×
The Media

Consortium To Share Ad Revenue From Stolen Stories 94

Hugh Pickens writes "Erick Schonfeld has an interesting story in TechCrunch about a consortium of publishers including Reuters, the Magazine Publishers of America, and Politico that plans to take a new approach towards the proliferation of splogs (spam blogs) and other sites which republish the entire feed of news sites and blogs, often without attribution or links. For any post or page which takes a full copy of a publisher's work, the Fair Syndication Consortium thinks the ad networks should pay a portion of the ad revenues being generated by those sites. Rather than go after these sites one at a time, the Fair Syndication Consortium wants to negotiate directly with the ad networks which serve ads on these sites: DoubleClick, Google's AdSense, and Yahoo. One precedent for this type of approach is YouTube's Content ID program, which splits revenues between YouTube and the media companies whose videos are being reused online. How would the ad networks know that the content in question belongs to the publisher? Attributor would keep track of it all and manage the requests for payment. The consortium is open to any publisher to join, including bloggers. It may not be the perfect solution but 'it is certainly better than sending out thousands of takedown notices' writes Schonfeld."
Spam

The Ecological Impact of Spam 176

krou writes "A new study entitled 'The Carbon Footprint of Spam' (PDF) published by ICF International and commissioned by McAfee claims that spam uses around 33 billion kilowatt hours of energy annually, which is approximately enough to power 2.4 million US homes (or roughly 3.1 million cars) for a year. They calculated that the average CO2 emission for a spam email is around 0.3 grams. Interestingly, the majority of energy usage (around 80%) comes from users viewing and deleting spam, and searching for legitimate emails within spam filters. They also claim that 'An individual company can find that one fifth of the energy budget of its email system is wasted on spam.' One of the report's authors, Richi Jennings, writes on his blog that 'spam filtering actually saves an incredible amount of energy.' He continues, 'Imagine if every inbox were protected by a state-of-the-art spam filter. We could save about 75% of the spam energy used today — 25 TWh per year; that's like taking 2.3 million cars off the road.""
The Courts

Jack Thompson Spams Utah Senate, May Face Legal Action 319

eldavojohn writes "Yesterday, GamePolitics ran an interesting story about the Utah Senate President threatening Jack Thompson with the CAN-SPAM Act. You might recall Utah being Jack's last hope and hold-out after being disbarred in Florida and more or less made a mockery everywhere else. Well, from Utah's Senate Site, we get the picture of what Jack is up to now: spamming his last friends on the planet. The Salt Lake Tribune is reporting on Senate President Michael Waddoups' statements: 'I asked you before to remove me from your mailing list. I supported your bill but because of the harassment will not again. If I am not removed, I will turn you over to the AG for legal action.' The Salt Lake Tribune reports that Waddoups confirmed on Tuesday that he would attempt to pursue legal action under the federal CAN-SPAM Act of 2003 against Jack Thompson."
Microsoft

Microsoft Won't Vouch For Linux 208

theodp writes "Gov. Christine Gregoire applauded Microsoft's job training partnership with WA state and county government agencies, which calls for the distribution of 30,625 training vouchers statewide during the next 90 days. 'This program [Elevate America] is all about equipping people with the new skills they'll need to get a job in the changing economy,' said Microsoft Counsel Brad Smith, who also made it very clear that getting 'workforce ready' won't involve acquiring any Linux skills. At least this offer appears to be no-cost, unlike the $35 Microsoft requested in an e-mail come-on for 'The Stimulus Package for Your Career' (so much for Smith's and Gregoire's war on spam)."
Worms

Twitter Gets Slammed By the StalkDaily XSS Worm 145

CurtMonash writes "Twitter was hit Saturday by a worm that caused victims' accounts to tweet favorably about the StalkDaily website. Infection occurred when one went to the profile page of a compromised account, and was largely spread by the kind of follower spam more commonly used by multi-level marketers. Apparently the worm was an XSS attack, exploiting a vulnerability created in a recent Twitter update that introduced support for OAuth, and it was created by the 17-year-old owner of the StalkDaily website. More information can be found in the comment thread to a Network World post I put up detailing the attack, or in the post itself. By evening, Twitter claimed to have closed the security hole."
Spam

Spam Replacing Postal Junk Mail? 251

TheOtherChimeraTwin writes "I've been getting spam from mainstream companies that I do business with, which is odd because I didn't give those companies my email address. It is doubly strange because the address they are using is a special-purpose one that I wouldn't give out to any business. Apparently knotice.com ('Direct Digital Marketing Solutions') and postalconnect.net aka emsnetwork.net (an Equifax Marketing Service Product with the ironic name 'Permission!') are somehow collecting email addresses and connecting them with postal addresses, allowing companies to send email instead of postal mail. Has anyone else encountered this slimy practice or know how they are harvesting email addresses?"
Spam

