32 Years of the Digest ... founded August 21, 1981
The Telecom Digest for May 26, 2014
====== 32 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Bill Horne and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using any name or email address
included herein for any reason other than responding to an article
herein, you agree to pay a hundred dollars to that person, or email address
Addresses herein are not to be added to any mailing list, nor to be sold or given away without the explicit written consent of the owner of that address. Chain letters, viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we are naive enough to believe that we will ever stamp it out, but because we do not want the kind of world that results when no one stands against crime. - Geoffrey Welsh
See the bottom of this issue for subscription and archive details and the name of our lawyer, and other stuff of interest.
Date: Sun, 25 May 2014 17:57:57 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Researchers find a global botnet of infected PoS systems Message-ID: <firstname.lastname@example.org> Researchers find a global botnet of infected PoS systems The botnet contained almost 1,500 compromised point-of-sale and other retail systems from 36 countries, researchers from IntelCrawler said By Lucian Constantin May 23, 2014 Computerworld IDG News Service - Security researchers uncovered a global cybercriminal operation that infected with malware almost 1,500 point-of-sale (POS) terminals, accounting systems and other retail back-office platforms from businesses in 36 countries. The infected systems were joined together in a botnet that researchers from cybercrime intelligence firm IntelCrawler dubbed Nemanja. The researchers believe the attackers behind the operation might be from Serbia. The size of the botnet and the worldwide distribution of infected systems brings into perspective the security problems faced by retailers from around the world, problems that were also highlighted by the recent PoS breaches at several large U.S. retailers. ... http://www.computerworld.com/s/article/9248541/Researchers_find_a_global_botnet_of_infected_PoS_systems
Date: Sun, 25 May 2014 17:59:18 -0400 From: Monty Solomon <email@example.com> To: firstname.lastname@example.org. Subject: IT pro gets 4 years in prison for sabotaging ex-employer's system Message-ID: <email@example.com> IT pro gets 4 years in prison for sabotaging ex-employer's system Ricky Joe Mitchell must also pay more than $500,000 in restitution and fines By Chris Kanaracus May 21, 2014 Computerworld IDG News Service - A former network engineer for oil and gas company EnerVest has been sentenced to four years in federal prison after pleading guilty in January to sabotaging the company's systems badly enough to disrupt its business operations for a month. Ricky Joe Mitchell of Charleston, West Virginia, must also pay $428,000 in restitution and a $100,000 fine, according to an announcement this week from U.S. Attorney Booth Goodwin's office. In June 2012, Mitchell found out he was going to be fired from EnerVest and in response he decided to reset the company's servers to their original factory settings. He also disabled cooling equipment for EnerVest's systems and disabled a data-replication process. ... http://www.computerworld.com/s/article/9248499/IT_pro_gets_4_years_in_prison_for_sabotaging_ex_employer_39_s_system
Date: Sun, 25 May 2014 17:56:19 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: eBay finally prompts users to change passwords after huge data breach Message-ID: <firstname.lastname@example.org> eBay finally prompts users to change passwords after huge data breach Notice begins to appear on home page of ebay.com By Gregg Keizer May 23, 2014 Computerworld - eBay on Friday put a notice on its home page urging users to change their passwords after security experts had criticized the auction site for failing to promptly alert customers about a massive break-in and data theft. The notice, which includes a link to the password reset process, was part of the advice eBay had given its users on Wednesday to immediately change their passwords. ... http://www.computerworld.com/s/article/9248540/eBay_finally_prompts_users_to_change_passwords_after_huge_data_breach
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'. TELECOM Digest is a not-for-profit, mostly non-commercial educational service offered to the Internet by Bill Horne. All the contents of the Digest are compilation-copyrighted. You may reprint articles in some other media on an occasional basis, but please attribute my work and that of the original author. The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright (C) 2014 TELECOM Digest. All rights reserved. Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as yourself who provide funding in amounts deemed appropriate. Your help is important and appreciated. A suggested donation of fifty dollars per year per reader is considered appropriate. See our address above. Please make at least a single donation to cover the cost of processing your name to the mailing list. All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.