ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as <http://catless.ncl.ac.uk/Risks/26.03.html> The current issue can be found at <http://www.csl.sri.com/users/risko/risks.txt> Contents: April Fools: 7,500 Online Shoppers Unknowingly Sold Their Souls (Sam Posten) Teens and Mobile Phones (Pew via Monty Solomon) Social Netting lets the mosquitos through (Renay San Miguel via PGN) Anti-malware backfires (Jeremy Epstein) Computer error affected West Virginia mine scrutiny (Sam Hananel via PGN) Software controlled Toyota roll-over (Jeremy Epstein) Bogus Jury Duty notices lead to identity theft (PGN) School Admin Takes Fifth Amendment in "Peeping Tom" Case (David Murphy via Monty Solomon) Barclay Card Rewards Advert Promotes PIN Insecurity (Chris J Brady) Penguin recalls cookbooks (Nick Rothwell) Re: RFID zapper made from a disposable camera! (Oliver Leistert) Re: Apache Bug tracker attack (Steve Loughran) Re: YOUR SAT NAV IS WRONG - GO BACK! (Dimitri Maziuk, Nick Brown) Re: Canada's planned electronic passports ... (James Cameron) Re: Incorrect software change to emergency ambulance call-handling (Chris D) Re: Is your security policy smarter than a 3rd grader? (David-Sarah Hopwood) Re: ... circumventing Bayesian filters (Raj Mathur) Broadband survivability and certification (Charles Jackson) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- Date: April 19, 2010 9:12:34 AM EDT From: Sam Posten <sposten_at_private> Subject: April Fools: 7,500 Online Shoppers Unknowingly Sold Their Souls [From Dave Farber's IP distribution. PGN-ed] [Be careful what you agree to when you click that EULA... Sam] A computer game retailer revealed that it legally owns the souls of thousands of online shoppers, thanks to a clause in the terms and conditions agreed to by online shoppers. [Source; FOXNews.com, 15 Apr 2010; PGN-ed] http://www.foxnews.com/scitech/2010/04/15/online-shoppers-unknowingly-sold-souls/ British game retailer *GameStation* has revealed that it legally owns the souls of thousands of online shoppers, thanks to a clause in the terms and conditions agreed to by online shoppers. On April Fools' Day they had added the "immortal soul clause" to the contract that you would sign before making any online purchases. It states that customers grant the company the right to claim their soul. "By placing an order via this Web site <#> on the first day of the fourth month of the year 2010 Anno Domini, you agree to grant Us a non transferable option to claim, for now and for ever more, your immortal soul. Should We wish to exercise this option, you agree to surrender your immortal soul, and any claim you may have on it, within 5 (five) working days of receiving written notification from gamesation.co.uk or one of its duly authorised minions." GameStation's form http://www.gamestation.co.uk/Help/TermsAndConditions/ also points out that "we reserve the right to serve such notice in 6-foot-high letters of fire, however we can accept no liability for any loss or damage caused by such an act. If you a) do not believe you have an immortal soul, b) have already given it to another party, or c) do not wish to grant Us such a license, please click the link below to nullify this sub-clause and proceed with your transaction." The GameStation folks apparently intended to make a very real point: No one reads the online terms and conditions of shopping, and companies are free to insert whatever language they want into the documents. While all shoppers during the test were given a simple tick box option to opt out, very few did this, which would have also rewarded them with a 5-pound voucher. Due to the number of people who ticked the box, GameStation claims believes as many as 88 percent of people do not read the terms and conditions of a Web site before they make a purchase. http://newslite.tv/2010/04/06/7500-shoppers-unknowingly-sold.html. The company noted that it would not be enforcing the ownership rights, and planned to e-mail customers nullifying any claim on their soul. ------------------------------ Date: Sun, 25 Apr 2010 14:58:45 -0400 From: Monty Solomon <monty_at_private> Subject: Teens and Mobile Phones (Pew) Amanda Lenhart, Rich Ling, Scott Campbell, Kristen Purcell, Teens and Mobile Phones, Pew Internet & American Life Project 20 Apr 2010 Daily text messaging among American teens has shot up in the past 18 months, from 38% of teens texting friends daily in February of 2008 to 54% of teens texting daily in September 2009. And it's not just frequency - teens are sending enormous quantities of text messages a day. Half of teens send 50 or more text messages a day, or 1,500 texts a month, and one in three send more than 100 texts a day, or more