Risk
5/19/2005
11:27 AM
Commentary
Commentary
Commentary
50%
50%

A Call From The North: Be Brutal Against Spammers

A group of 10 business executives, consumers, academics, and government officials has spent the past year trying to figure out how best to stop unsolicited E-mail known as spam. The solution: brutalize violators with stiff financial penalties.

A group of 10 business executives, consumers, academics, and government officials has spent the past year trying to figure out how best to stop unsolicited E-mail known as spam. The solution: brutalize violators with stiff financial penalties.That's the gist of a 69-page report forwarded this week to the minister of industry by the Canadian Task Force On Spam. Tough measures are needed on individuals and companies that send these unwanted missives.

The report, Stopping Spam: Creating A Stronger And Safer Internet, recommends new laws to prohibit false and misleading headers; dictionary attacks, a method of guessing passwords by running through a list of likely possibilities, often a list of words from a dictionary; and the harvesting of E-mail addresses. The report also beckons Parliament to enact legislation allowing individuals and companies to sue spammers. "This would set a critical baseline for Canada-opt-in (as compared to the U.S. opt-out approach) with penalties," task force member Michael Geist, a University of Ottawa law professor, wrote in his blog.

Other task force recommendations: improve education, cooperate with other national governments, and form a center of expertise to monitor spam complaints and back law-enforcement efforts. "Taken together," Geist wrote, "the spam-specific statute would be far more robust than the current legal framework and would send an important message to law enforcement that this is a serious issues that demands action."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7441
Published: 2015-05-29
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

CVE-2014-9727
Published: 2015-05-29
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.

CVE-2015-0200
Published: 2015-05-29
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x before 7.0.0.8 IF2 allows local users to obtain sensitive database information via unspecified vectors.

CVE-2015-0751
Published: 2015-05-29
Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800.

CVE-2015-0752
Published: 2015-05-29
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?