Thursday, December 08, 2005

US warns of fake net domain data

More than 5% of the net's most popular domains have been registered using "patently false" data, research shows.

A US congressional report into who owns .com, .net and .org domains found that many owners were hiding their true identity.

The findings could mean that many websites are fronts for spammers, phishing gangs and other net criminals.

The report also found that measures to improve information about domain owners were not proving effective.

Missing words

The research was carried out by the US Government Accountability Office (GAO) to assess the accuracy of information about domain owners.

The GAO took 300 random domain names from each of the .com, .org and .net registries and looked up the centrally held information about their owners. Any user can look up this data via one of the many "whois" sites on the net.

The report found that owner data for 5.14% of the domains it looked at was clearly fake as it used phone numbers such as (999) 999-9999; listed nonsense addresses such as "asdasdasd" or used invalid zip codes such as "XXXXX".

In a further 3.65% of domain owner records data was missing or incomplete in one or more fields.

Extrapolating from what it found, the GAO suspects that owner information for 3.89 million of the 44 million registered .com, .org and .net domains is fake in at least one respect.

Increasingly whois data is being used by law enforcement and security companies to find out who is running a website involved in spamming or some other scam.

The GAO said there were many different sorts of sites on the domains with incomplete or false ownership data that included search engines, porn sites and consulting services. Many domains had no website associated with them.

As well as looking into owner information, the GAO also investigated the procedures for correcting fake data.

The Internet Corporation for Assigned Names and Numbers (Icann) has the role of overseeing the net's domains and recently attempted to tighten up the policing of owner data.

However, the GAO found of the 45 reports on dodgy domain data that it submitted to Icann, 33 were unchanged after 30 days. Of the others, 11 were corrected and one domain was deleted.

The GAO recommended that more effort be made to verify the information by domain owners and that greater use be made of commercial software tools to check who runs a website.


ID theft fears overblown, study says

By Reuters
http://news.com.com/ID+theft+fears+overblown%2C+study+says/2100-1029_3-5986567.html

Story last modified Wed Dec 07 17:45:00 PST 2005

A new study suggests consumers whose credit cards are lost or stolen or whose personal information is accidentally compromised face little risk of becoming victims of identity theft.

The analysis, released on Wednesday, also found that even in the most dangerous data breaches--where thieves access social security numbers and other sensitive information on consumers they have deliberately targeted--only about 1 in 1,000 victims had their identities stolen.

ID Analytics, the San Diego, Calif.-based fraud detection company that performed the analysis, said it looked at four recent data breaches involving a total of 500,000 consumers. It declined to provide the names of the companies involved in the breaches, but Mike Cook, ID Analytics co-founder, said one of them was a top five U.S. bank.

After six months of study, comparing compromised information against credit applications, ID Analytics said it discovered something counterintuitive: The smaller the breach, the greater the likelihood the information was subsequently used by fraudsters to hijack the identity of victims.

"If you're in a breach of 100, 200 or 250 names, there's a pretty high probability that you're identity is going to be used," said Mike Cook, ID Analytics' co-founder. "The reason for that is if you look at how long it takes a fraudster to use an identity, they can roughly use 100 to 250 in a year. But as the size of the breach grows, it drops off pretty drastically."

A study conducted earlier this year by Javelin Strategy and Research, which mirrored the methodology of an earlier Federal Trade Commission study, found that 9.3 million Americans said they had been victimized by identity thieves during the preceding 12 months.

ID Analytics said it discovered that identity thieves have a hard time using a stolen credit cards to hijack the identity of cardholders. That's because the cards are usually quickly canceled and because piecing together an identity based on the information on the card is hard work. Not one of the card breaches it studied resulted in a subsequent identity takeover.

While the findings will provide some comfort to consumers whose credit cards are lost or lifted, or whose sensitive information is compromised when, for instance, a laptop is stolen, as recently happened at Chicago-based Boeing, some of ID Analytics' suggestions could be controversial.

The company suggests, for instance, that companies shouldn't always notify consumers of data breaches because they may be unnecessarily alarming people who stand little chance of being victimized.

That's likely to rankle consumer watchdogs, who are pushing Congress to enact a law sponsored by Sen. Arlen Specter, a Republican from Pennsylvania, and Sen. Patrick Leahy, a Democrat from Vermont. The law would require companies to implement tough data security standards and to notify consumers, law enforcement and credit-reporting agencies whenever there's a breach.