than 3,000 texts a month. Older teen girls ages 14-17 lead the charge on text messaging, averaging 100 messages a day for the entire cohort. The youngest teen boys are the most resistant to texting - averaging 20 messages per day. ... http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx ------------------------------ Date: Thu, 22 Apr 2010 14:20:08 PDT From: "Peter G. Neumann" <neumann_at_private> Subject: Social Netting lets the mosquitos through (Renay San Miguel) [Source: Renay San Miguel, Hackers and Social Networking: A Love Story, *TechNewsWorld*, 22 Apr 2010; PGN-ed, with thanks to Gary McGraw.] http://www.technewsworld.com/story/69822.html?wlc=1271963809 This is a fascinating article on the Social Networking bandwagon and the Cloud Computing megaballoon. It quotes Cloud Computing Alliance's Wen Tseng, Entrust's Eric Skinner, and Cigital's Gary McGraw. I won't begin to summarize it, but Gary gets the last words: "Generally speaking, it looks like HR is all for the social networking thing, and so they're kind of pushing for the networking -- using LinkedIn and Twitter and outreach communications without thinking through the implications of it all. So stepping back and thinking, 'What's the downside' is always a good idea. Just because you can do something doesn't mean you should." [See also Brad Stone and Ashlee Vance, Companies Slowly Join Cloud-Computing, *The New York Times*, 18 Apr 2010. PGN's favorite quote from the Stone/Vance article is this: Ah, the cloud - these days, Silicon Valley can't seem to get its head out of it. The idea, though typically expressed in ways larded with jargon, is actually rather simple. Cloud providers, large ones like Amazon, Microsoft, Google and AT&T, and smaller ones like Rackspace and Terremark, aim to convince other companies to give up building and managing [in-house] data centers and to use [the provider's] computer capacity instead. PGN] ------------------------------ Date: Wed, 21 Apr 2010 16:05:08 -0400 From: Jeremy Epstein <jeremy.j.epstein_at_private> Subject: Anti-malware backfires There's a McAfee anti-virus update today that went wrong. It is bringing down millions of XP machines worldwide. So if you decided to be "safe" and run McAfee, your machine is dead. If you decided to live dangerously, you haven't lost anything. The rational economic argument for users is on the side of not using anti-virus (in this case)... http://www.engadget.com/2010/04/21/mcafee-update--shutting-down-xp-machines/ [Lauren Weinstein notes a *USA Today* article on the COST. PGN] Total cost of McAfee's antivirus error will be many millions http://bit.ly/ckiOsh ------------------------------ Date: Tue, 20 Apr 2010 20:32:24 PDT From: "Peter G. Neumann" <neumann_at_private> Subject: Computer error affected West Virginia mine scrutiny (Sam Hananel) A computer error prevented the West Virginia coal mine where 29 workers died in an explosion last week from receiving a warning about safety violations. Evidently, a computer program used by the Mine Safety and Health Administration screens mines for patterns of violations. Because eight citations at the mine in question were apparently omitted, the program did not flag the mine for safety violations. However, the mine operators apparently had fixed the identified problems earlier. Nevertheless, the inadequate reporting has alerted U.S. House lawmakers. [Source: Sam Hananel, AP item, 13 Apr 2010; PGN-ed. Thanks to dkross.] http://www.google.com/hostednews/ap/article/ALeqM5jcWTXGVTKM_1CpDr0g42ejESRZPAD9F2I4CG0 ------------------------------ Date: Mon, 19 Apr 2010 17:18:43 -0400 From: Jeremy Epstein <jeremy.j.epstein_at_private> Subject: Software controlled Toyota roll-over In the aftermath of Consumer Reports recommendation against buying the Toyota GX 460 SUV because of a risk of rollovers, Toyota is recalling 9400 vehicles in the US (and others overseas) for a software upgrade - a flaw in the Vehicle Stability Control (VSC) software can allow unstable handling. The part I find disconcerting is that the update is going to be available by the end of April (less than two weeks from now), which hardly seems long enough to make a software fix and perform adequate testing. 