better chance of sending a convicted identity thief to prison than not (51 percent) and could expect to see the imprisoned offender sentenced to three years or less of incarceration,” the report said. The college has been working with a number of partners, including the Secret Service, IBM, and the Federal Bureau of Investigation, since the Center's creation in mid-2006 to study the methods used by ID thieves and to help corporations and law enforcement prevent this type of crime. Technology like printers, mobile phones, and computers were used in about half of the cases, but the Internet was the exclusive tool of ID thieves only about 10 percent of the time. The median loss from identity theft was just over $31,000, but in one case, investigated by the Secret Service's Dallas field office, the defendant spent millions on luxury vehicles and then managed to set up shell companies and defraud investors. Losses totaled $13 million. “In general,” however, “the more offenders involved in the case, the higher the victim loss,” the study stated. According to Javelin Strategy & Research, identity theft cost U.S. businesses and consumers an estimated $49.3 billion in 2006.
28. October 23, The Associated Press – (International) British, Dutch police close pirate site. British and Dutch police shut down what they say is one the world’s biggest online sources of pirated music Tuesday and arrested the Web site’s 24-year-old suspected operator. The invitation-only OiNK Web site specialized in distributing albums leaked before their official release by record companies, the International Federation of the Phonographic Industry said. Many among OiNK’s estimated 180,000 members paid donations “to upload or download albums, often weeks before their release, and within hours albums would be distributed through public forums and blogs across the Internet.” Users were invited to the site if they could prove they had music to share, the IFPI said. The IFPI said more than 60 major albums were leaked on OiNK so far this year, making it the primary source worldwide for illegal prerelease music. Prerelease piracy is considered particularly damaging to music sales as it leads to early mixes and unfinished versions of artists’ recordings circulating on the Internet months before the release. Police in Cleveland, in northeast England, said they were tracing the money generated through the Web site, expected to amount to hundreds of thousands of dollars. The arrest of a 24-year-old IT worker at a house in Middlesbrough, northeast England, followed a two-year investigation by Dutch and British police and raids coordinated by Interpol. Cleveland police said the man, whose name was not released, was arrested on suspicion of conspiracy to defraud and infringement of copyright law. OiNK’s servers, in Amsterdam, were shut down by Dutch police, the IFPI said.
29. October 22, Computerworld – (
30. October 22, Computerworld – (National) Adobe patches critical PDF vulnerability. Adobe Systems Inc. patched its Reader and Acrobat programs Monday to fix a flaw that exposed most Windows XP users to exploits arriving in malicious PDF files. The patches are included in updates to Reader, the for-free PDF rendering utility, and Acrobat, Adobe’s full-featured application; both have been tagged as Version 8.1.1. “Critical vulnerabilities have been identified in Adobe Reader and Acrobat that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system,” Adobe warned in the bulletin that detailed the patch availability. “A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities.” Only users of Microsoft Corp.’s Windows XP who have Internet Explorer 7 installed are at risk of such attacks, Adobe added. The patches come a little more than two weeks after Adobe acknowledged the bug and posted a complicated work-around that required users to edit the Windows registry.
31. October 23, The Associated Press – (International) Report:
31. October 23, The Associated Press – (International) Report:
32. October 22, Newsfactor.com – (National) Comcast impersonates users to control P2P traffic. Comcast interferes with peer-to-peer traffic on its cable network by masquerading as users and resetting connections, The Associated Press reported on Friday. Apparently in an effort to maintain quality of service, Comcast cut off uploads of files to BitTorrent and other P2P networks. While observers agree that an Internet service provider needs to be able manage its traffic, the way Comcast is going about this -- by impersonating customers -- is troubling to many. “Comcast is in an interesting position because the amount of outbound and inbound traffic is constrained in their network,” said the CEO of Sonic.net, a