×
Spam

The SEO Spammers Behind Online Infographics 55

jfruh writes "Over the past couple of years, you may have noticed a rash of often high-quality infographics by third parties appearing on your favorite websites. These images are offered to Web publishers free of charge, with the only request being a link back to the creator's own site. But when one blogger got an odd email from a the creator of infographic he put on his site two years ago, he did some digging and discovered that he had inadvertently helped some shady characters do SEO spamming."
Censorship

Hotmail & Yahoo Mail Using Secret Domain Blacklist 345

Frequent contributor Bennett Haselton writes: "Hotmail and Yahoo Mail are apparently sharing a secret blacklist of domain names such that any mention of these domains will cause a message to be bounced back to the sender as spam. I found out about this because — surprise! — some of my new proxy site domains ended up on the blacklist. Hotmail and Yahoo are stonewalling, but here's what I've dug up so far — and why you should care." Read on for much more on how Bennett figured out what's going on, and why it's a hard problem to solve.
Communications

Text Message Spammer Wants FCC To Declare Spam Filters Illegal 338

TCPALaw writes "ccAdvertising, a company purported to have 'a long, long, long history of pumping spam out of every telecommunications orifice, and even boasting of voter suppression' has asked the FCC to declare spam filters illegal. Citing Free Speech rights, the company claims wireless carriers should be prohibited from employing spam filters that might block ccAdvertising's political spam. Without stating it explicitly, the filing implies that network neutrality must apply to spam, so the FCC must therefore prohibit spam filters (unless political spam is whitelisted). In an earlier filing, the company suggests it is proper that recipients 'bear some cost' of unsolicited political speech sent to their cell phones. The public can file comments with the FCC on ccAdvertising's filing online."
Security

Malicious QR Codes Posted Where There's Lots of Foot Traffic 89

Orome1 writes "QR codes are very handy for directing users to specific sites by simply scanning them with their smartphones. But the ease with which this technology works has also made it a favorite of malware peddlers and online crooks, who have taken to including QR codes that lead to malicious sites in spam emails. They have also begun using the same tactic in the physical world, by printing out the malicious QR codes on stickers and affixing them on prominent places in locations where there is a lot of foot traffic. According to Symantec Hosted Services director Warren Sealey, these locations include airports and city centers, where the crooks stick them over genuine QR codes included in advertisements and notices, and most likely anywhere a person might look and be tempted to scan them."
Security

Hosting Provider Automatically Fixes Vulnerabilities In Customers' Websites 73

An anonymous reader writes "Dutch hosting provider Antagonist announced their in-house developed technology that automatically detects and fixes vulnerabilities in their customers' websites. The service is aimed at popular software such as WordPress, Drupal and Joomla. 'As soon as a vulnerability is detected, we inform the customer. We also explain how the customer can resolve the issue. In case the customer does not respond to our first notice within the next two weeks, we automatically patch the vulnerability.' Antagonist plans to license the technology to other hosting providers as well."
Bitcoin

WordPress To Accept Bitcoins 205

angry tapir writes "WordPress has said it will accept payment in bitcoins, opening up the blogging platform to payments from users in countries not supported by PayPal or credit card companies. WordPress is free, open-source software, but the company Automattic offers paid-for features such as blog designs, custom domains, hosting partnerships and anti-spam measures."
Cellphones

Papa John's Sued For Unwanted Pizza-Related Texts 418

jfruh writes "Nationwide pizza chain Papa John's is finding itself on the receiving end of a $250 million text spam lawsuit. From the article: 'Seattle law firm Heyrich Kalish McGuigan, representing three Papa John's customers, alleged that the pizza delivery service has sent 500,000 unwanted text messages to customers. If the court finds that Papa John's violated the U.S. Telephone Consumer Protection Act, the pizza maker could have to pay damages of $500 per text message, or US$250 million, one of the largest damage awards under the 1991 law, the law firm said. "Many customers complained to Papa John's that they wanted the text messages to stop, and yet thousands of spam text messages were sent week after week," Donald Heyrich, attorney for the plaintiffs said in a statement. "This should be a wake-up call to advertisers. Consumers do not want spam on their cell phones."'
Handhelds

