Risk
5/19/2005
11:27 AM
Commentary
Commentary
Commentary
50%
50%

A Call From The North: Be Brutal Against Spammers

A group of 10 business executives, consumers, academics, and government officials has spent the past year trying to figure out how best to stop unsolicited E-mail known as spam. The solution: brutalize violators with stiff financial penalties.

A group of 10 business executives, consumers, academics, and government officials has spent the past year trying to figure out how best to stop unsolicited E-mail known as spam. The solution: brutalize violators with stiff financial penalties.That's the gist of a 69-page report forwarded this week to the minister of industry by the Canadian Task Force On Spam. Tough measures are needed on individuals and companies that send these unwanted missives.

The report, Stopping Spam: Creating A Stronger And Safer Internet, recommends new laws to prohibit false and misleading headers; dictionary attacks, a method of guessing passwords by running through a list of likely possibilities, often a list of words from a dictionary; and the harvesting of E-mail addresses. The report also beckons Parliament to enact legislation allowing individuals and companies to sue spammers. "This would set a critical baseline for Canada-opt-in (as compared to the U.S. opt-out approach) with penalties," task force member Michael Geist, a University of Ottawa law professor, wrote in his blog.

Other task force recommendations: improve education, cooperate with other national governments, and form a center of expertise to monitor spam complaints and back law-enforcement efforts. "Taken together," Geist wrote, "the spam-specific statute would be far more robust than the current legal framework and would send an important message to law enforcement that this is a serious issues that demands action."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.