'nuff said. http://money.cnn.com/2010/04/19/autos/lexus_gx460_recall/index.htm?hpt=T2 ------------------------------ Date: Tue, 20 Apr 2010 8:04:30 PDT From: "Peter G. Neumann" <neumann_at_private> Subject: Bogus Jury Duty notices lead to identity theft A caller claims to be a jury coordinator. If you protest that you never received a summons for jury duty, the scammer asks you for your Social Security number and date of birth to be able to verify the information and cancel the arrest warrant. Giving out such information has resulted in identity fraud in at least 11 states, including Oklahoma, Illinois, and Colorado. The FBI and the federal court system have issued nationwide alerts on their websites, warning consumers about the fraud. http://www.fbi.gov/page 2/June 06/jury_scams060206.htm http://www..snopes.com/crime/fraud/juryduty.asp ------------------------------ Date: Sun, 18 Apr 2010 15:55:37 -0400 From: Monty Solomon <monty_at_private> Subject: School Admin Takes Fifth Amendment in "Peeping Tom" Case Around 2,300 students across two schools in the Lower Merion School District of Ardmore, PA earlier have received $1,000 Macintosh laptops for use with preinstalled video-monitoring software that can be remotely activated. A motion against the District was filed on 15 Apr. The suit accuses the school district of violating various federal and state statutes against surveillance and wiretapping, including the federal Electronics Communications Privacy Act. [Source: David Murphy, *PC Magazine*, 18 Apr 2010; PGN-ed. This follows up on the earlier items in RISKS-25.95,97.] http://www.pcmag.com/article2/0,2817,2362791,00.asp ------------------------------ Date: Sun, 11 Apr 2010 22:42:10 -0700 (PDT) From: Chris J Brady <chrisjbrady_at_private> Subject: Barclay Card Rewards Advert Promotes PIN Insecurity With so many credit/debit card cloning scams and the consequent multi-million (multi-billion?) pound losses it might be expected that banks such as Barclays would be promoting security with card transactions especially with regards to the use of 'chip and pin.' However, the latest advert for Barclay Card's 'Rewards' programme - which is airing regularly on British t.v. - depicts just the opposite. Indeed it is an excellent example of how to NOT carry out a 'chip and pin' transaction. The advert shows a somewhat narcissistic and effeminate guy - for some reason carrying a piece rolled up carpet - shopping and paying for goods and services by 'chip and pin.' However whilst the chip might be secure, he openly flouts his PIN to all and everyone including shop assistants and waiters and anyone standing in his near vicinity. The smirk on his face at every successful transaction - as he punches in his PIN accompanied by annoying musical 'plinks and plonks' - in full view of anyone watching - is indicative of his total ignorance of card cloning and fraud. This irritating advert demonstrates the very worst of Barclay's attitude towards security both of customers credit/debit card accounts and the losses it sustains due to card cloning and fraud. Apparently musical 'plinks and plonks' of customers punching in their PINs to earn some ephemeral 'rewards' for using their cards is more important than demonstrating the necessity of keeping one's PIN secret, i.e. NOT allowing others to see the PIN punched in. The mind boggles at Barclays utter stupidity in using this advert for their services. Risks: You can't beat the Banks for demonstrating stupity when looking after someone else's hard-earned cash and credit card accounts. ------------------------------ Date: Wed, 21 Apr 2010 11:29:21 +0100 From: Nick Rothwell <nick_at_private> Subject: Penguin recalls cookbooks Penguin is destroying all 7000 copies of its Pasta Bible after a misprint suggesting that a dish requires "salt and freshly ground black people". The head of publishing "defended proofreaders for letting through a misprint that he suggested came from a spell-check program." http://www.guardian.co.uk/books/2010/apr/19/penguin-cook-book The RISKS archives are of course peopled - er, peppered - with such examples. [Mark Brader suggested a title for this item: "Freshly ground books and msipelt tagliatelle." Actually, blaming spelling checkers is *not a legitimate defense*. That's STUPIDITY, IGNORANCE, and MALPRACTICE. PGN] ------------------------------ Date: Mon, 19 Apr 2010 17:03:55 +0200 From: Oliver Leistert <leistert_at_private-paderborn.de> Subject: Re: RFID zapper made from a disposable camera! (RISKS-26.02) This is nothing new. The RFID Zapper had been already presented at the Chaos Computer Congress in Berlin in 2005.