Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    Security Web Digest: Earthlink Takes Big Spam Rings To Court

    Written by

    eWEEK EDITORS
    Published August 28, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Privacy

      EarthLink Inc. this week said it filed suit against two spam e-mail rings with operations in the U.S. and Canada. The ISP is suing to recover an estimated $5 million in lost employee productivity and Internet bandwidth that it claims was spent managing more than 250 million e-mail messages sent from e-mail addresses on its network, according to Pete Wellborn, outside legal counsel for EarthLink. The suit targets two separate spam operations. The first, based in Birmingham, Ala., is believed to be behinda variety of spam campaigns, including pitches for “herbal Viagra,” pornography and online dating services. A second ring, in Vancouver,British Columbia, used about six different phone numbers to connect to EarthLink accounts as part of a massive “phisher” scheme to trick unsuspecting Internet users into passing on sensitive information such as account passwords and credit card numbers, Wellborn said. Phisher schemes use Web pages designed to look like legitimate Web sites such as Amazon.com or PayPal.com in complicated ruses to capture account information from customers.

      The Java Anonymous Proxy (JAP) service, a collaborative effort of Dresden University of Technology, Free University Berlin and the Independent Centre for Privacy Protection Schleswig-Holstein, Germany (ICPP),has been allowed to suspend its monitoring of users IP traffic pending adecision on the legality of back-dooring it. Collectively known as the AN.ON Project, the operators appealed a lower courts decision allowing the German Feds to obtain reports on users access to a particular IP address. In a previous article The Register criticized the way the JAP team handled its initial confrontation with the Feds — waiting quietly until a user discovered the back door before acknowledging the situation.

      Enterprise

      Network hardware maker Netgear Inc. has warned its customers of a flaw in some of its router products that has set off an accidental denial-of-service attack on the University of Wisconsin. The problem occurred because of a flawed implementation of the Network Time Protocol (NTP), which is a method commonly used by network devices to contact special time servers that pass on the correct time and date. In June, the University of Wisconsins NTP server was the victim of a huge denial-of-service attack. The university said that it was receiving 250,000 requests per second, which equated to hundreds of megabits per second. The attack was not planned or malicious but caused by hundreds of thousands of low-cost Netgear routers repeatedly requesting the latest time, which caused the universitys NTP server to fail.

      Several versions of the open-source mail transfer agent Sendmail are vulnerable to remote denial-of-service attacks, according to an alert issued by the FreeBSD Project. Sendmail versions 8.12.0 through 8.12.8 are susceptible to remote exploit of a vulnerability in the code that implements DNS (domain name system) maps. An attacker sending a malformed DNS reply packet could cause Sendmail to call “free()” on an uninitialized pointer. Such a call could cause a Sendmail child process to crash, FreeBSD said in an advisory. Administrators are urged to upgrade to Sendmail 8.12.9 or apply a patch available at Sendmail.org or from their distributors.

      Virus

      McAfee Wednesday reported the appearance of VBS/Flipe, a Trojan that when executed, will attempt to create the files c:windowsxp2.vbs and c:system.sys,which contain the following message inside: “Microsoft Windows XP 2 has released.” It will also attempt to format the c: and a: drives. All of the above behaviors of VBS/Flipe were not observed in a lab environment due to a bug in the code. More information is atthis McAfee page.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×