"As far as notifications, we think there are certain instances where businesses might want to notify consumers and certain instances where they might not to inform them," Cook said.

"For instance, if they lose data, and they don't know where it is, we think too many notices may not be a good thing. They should probably monitor that and spend dollars on consumers who are actually harmed, rather than spending dollars on 10 million consumers" most of whom won't be affected, he said.

Story Copyright © 2005 Reuters Limited. All rights reserved.


Copyright ©1995-2005 CNET Networks, Inc. All rights reserved.

Scientists discover how cancer spreads

Disease sends bone marrow cells to prepare new tumor sites, study finds

LONDON - Scientists have discovered how cancer spreads from a primary site to other places in the body in a finding that could open doors for new ways of treating and preventing advanced disease.

Instead of a cell just breaking off from a tumor and traveling through the bloodstream to another organ where it forms a secondary tumour, or metastasis, researchers in the United States have shown that the cancer sends out envoys to prepare the new site.

Intercepting those envoys, or blocking their action with drugs, might help to prevent the spread of cancer or to treat it in patients in which it has already occurred.

"We are basically looking at all the earlier steps that are involved in metastasis that we weren't previously aware of. It is complex but we are opening the door to all these things that occur before the tumor cell implants itself," said Professor David Lyden, of Cornell University in New York.

"It is a map to where the metastasis will occur," he added in an interview.

Landing site for cancer cells
Cancer's ability to colonize other organs is what makes the disease so deadly. Once the cancer has spread beyond its original site it is much more difficult to treat.

In research reported in the journal Nature, Lyden and his colleagues describe what happens before the arrival of the cancerous cells at the new site.

"The authors show that tumor cells can mobilize normal bone marrow cells, causing them to migrate to particular regions and change the local environment so as to attract and support a developing metastasis," Patricia Steeg, of the National Cancer Institute in Bethesda, Maryland, said in a commentary.

Cells at the site of the metastasis multiply and produce a protein called fibronectin, which acts like a glue to attract and trap the bone marrow cells to create a landing pad or nest for the cancer cells.

"These nests provide attachment factors for the tumor cells to implant and nurture them. It causes them not only to bind but to proliferate. Once that all takes place we have a fully formed metastatic site or secondary tumor," said Lyden.

"This is the first time anyone has discovered what we call the pre-metastatic niche."

Without the landing pad, the cancerous cell could not colonize the organ.

In animal and laboratory studies, the scientists looked at how breast, lung and oesophageal cancer spread. The envoys from the tumor determine the site of the secondary site.

Lyden said measuring the number of special bone marrow cells circulating in the body could help to determine whether a cancer is likely to spread.

"This opens up the door to new concepts of how metastasis is taking place. If we can understand all these multiple processes we can develop new drugs that block each step. That way we have a much better future than just trying to treat the tumor cell, which is almost like a last step in this process," he added.

source:

http://www.msnbc.msn.com/id/10366968/


Computer Jobs -- How to Resign Professionally?

"I submitted a letter of resignation yesterday, and today I'm at home posting stories to my weblog and Slashdot. I gave my employer two weeks notice, and almost immediately, I had my accounts disabled, and my permissions revoked on all the computers at my work, which makes me unable to do anything in my position of being a 'Systems Analyst/Systems Administrator'. I spoke with the HR rep, and gave her my notice yesterday, then I spoke with her today about what had happened to my access, and they honored my resignation... 2 weeks early. (Luckily, I'm compensated in pay for the next two weeks). What I want to know is, how do you computer and IT professionals out there put in your notice of resignation (if you are with a permanent employer, and not contractual), and not get immediately shutdown, and shunned away from the computers? The CIO immediately thought I was going to do something terrible to the system, and destroy accounts, and any other activity that I have access to, but I was giving him notice that I was leaving. What is the professional thing to do?"

source and followups:http://ask.slashdot.org/article.pl?sid=05/12/08/029257&tid=187&tid=4

Beginners Guide to Search Engine Optimization

SEOmoz has an interesting writeup regarding search engine optimization. The article has quite a bit of info and is geared so that even the inexperienced used can learn the basics of search engine optimization. From the article: "It is our goal to improve your ability to drive search traffic to your site and debunk major myths about SEO. We share this knowledge to help businesses, government, educational and non-profit organizations benefit from being listed in the major search engines.

source:http://slashdot.org/article.pl?sid=05/12/07/2119222&tid=95&tid=187

This page is powered by Blogger. Isn't yours?