The Cyber Information Sharing and Protection Act, AKA CISPA, has once again passed in the US House of Representatives. Reminder that this bill gives government agencies and their other agencies access to personal, private user data to help monitor for the presence of hackers.
Now, when CISPA was first passed, Senate said NO! Also, President Barack Obama has said that he’d veto the bill if it came through his office. Because of the different privacy issues, many advocates against this bill will fight it to the end.
This bill has been backed by bigwig business for a long period of time, almost since the beginning of the talks of this bill. Maybe it could be the big government contract ($$$) for these big businesses that seem attractive or maybe could be the fact that these business truly believe to end hackers’ abilities.
Will it completely stop hacker initiatives? Probably not. However, it would provide the ability to try to limit some of the bigger initiatives.
Government sectors of China, Russia, etc. are a bit of a cyberthreat to the United States, information access is what the US will need if it wants ahead of the game. Do you agree?
Of course the president of the US doesn’t want it passed if it violates the rights of citizens. But, in the end, realize that if money among other things, like personally-identifiable-information were to be stolen every year — and people would realize this, then people should have no problem with their data being accessible to US authorities rather than hackers.
The bright side would be, is if government authorities have access to your private data, it isn’t going to spread around like wildfire, unlike what’d happen if a hacker got a hold of it.
It’s easy to do an Internet search for lists of email addresses, and pull up loads upon loads of private email addresses that hackers posted in public to humiliate those that haven’t been smart enough to keep it secret.
Spammers and phishers, all the time, access your private information on Facebook, if you accidentally click the wrong link or follow a malicious email link – which asks you to ‘enter your Facebook username and password to continue.’
Some people argue that the government doesn’t care for internet users but rather cares for the money they’d get. Well, actually, if you think about it, the government is paying these big businesses to participate in the information sharing process, so the American people’s pocketbooks/wallets can be protected, and their own privacy.
Who else has protested this? Anonymous:
Even the Reddit co-founder is urging the US Government to NOT pass it.
What should be our take? You decide. My vote is neutral. I see this bill as a good thing in spots (because of potentially ending hacker initiatives and malware/virus threats), however, it poses a major privacy threat. For most advocates of privacy, I agree with them.
Your opinion matters too! Contact your local senator and let your voice be heard. It’s usually best to write a letter, which provides good results. Providing written documentation of a fair but firm protest is the best way to go.
More spam is lighting up for Battle.net account users, Diablo, and World of Warcraft members. The latest spam update is below, where once again, the spammers are using a fake email account (email@example.com) as the sender, and stating that you are trying to sell your Battle.net account and need to verify it so it will not be suspended.
However, the link it gives looks real, however, it is fake.
Here are the technical details:
Return-path (email address the email actually came from): ab[at]vlrpc.com
IP address: 22.214.171.124 belonging to an unknown/private user (WHOIS states the IP master’s name: yanling ruanof) China Unicom, a telecommunications company governed by The People’s Republic of China. They seem to either ignore abuse reports, or do not know much about their users’ activities. We know a private user sent this spam, because the message header clearly states the application used to send the email: Microsoft Outlook Express 6.00.2900.5512.
Known blacklisting: Spamhaus.org (listed as “Illegal 3rd party exploits, including proxies, worms and trojan exploits”), abuseat.org, barracudacentral.org, uceprotect.net
Now, it’s believed that the recent spam outbreak (like the one above, for example) is a result of the latest Blizzard lawsuit. However, spam like this has happened before (also look in the comments for a user who posted about Diablo 3 spam).
The only thing to best protect against spam is having an anti-spam program. Please visit the vendor below for more information.
Now, spam makers have more juice with a sex tape leak on Hulk Hogan. The alleged porn tape appeared earlier this year, place in at least one studio, and now it is a key spam topic in email/IM/SEO spamming.
If that isn’t bad enough, Heather Clem, one alleged to be involved in the footage, and is “completely devastated” by it.
There are many other stories popping up about the tape and it’s becoming a big buzz. What’s sad is, with the rise of social networking, contributes to the rise of celebrity problems, which was predicted I’m sure. Celebrities don’t belong with normal people, because either the celebrity goes crazy, or the fan goes crazy.
As usual, if you receive any emails containing information about the Hogan sex tape, kindly ignore it, and do not download the attached EXE file or video that apparently has the footage. Doing so can cause malware to take control of your computer.
To prevent spam from causing problems on your computer, it’s best to secure your computer Surfright Anti-Spam.
Be careful of new spammy emails from (apparently) Chase.com. These emails state that your account has been locked out, and to “click here” to unlock your account. However, doing so can compromise your computer. Only click links that appear to be real, which means when you hover over the link, it should show the same address in the status bar at the bottom of the browser. If it really is from Chase.com, you should see https://www.chase.com/ as the first part of the address. If there is anything extra placed after the .com part, except for a forward slash (as noted in the link example highlighted red), distrust it. Don’t click on it. If anything, call Chase customer support about the email rather than clicking the link.
It’s also very obviously a spammy email, because of the grammar/spelling errors involved. And also because of the following (when I view the full header):
- Return-Path: <firstname.lastname@example.org>
- Received-SPF: none (domain of c12.iservidorweb.com does not designate permitted sender hosts)
- Received: from armagedo by c12.iservidorweb.com with local (Exim 4.77)
- Message-Id: <email@example.com> id 1TF5am-00009J-DX
- X-AntiAbuse: Sender Address Domain – c12.iservidorweb.com
- IP: 126.96.36.199
See for yourself:
You can avoid spammy issues like this coming to your inbox by downloading the following tool:
- Chase site hiccups following similar Bank of America problems (news.cnet.com)
- Chase’s website slowed by glitches (money.cnn.com)
- Chase says experiencing ‘issues’ with website (seattlepi.com)
- Chase.com is Down, Day After BoFA’s Website Attacked (valuewalk.com)
- Chase Bank Is Second to be Hit with Cyber-Attack In Response to “Sacrilegious Movie” [Hackers] (gizmodo.com)