Hurricane Sandy Fails To Stop Line For iPad Mini Launch 103

Nerval's Lobster writes "Hurricane Sandy may have plunged part of New York City into darkness, drowned its basements and subway tunnels in saltwater, and even set part of a neighborhood on fire, but it couldn't stop New Yorkers from standing in line for hours to purchase the iPad Mini. Hundreds of people lined up in front of Apple's Fifth Avenue store for the chance to get their hands on the 7.9-inch device. According to CNET, which was on the scene and running a live-blog ahead of the store's 10 AM EST opening, 'many people in line are not fluent in English and are either Asian immigrants or visitors.' That opening was originally supposed to take place at 8 AM, and likely delayed because of the obvious citywide transportation issues. But for those in New York City who manage to get their sweaty hands on a new iPad Mini, there's an unusual wrinkle in the situation: power is still out below 39th Street in Manhattan, as well as portions of Brooklyn and Queens. (Apple's Fifth Avenue store is well above that power line.) While some private homes and businesses in electrified areas have set out power strips for strangers to charge their phones, it's hard to imagine a crowd of New Yorkers standing idly by while someone spends a significant amount of time charging a new tablet. Fortunately, many of those without power have found refuge with friends and family, if they haven't left the city altogether."
Government

FTC Whacks "Rachel From Card Holder Services" 289

coondoggie writes "Just two weeks after it challenged the public to come up with a better technological way to stop incessant robocalling, the Federal Trade Commission pulled the plug on five mass calling companies it said were allegedly responsible for millions of illegal pre-recorded calls from 'Rachel' and others from 'Cardholder Services.' 'At the FTC, Rachel from Cardholder Services is public enemy number one,' said FTC Chairman Jon Leibowitz at the announcement of the cases."
Facebook

Inside Social Media's Fake Fan Industry 63

jfruh writes "It's an open secret that many high-profile users of social media networks pay to pad their fan counts. But what you do you get for your money? One blogger decided to shell out some cash to find out. Instead of the real human fans he was promised, he found himself followed by a motley collection of obvious fakes created by non-English speakers and accounts that seem to mainly exist to spam porn links."
Movies

Interviews: Director Daniel Knight On Troll Bridge, Color Correction, and He-man 16

You asked Daniel Knight, director of the crowd-funded filmed version of Terry Pratchett's Troll Bridge, about cameras, Kickstarter, and his source material. Daniel's answered now with details on the process of filming, why they selected Troll Bridge, and his favorite He-Man figurines. Read on below!
Government

Spammers Using Shortened .gov URLs 75

hypnosec writes "Cyber-scammers have started using '1.usa.gov' links in their spam campaigns in a bid to fool gullible users into thinking that the links they see on a website or have received in their mail or newsletter are legitimate U.S. Government websites. Spammers have created these shortened URLs through a loophole in the URL shortening service provided by bit.ly. USA.gov and bit.ly have collaborated, enabling anyone to shorten a .gov or .mil URL into a 'trustworthy' 1.usa.gov URL. Further, according to an explanation provided by HowTo.gov, creating these usa.gov short URLs does not require a login." Which might not be a big deal, except that the service lets through URLs with embedded redirects, and it is to these redirected addresses that scammers are luring their victims.
Censorship

Zero Errors? Spamhaus Flubs Causing Domain Deletions 170

Frequent contributor Bennett Haselton writes: After I sent 10 new proxy sites to my (confirmed-opt-in) mailing list, two of them ended up on one of Spamhaus's blacklists, and as a result, all 10 domains were disabled by the domain registrar, so the sites disappeared from the Web. Did you even know this could happen?"
Social Networks

Decentralized Social Networking — Why It Could Work 128

Slashdot contributor Bennett Haselton writes with "a response to some of the objections raised to my last article, about a design for a distributed social networking protocol, which would allow for decentralized (and censorship-resistant) hosting of social networking accounts, while supporting all of the same features as sites like Facebook." Social networking is no longer new; whether you consider it to have started with online communities in the mid-90s or with the beginnings of sites many people still use today. As its popularity has surged, it has grown in limited ways; modern social networks have made communication between users easier, but they've also made users easier to market to advertisers as well. There's no question that the future of social networking holds more changes that can both help and harm users — perhaps something like what Bennett suggests could serve to mitigate that harm. Read on for the rest of his thoughts.
Facebook

