33 Years of the Digest ... founded August 21, 1981
Copyright © 2015 E. William Horne. All Rights Reserved.
The Telecom Digest for Apr 7, 2015
|It is a damn poor mind indeed which can't think of at least two ways to spell any word. - Andrew Jackson|
See the bottom of this issue for subscription and archive details.
|Date: Mon, 6 Apr 2015 17:11:23 -0400 From: Julian Thomas <firstname.lastname@example.org> To: email@example.com. Subject: Re: Online phone number lookups have changed Message-ID: <8FFB4A2A-849E-4D7A-9EF1-6CD28E368B6F@jt-mj.net> > On Apr 4, 2015, at 20:45, Ron <firstname.lastname@example.org> wrote: > > Yes, Verizon still "publishes" the white pages. That's fine for VZ numbers. What about the other outfits like Frontier, etc. Is there one place to look up a landline given name and location [regardless of the carrier]? jt - email@example.com PUBLIC NOTICE: Any use of this message, in any manner whatsoever, will increase the amount of disorder in the universe. Although no liability is implied herein, the consumer is warned that this process will ultimately lead to the heat death of the universe.|
|Date: Sun, 5 Apr 2015 13:40:06 -0400 From: Monty Solomon <firstname.lastname@example.org> To: email@example.com. Subject: Dyre Wolf malware steals more than $1 million Message-ID: <AECC032E-8EE5-40F3-8298-6D07E506EADD@roscom.com> Dyre Wolf malware steals more than $1 million, bypasses 2FA protection. Campaign is crude and brazen, but rakes in cash anyway. Researchers said they've uncovered an active campaign that has already stolen more than $1 million using a combination of malware and social engineering. The Dyre Wolf campaign, as it has been dubbed by IBM Security researchers, targets businesses that use wire transfers to move large sums of money, even when the transactions are protected with two-factor authentication. The heist starts with mass e-mailings that attempt to trick people into installing Dyre, a strain of malware that came to light last year. The Dyre versions observed by IBM researchers remained undetected by the majority of antivirus products. http://arstechnica.com/security/2015/04/dyre-wolf-malware-steals-more-than-1-million-bypasses-2fa-protection/ -or- http://goo.gl/lulJ3e|
TELECOM Digest is an electronic journal devoted mostly to telecom- munications topics. It is circulated anywhere there is email, in addition to Usenet, where it appears as the moderated newsgroup 'comp.dcom.telecom'.
TELECOM Digest is a not-for-profit educational service offered to the Internet by Bill Horne.
The Telecom Digest is moderated by Bill Horne.
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
This Digest is the oldest continuing e-journal about telecomm- unications on the Internet, having been founded in August, 1981 and published continuously since then. Our archives are available for your review/research. We believe we are the oldest e-zine/mailing list on the internet in any category! URL information: http://telecom-digest.org Copyright © 2015 E. William Horne. All rights reserved.
Finally, the Digest is funded by gifts from generous readers such as yourself. Thank you!
All opinions expressed herein are deemed to be those of the author. Any organizations listed are for identification purposes only and messages should not be considered any official expression by the organization.