[1] Prof. Wool is definitely not the first person to publish and present on this topic. But the statement in the RISKS Newsletter reads like that. The Zapper had been developed by Computer Science students from Berlin. [1] http://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper(EN)_77f3.html Oliver Leistert, Universität Paderborn, Warburger Str. 100 33098 Paderborn +49-5251/60-3275 www.upb.de/gk-automatismen/kollegiatinnen/oliver-leistert/ ------------------------------ Date: Mon, 19 Apr 2010 11:48:19 +0100 From: Steve Loughran <steve.loughran_at_private> Subject: Re: Apache Bug tracker attack (RISKS-26.02) One of the great features of humanity is that we can not only learn from our own mistakes, we can learn from other peoples -and, through the written word and youtube videos, from people at a distance, after the event. It's a shame that some people felt that the best comment they could add was criticism, but perhaps they resented having to change their single-web-site password across all web sites. Looking at the apache attack, it appears that the escalation from JIRA admin to system admin was due to inadequate password policy, rather than any OS vulnerability. Once on the machine they attempted to cross over from the public, apache committer-accessible server to the main SVN servers, and fell foul of the fact that it's login mechanism is much stricter -and failures picked up on immediately. The fact that an attack came from a rented VM is interesting as it shows a trend to worry about in future: now all you need is a stolen credit card to gain a small cluster of machines with good network access and a restricted audit trail. The network load of a VM trying to log in to a remote service isn't going to show up on the billing and monitoring infrastructure of a hosting datacentre, so it will be up to every endpoint to defend for that. Fail2Ban is a solution -one which requires every service to log unauthenticated operations. If you have a login point, log failures. That includes every SOAP or REST endpoint -but you also need to make sure the logs themselves don't trigger a failure, else you have created a new DoS vulnerability. Some other issues * ASF Hardware is often donated, and is colocated on different sites. There is no "secure datacentre", back end subnet or other multi-layer defences: everything is in the DMZ. This makes it harder to secure systems, but stops you getting complacent. If there is a network -even a VPN- which grants extra rights to callers, you need a plan to deal with it being compromised and the tests to detect it. * If the JIRA cookies had been marked HttpOnly, then XSS scripts would be unable to read them. I wasn't personally aware of HttpOnly cookies until this incident; I shall be adding Jetty and Tomcat filters to my applications in future to make cookies HttpOnly regardless of the applications' policies. * Log analysis would be easier if events were not scattered across different machines, but instead analysable across them "show me all requests to ASF infrastructure from IPAddr 192.168.1.1". The cloud computing projects within Apache are building tooling which could do this: anyone wiling to apply the CouchDB and Hadoop project's products for such capture and mining would be encouraged to do so. * TinyURL was used to obfuscate the XSS attack, so the script did not appear in any (sanitised) email bug reports. There's no easy defence against that, except maybe to use some tooling other than the web browser to resolve tinyURL links. longSHORE, at http://long-shore.com/ ( http://tinyurl.com/y4kta7o ) can do that; the thought of a Firefox plugin that works with this service appeals to me, though of course as longshore is accessed via HTTP, you have to trust DNS in your browsing location. * The https://issues.apache.org/ HTTPS certificate has to be considered compromised. This is why it's important to have a different https certificate for every host, not save money for a *.mydomain.com certificate. It is also why client applications should check certificates for revocation. It's easy for people to look at the post mortem and criticise, but consider this: the team wrote up what happened, in enough detail for the readers to follow. We don't see that very often; it would have been easier to say "A zero-day exploit" and leave it at that. ------------------------------ Date: Mon, 19 Apr 2010 12:09:23 -0500 From: Dimitri Maziuk <dmaziuk_at_private> Subject: Re: YOUR SAT NAV IS WRONG - GO BACK! (RISKS-26.02 and others) A few observations from a recent road trip with our brand new TomTom: "Fastest route" seems to assume you'll be doing speed limit and thus prefers major freeways. It's a reasonable assumption, except major freeways in big cities tend to be congested most of the time -- presumably paid subscription to real-time traffic reports service helps with that. In a couple of places "shortest route" had us turn off a highway into a side street (across oncoming traffic), turn right into another side street, and then back into the same highway (left, across all traffic again). A look at the map showed the highway turning left in wide bend. I expect the "shortcut" was indeed a few metres shorter. Then there's GPS/map/address accuracy: we're