Risk
5/19/2005
11:27 AM
Commentary
Commentary
Commentary
50%
50%

A Call From The North: Be Brutal Against Spammers

A group of 10 business executives, consumers, academics, and government officials has spent the past year trying to figure out how best to stop unsolicited E-mail known as spam. The solution: brutalize violators with stiff financial penalties.

A group of 10 business executives, consumers, academics, and government officials has spent the past year trying to figure out how best to stop unsolicited E-mail known as spam. The solution: brutalize violators with stiff financial penalties.That's the gist of a 69-page report forwarded this week to the minister of industry by the Canadian Task Force On Spam. Tough measures are needed on individuals and companies that send these unwanted missives.

The report, Stopping Spam: Creating A Stronger And Safer Internet, recommends new laws to prohibit false and misleading headers; dictionary attacks, a method of guessing passwords by running through a list of likely possibilities, often a list of words from a dictionary; and the harvesting of E-mail addresses. The report also beckons Parliament to enact legislation allowing individuals and companies to sue spammers. "This would set a critical baseline for Canada-opt-in (as compared to the U.S. opt-out approach) with penalties," task force member Michael Geist, a University of Ottawa law professor, wrote in his blog.

Other task force recommendations: improve education, cooperate with other national governments, and form a center of expertise to monitor spam complaints and back law-enforcement efforts. "Taken together," Geist wrote, "the spam-specific statute would be far more robust than the current legal framework and would send an important message to law enforcement that this is a serious issues that demands action."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0732
Published: 2015-07-28
Cross-site scripting (XSS) vulnerability in Cisco AsyncOS on the Web Security Appliance (WSA) 9.0.0-193; Email Security Appliance (ESA) 8.5.6-113, 9.1.0-032, 9.1.1-000, and 9.6.0-000; and Content Security Management Appliance (SMA) 9.1.0-033 allows remote attackers to inject arbitrary web script or ...

CVE-2015-2974
Published: 2015-07-28
LEMON-S PHP Gazou BBS plus before 2.36 allows remote attackers to upload arbitrary HTML documents via vectors involving a crafted image file.

CVE-2015-4287
Published: 2015-07-28
Cisco Firepower Extensible Operating System 1.1(1.86) on Firepower 9000 devices allows remote attackers to bypass intended access restrictions and obtain sensitive device information by visiting an unspecified web page, aka Bug ID CSCuu82230.

CVE-2015-4288
Published: 2015-07-28
The LDAP implementation on the Cisco Web Security Appliance (WSA) 8.5.0-000, Email Security Appliance (ESA) 8.5.7-042, and Content Security Management Appliance (SMA) 8.3.6-048 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain s...

CVE-2015-4692
Published: 2015-07-27
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!