The Day Leo Traynor Confronted His Troll 594

McGruber writes "Dublin-based writer Leo Traynor has written a piece about confronting the troll who drove him off Twitter, hacked his Facebook, and abused and terrified his family. Quoting: 'I blocked the account and reported it as spam. The following week it happened again in an identical manner. A new follower, I followed back, received a string of abusive DMs, blocked and reported for spam. Two or three times a week. Sometimes two or three times a day. An almost daily cycle of blocking and reporting and intense verbal abuse. ... Then one day something happened that truly frightened me. I don't scare easily but this was vile. I received a parcel at my home address. Nothing unusual there – I get lots of post. I ripped it open and there was a Tupperware lunchbox inside full of ashes. There was a note included, saying, "Say hello to your relatives from Auschwitz." I was physically sick. ... In July I was approached by a friend who's basically an IT genius, and he offered some help. He said that he could trace the hackers and trolls for me using perfectly legal technology, which would lead to their IP addresses. I said yes. Then I baited them – I was deliberately more provocative toward them than ever I'd been before.'"
Education

University of Cambridge Offers Free Online Raspberry Pi Course 99

Barence writes "The University of Cambridge has released a free 12-step online course on building a basic operating system for the Raspberry Pi. The course, Baking Pi — Operating Systems Development, was compiled by student Alex Chadwick during a summer interning in the school's computer lab, and has been put online to help this year's new recruits start work with the device. The university has already purchased a Raspberry Pi for every new Computer Science student starting in 2012."
Windows

Windows 8 Is 'a Work of Art.' But It's No Linux 371

colinneagle writes "Earlier this week I installed the final version of Windows 8. And it is awesome. That's not a joke. Windows 8 is absolutely, unequivocally stellar. And yet, at the end of the day, I am right back to using Linux. Why is that? What is it about Linux that makes me so excited to use it — even while enjoying another operating system that I view as, in all seriousness, a work of art? Why do I not simply install Windows 8 on every machine I own and be happy with it? For me, it's the ability to slowly chip away and remove items from your user interface until you are left with only want you want, and nothing more. The option of looking at an item on the screen, right clicking on it, and declaring to said item 'Listen up, mister Thing-On-My-Screen. I don't want you anymore. Be gone!' Panels, bars, docks, launchers, widgets, gadgets – whatever is on your screen, there is probably a way to send it to whatever form of the afterlife is reserved for unwanted Desktop Crud. And, I'll tell you this right now – as great as it is, you don't find a whole lot of 'Right click, Remove Panel' in Windows 8."
Botnet

A Month After Grum Botnet Takedown, Spam Back To Previous Levels 47

wiredmikey writes "It's been over a month since spam-spewing Grum botnet has been shut down, but spam experts say there hasn't been a noticeable impact on global spam volume. Symantec researchers at the time estimated that Grum was responsible for one-third of all spam being sent worldwide, and its takedown led to an immediate drop in global spam email volumes by as much as 15 to 20 percent. However, the drop was only temporary. While Grum had an estimated hundred thousand zombies sending spam, the machines were likely blocked for sending emails too frequently, or wound up on IP blacklists, said Andrew Conway, Cloudmark researcher. IP filtering is fast and cheap, and is a good first line of defense against spam, Conway said. Grum spam was easy to blacklist, and despite its size, most spam messages from the botnet probably never reached user inboxes."
Communications

Russia's Former KGB Invests In Political Propaganda Spambots 164

An anonymous reader writes "The newspaper Kommersant reports that the Russian Foreign Intelligence Service (formerly part of the KGB) has invested 30 million roubles (USD $940,000) on 'blog and social network intelligence' programs (Google translation of Russian original). A small part of that money is used for surveillance and analytics, but 22 million roubles (USD $690,000) is invested in 'mass distribution of messages in social networks with a view to the formation of public opinion.' Which presumably can be rephrased as 'launching massive pro-Kremlin astroturfing propaganda spambots in order to stifle and undermine political dissent.' The brazen Russian government acknowledgement of this investment indicates that the Kremlin does not think of such activities to be in any way illegal or unethical. No words whether these spambots would respect any anti-spam laws or the Terms and Conditions of victim websites. But hey, now you can accuse anyone you disagree with online of being a 'KGB bot'!"

Slashdot Top Deals