coming to a motel hiding at the end of a driveway on the left side of a wide boulevard, right next to a major intersection. To follow TomTom's "make a u-turn and you've arrived at your destination", I'd have drive over the divider lawn and into some sort of an office building. There was left turn pocket a few metres back, with a big "no u-turn" sign on it. It does into the driveway we wanted, but the driveway entrance is probably not exactly at the motel's listed address, the driveway veers back a little (causing TomTom -- I guess -- to insist on "u-turn" instead of just "turn left"), and by the time TomTom decides "you're there", you've actually already passed the turn. Not too unreasonable, and once you get the hang of it and look at the screen and/or map (traffic conditions permitting) instead of blindly following the voice prompts, no worse than any other piece of software I get to work with. Of course, I do software for living, by now I have an intuitive feel for how it works and what the limitations would be. I've no problem believing that an average GPS user would drive off a non-existing bridge or wedge a truck under a too-low overpass. YOUR SAT NAV HAS LIMITATIONS - LEARN TO USE IT PROPERLY! Dimitri (Dima) Maziuk, BioMagResBank, UW-Madison -- http://www.bmrb.wisc.edu ------------------------------ Date: Wed, 21 Apr 2010 10:15:30 +0200 From: "BROWN Nick" <Nick.BROWN_at_private> Subject: Re: YOUR SAT NAV IS WRONG - GO BACK! (RISKS-26.02 and others) Even when you choose the alternative of "shortest time", that doesn't always help. A lot of GPS map data seems to divide roads into a rather small number of classes, with all roads within a class considered to be equally "fast". Typically, minor asphalted country roads may be considered to be in the same class as farm tracks, so whichever route appears to be shorter will always be chosen. ------------------------------ Date: Tue, 20 Apr 2010 15:44:32 +1000 From: James Cameron <quozl_at_private> Subject: Re: Canada's planned electronic passports ... (Laurie, RISK-26.01) > ... it relayed a passport I was holding to a similar reader in the UK, > using a mobile phone data link. Presumably the same attack would work against many RFID systems? Beware of people sidling up to you in a pub, they may be opening your car, home, workplace, lab ... At least with the old coded metal bar keys they could be reasonably hidden in trouser pockets. ;-) ------------------------------ Date: Tue, 20 Apr 2010 22:00:15 +0100 From: "Chris D." <e767pmk_at_private> Subject: Re: Incorrect software change to emergency ambulance call-handling (Horrocks, RISKS-25.98). NB: E-mail address munged to defeat spam, "yeeha" = "yahoo", of course. > It's not clear from the article whether the change was incorrectly > implemented or exactly as requested. As the old joke goes, the trouble with software engineers is that they give you what you asked for, not what you actually wanted... ------------------------------ Date: Wed, 21 Apr 2010 01:10:06 +0100 From: David-Sarah Hopwood <david-sarah_at_private> Subject: Re: Is your security policy smarter than a 3rd grader? (RISKS-26.02) This article says, "Blackboard and school officials clarified Thursday th= at the boy had not found and exploited a security vulnerability, but rather that he had obtained a teacher's password." So allowing privilege escalation from "teacher" to "administrator" is not a security vulnerability? Of course it is -- if those roles were not intended to be equivalent, then there is a mismatch between the intended policy and the implemented one. Exploiting that can certainly be described as "hacking". David-Sarah Hopwood http://davidsarah.livejournal.com ------------------------------ Date: Mon, 19 Apr 2010 08:34:35 +0530 From: Raj Mathur <raju_at_linux-delhi.org> Subject: Re: ... circumventing Bayesian filters (Kamens, RISKS-26.02) Facing precisely that problem, I'd created spamtune.pl back in 2005, a sort Perl script that generates an OpenOffice.org spreadsheet which loads up SpamAssassin configuration and known spam and ham messages. Once loaded, you can tweak individual SpamAssassin scores in the spreadsheet itself and see their effect on spam/ham classification in real-time. The script also shows you the number of false positives and negatives for a set of scores in real-time. The program is available at: http://kandalaya.org/software/spamtune.pl Feedback appreciated. Raj Mathur raju@private http://kandalaya.org/ ------------------------------ Date: Fri, 23 Apr 2010 14:46:45 -0400 From: "Charles Jackson" <clj_at_private> Subject: Broadband survivability and certification Notice of Inquiry, 21 Apr 2010: The FCC adopted a Notice of Inquiry to enhance