writes: Since the mid nineties I've used a unique email address for everyone I do business with and for every service or site I sign up with, so that if someone leaks my email address to spammers I know who did the leaking. Until this year I'd only had a few of these addresses compromised (including a national flower seller and a major music gear maker). This year I'm getting about one every other month, including a telecommunications giant and one of the three credit reporting agencies. There are no mailboxes or accounts associated with these email addresses; I receive all email to the domain. These addresses exist only as text I typed into a web form, and as header fields in received email. I'd consider a man-in-the-middle or someone gaining access to my mailbox as possible culprits except I haven't had communication with that credit agency in years, and I just yesterday started receiving spam to that address. That, and only a few of these addresses are compromised. Is anyone else seeing this, and can anyone think of a reason other other than lax security or the use of third-party email campaigns?
writes: DnG Millwork and Cabinetry manufactures custom kitchen cabinets. Let DnG design your custom kitchen and custom kitchen cabinets today! call for a free quote 305 830 3000Link to Original Source
An anonymous reader writes: A police officer who was disciplined for his role in a massive beating of a guy (many broken bones in his face and permanent partial blindness) is looking to bring criminal wiretapping charges against the woman who caught much of the incident on video. The guy received a 45-day suspension. He does not appear to deny anything that happened in the video. But he apparently thinks it shouldn't have been filmed.Link to Original Source
writes: The SpyEye malware kit has long been both the bane of unsuspecting victims and a boon for cyber-criminals. Now, according to security researchers, the situation may have taken a turn for the worse.
The SpyEye Builder patch source code for release 1.3.45 was leaked by the Reverse Engineers Dream Crew (RED Crew) recently after a crew member was able to locate a copy of SpyEye Builder 1.3.45 and create a tutorial that enables a reader with SpyEye Builder to crack the hardware identification.
The fact that SpyEye has plagued victims around the world is not in doubt. In April, police in the U.K. arrested a handful of people in connection with a bank fraud operation that used SpyEye to steal money and banking information.Link to Original Source
writes: The Chinese government has praised UK Prime Minister David Cameron's plan for censoring social networking sites at times when the government feels threatened believing it legitimises China own behaviour.Link to Original Source
writes: When copyright law was revised in the mid-1970s, musicians, like creators of other works of art, were granted “termination rights,” which allow them to regain control of their work after 35 years, so long as they apply at least two years in advance. Recordings from 1978 are the first to fall under the purview of the law, but in a matter of months, hits from 1979, like “The Long Run” by the Eagles and “Bad Girls” by Donna Summer, will be in the same situationLink to Original Source
An anonymous reader writes: Ars is reporting that the CCIA is calling the copyright wiretaps requested by the IP Czar 'Hollywood's PATRIOT Act'. For those who don't remember, IP Czar Victoria Espinel recently wrote a report calling for more charges of felony copyright infringement under the NET Act, as well as felony charges for illegal web streaming, authorization for the use of wiretaps in going after copyright infringement cases, and several other measures. In short, this means that the copyright cops are coming online.Link to Original Source