Why the CAPTCHA Approach Is Doomed 522

TechnoBabble Pro writes "The CAPTCHA idea sounds simple: prevent bots from massively abusing a website (e.g. to get many email or social network accounts, and send spam), by giving users a test which is easy for humans, but impossible for computers. Is there really such a thing as a well-balanced CAPTCHA, easy on human eyes, but tough on bots? TechnoBabble Pro has a piece on 3 CAPTCHA gotchas which show why any puzzle which isn't a nuisance to legitimate users, won't be much hindrance to abusers, either. It looks like we need a different approach to stop the bots."
It's funny.  Laugh.

Spammers Say the Darndest Things 115

The Narrative Fallacy writes "Bill Sweetman has a tongue-in-cheek post about how a few years ago he started collecting some of the more outlandish and amusing email subject lines from the many thousands of spam emails he received promoting various 'solutions' related to his private parts. Sweetman, a Canadian internet marketeer now working for Tucows gets a guilty pleasure from the copywriting 'skills' of the spammers. 'Sometimes the writing is clever. Sometimes it is accidentally funny. And sometimes it's just plain bizarre.' Sweetman writes that it takes a certain twisted creative genius to make your spam message stand out from the rest. and gives us ten of his favorite spam subject lines as well as his would-be replies to the messages. Favorites spam subject lines include 'Small friend is for hiding, big friend is for showing off' and Sweetman's reply: 'Even if the product they are pitching works as promised, I still don't think I would be walking around the neighborhood showing off the results.'"
Spam

Spam Back Up To 94% of All Email 330

Thelasko writes "A NYTimes blog reports that the volume of spam has returned to its previous levels, as seen before the McColo was shut down. Here is the report on Google's enterprise blog. Adam Swidler, of Postini Services, says: 'It's unlikely we are going to see another event like McColo where taking out an ISP has that kind of dramatic impact on global spam volumes,' because the spammers' control systems are evolving. This is sad news for us all."
Spam

Supreme Court Lets Virginia Anti-Spam Law Die 77

SpuriousLogic sends in a CNN report that begins "The Supreme Court has passed up a chance to examine how far states can go to restrict unsolicited e-mails in efforts to block spammers from bombarding computer users. The high court without comment Monday rejected Virginia's appeal to keep its Computer Crimes Act in place. It was one of the toughest laws of its kind in the nation, the only one to ban noncommercial — as well as commercial — spam e-mail to consumers in that state. The justices' refusal to intervene also means the conviction of prolific commercial spammer Jeremy Jaynes will not be reinstated." Jaynes remains behind bars because of a federal securities fraud conviction unrelated to the matter of spamming.
Spam

3D-Based CAPTCHAs Become a Reality 192

mateuscb writes "A new way of creating a CAPTCHA using 3D objects has become a reality. The idea was thought up independently by blogger Taylor Hayward and by the folks at YUNiTi.com. 'Similar to Hayward's idea, this new technology relies on our ability to identify objects in 3D instead of using alphanumeric characters. YUNiti's 3D Captcha, however, has three objects in the challenge and extends the list of images to any object, not limiting it to animals as in Hayward's idea. This increases the challenge's level of complication to prevent computers from successfully making the correct guesses.' I, for one, welcome the thought of not having to read more and more complex CAPTCHA. Lately, I've been having a hard time getting CAPTCHA to work the first time."
Spam

Giving Your Greytrapping a Helping Hand 109

Peter N. M. Hansteen writes "Some spam houses have invested in real mail servers now, meaning that they are able to get past greylisting and even content filtering. Recently Peter Hansteen found himself resorting to active greytrapping to put some spammers in their place. The article also contains a list of spam houses' snail mail addresses in case you want to tour their sites."
The Internet

Canadian ISPs Speak Out Against Net Neutrality 213

Ars Technica reports on a proceeding being held by the Canadian Radio-television and Telecommunications Commission regarding net neutrality. They requested comments from the public as part of the debate, and several Canadian ISPs took the opportunity to explain why they think it's a bad idea. Quoting: "One of the more interesting responses came from an ISP called Videotron, which told the CRTC that controlling access to content ... 'could be beneficial not only to users of Internet services but to society in general.' As examples of such benefits, Videotron mentioned the control of spam, viruses, and child pornography. It went on to suggest that graduated response rules — kicking users off the 'Net after several accusations of copyright infringement — could also be included as a benefit to society in general. ... Rogers, one of Canada's big ISPs, also chimed in and explained that new regulations might limit its ability to throttle P2P uploads, which it does at the moment. 'P2P file sharing is designed to cause network congestion,' says the company. 'It contributes significantly to latency, thereby making the network unreliable for certain users at periods of such congestion.'"
Spam