its understanding of the present state of survivability in broadband communications networks and to explore potential measures to reduce network vulnerability to failures in network equipment or severe over-load conditions, such as would occur in natural disasters, pandemics, and other disasters. The Commission seeks comment on the ability of existing networks to withstand localized or distributed physical damage, including whether there is adequate network redundancy and the extent of survivability of physical enclosures in which network elements are located. Comments are due 45 days from publication in the Federal Register; replies 75 days from publication. https://portal.neca.org/portal/server.pt/gateway/PTARGS_0_0_307_206_0_43/http%3B/prodnet.www.neca.org/publicationsdocs/wwpdf/fcc1062.pdf> Notice of Inquiry, 21 Apr 2010: The FCC issued a Notice of Inquiry that seeks comment on whether the Commission should establish a voluntary program under which participating communications service providers would be certified by the FCC or a yet to be determined third party entity for their adherence to a set of cyber security objectives and/or practices. The Commission also seeks comment on the components of such a program, if any, and whether such a program would create business incentives for providers of communications services to sustain a high level of cybersecurity culture and practice. Comments will be due 60 days after the NOI is published in the Federal Register; replies will be due 120 days after publication. https://portal.neca.org/portal/server.pt/gateway/PTARGS_0_0_307_206_0_43/http%3B/prodnet.www.neca.org/publicationsdocs/wwpdf/fcc1063.pdf Charles L. Jackson, PO Box 221, Port Tobacco, MD 20677, 1-301 656 8716 [Don't you love these easily remembered URLs? PGN] ------------------------------ Date: Thu, 29 May 2008 07:53:46 -0900 From: RISKS-request_at_private Subject: Abridged info on RISKS (comp.risks) The ACM RISKS Forum is a MODERATED digest, with Usenet equivalent comp.risks. => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent) if possible and convenient for you. The mailman Web interface can be used directly to subscribe and unsubscribe: http://lists.csl.sri.com/mailman/listinfo/risks Alternatively, to subscribe or unsubscribe via e-mail to mailman your FROM: address, send a message to risks-request_at_private containing only the one-word text subscribe or unsubscribe. You may also specify a different receiving address: subscribe address= ... . You may short-circuit that process by sending directly to either risks-subscribe_at_private or risks-unsubscribe_at_private depending on which action is to be taken. Subscription and unsubscription requests require that you reply to a confirmation message sent to the subscribing mail address. Instructions are included in the confirmation message. Each issue of RISKS that you receive contains information on how to post, unsubscribe, etc. => The complete INFO file (submissions, default disclaimers, archive sites, copyright policy, etc.) is online. <http://www.CSL.sri.com/risksinfo.html> The full info file may appear now and then in RISKS issues. *** Contributors are assumed to have read the full info file for guidelines. => .UK users should contact <Lindsay.Marshall_at_private>. => SPAM challenge-responses will not be honored. Instead, use an alternative address from which you NEVER send mail! => SUBMISSIONS: to risks_at_private with meaningful SUBJECT: line. *** NOTE: Including the string "notsp" at the beginning or end of the subject *** line will be very helpful in separating real contributions from spam. *** This attention-string may change, so watch this space now and then. => ARCHIVES: ftp://ftp.sri.com/risks for current volume or ftp://ftp.sri.com/VL/risks for previous VoLume <http://www.risks.org> redirects you to Lindsay Marshall's Newcastle archive http://catless.ncl.ac.uk/Risks/VL.IS.html gets you VoLume, ISsue. Lindsay has also added to the Newcastle catless site a palmtop version of the most recent RISKS issue and a WAP version that works for many but not all telephones: http://catless.ncl.ac.uk/w/r <http://the.wiretapped.net/security/info/textfiles/risks-digest/> . ==> PGN's comprehensive historical Illustrative Risks summary of one liners: <http://www.csl.sri.com/illustrative.html> for browsing, <http://www.csl.sri.com/illustrative.pdf> or .ps for printing ==> Special Offer to Join ACM for readers of the ACM RISKS Forum: <http://www.acm.org/joinacm1> ------------------------------ End of RISKS-FORUM Digest 26.03 ************************Received on Sun Apr 25 2010 - 17:45:07 PDT
This archive was generated by hypermail 2.2.0 : Sun Apr 25 2010 - 18:50:42 PDT