Facebook Vs. Spammers, Round Two 57

An anonymous reader writes "Three months after being awarded $873 million in a lawsuit against Atlantis Blue Capital for violating the CAN-SPAM Act of 2003, Facebook earlier this week filed a federal complaint against 'Spam King' Sanford Wallace in San Jose District Court. Las Vegas night club manager Adam Arzoomanian and Scott Shaw are also named as defendants in the suit." These filings do not mark the first time Wallace has faced legal action; last May, MySpace won a $230 million judgment against him.
Privacy

Privacy In the Age of Persistence 120

Bruce Schneier recently wrote another essay on privacy for the BBC concentrating on how data seems to be the "pollution of the information age" and where this seems to be leading. "We're not going to stop the march of technology, just as we cannot un-invent the automobile or the coal furnace. We spent the industrial age relying on fossil fuels that polluted our air and transformed our climate. Now we are working to address the consequences. (While still using said fossil fuels, of course.) This time around, maybe we can be a little more proactive. Just as we look back at the beginning of the previous century and shake our heads at how people could ignore the pollution they caused, future generations will look back at us — living in the early decades of the information age — and judge our solutions to the proliferation of data."
The Courts

Use Your iPhone To Get Out of a Ticket 291

An anonymous reader writes to tell us that Parkingticket.com just announced new compatibility with the Safari web browser on Apple's iPhone, giving you new tools to immediately contest a parking ticket. The site is so confident in their service that if all steps are followed and the ticket is still not dismissed they will pay $10 towards your ticket. "The process begins by navigating the iPhone's Safari browser to the Parkingticket.com website where you'll find a straightforward means to fight a parking ticket; whether the ticket was issued in New York City, San Francisco, Boston, Philadelphia or Washington, D.C. Simply register for a free account and choose the city in which the ticket was issued. Enter your ticket and vehicle details then answer a few quick questions. The detailed process takes about ten minutes, from A-Z. To allow easy entry of your ticket, a look-a-like parking ticket is displayed — for your specific city — with interactive functionality."
The Internet

The Chinese (Web Servers) Are Coming 231

Glyn Moody writes "The February 2009 Netcraft survey is not the usual 'Apache continues to trounce Microsoft IIS' story: there's a new entrant — from China. 'This majority of this month's growth is down to the appearance of 20 million Chinese sites served by QZHTTP. This web server is used by QQ to serve millions of Qzone sites beneath the qq.com domain.' What exactly is this QZHTTP, and what does it all mean for the world of Web servers?"
Security

Hackers Jump On Newest IE7 Bug 162

CWmike writes "Attackers are already exploiting a bug in Internet Explorer 7 that Microsoft patched just last week, security researchers warned today. Although the attacks are currently in 'very, very small numbers,' they may be just the forerunner of a larger campaign, said Trend Micro's Jamz Yaneza. 'I see this as a proof-of-concept,' said Yaneza, who noted that the exploit's payload is extremely straightforward and explained that there has been no attempt to mask it by, say, planting a root kit on the victimized PC at the same time. 'I wouldn't be surprised to see this [exploit] show up in one of those Chinese exploit kits,' he added. The new attack code, which Trend Micro dubbed 'XML_Dloadr.a,' arrives in a spam message as a malicious file masquerading as a Microsoft Word document."
Spam

Verizon.net Finally Moving Email To Port 587 195

The Washington Post's Security Fix blog is reporting that Verizon, long identified as the largest ISP source of spam, is moving to require use of the submission port, 587, in outbound mail — and thus to require authentication. While spammers may still be able to relay spam through zombies in Verizon's network, if the victims let their mail clients remember their authentication credentials, at least the zombies will be easily identifiable. Verizon pledges to clean up their zombie problem quickly. We'll see.
Privacy

Ontario Court Wrong About IP Addresses, Too 258

Frequent Slashdot contributor Bennett Haselton comments on a breaking news story out of the Canadian courts: "An Ontario Superior Court Justice has ruled that Canadian police can obtain the identities of Internet users without a warrant, writing that there is 'no reasonable expectation of privacy' for a user's online identity, and drawing the analogy that 'One's name and address or the name and address of your spouse are not biographical information one expects would be kept private from the state.' But why in the world is it valid to compare an IP address with a street address in the phone book?" Read on for Bennett's analysis.

Slashdot Top Deals