The Channel logo

Articles about Blacklist

Steve Jobs, credit Apple site, screengrab

Silicon Valley tech titans beg for more mediation time in wage-fix lawsuit

Some of the biggest names in Silicon Valley have filed a court motion asking for more time in mediation before going to court to fight former employees who claim they were put on secret no-hire blacklists by their bosses. The class action suit claims that from 2005 the bosses of Adobe, Apple, Google, Intel, Intuit, Lucasfilm, …
Iain Thomson, 04 Sep 2014

Apple, Google, Intel, Adobe, settle employee-fiddling class action suit

A series of secret pacts among some of the biggest employers in Silicon Valley to cheat their staffers could turn out to be a rather expensive mistake, with Apple, Google, Intel, and Adobe now agreeing to settle the antitrust class-action lawsuit out of court. "This is an excellent resolution of the case that will benefit class …
Iain Thomson, 25 Apr 2014
graph up

Spam busters blacklist MessageLabs and chums

One of the biggest spam block lists on the internet suffered an embarrassing technical cock-up today which blocked emails from some servers at web security monitoring firm MessageLabs and at some ISPs for about five hours. The CBL (Composite Blocking List), a DNS blacklist that takes its source data from very large spamtraps …
Kelly Fiveash, 11 Apr 2008

Fujitsu: We're not blacklisted by gov, but we want private work

Fujitsu’s UK CEO says the company is continuing to bid for UK public sector contracts, but the share of its business coming from the public purse will continue to decline over the next few years. Duncan Tait said the firm had been rebalancing its UK business over the last two years to boost the amount of revenue it generates …
Joe Fay, 15 Nov 2012
channel

Google blacklist sheds light on phishing tactics

An analysis of Google's blacklist of suspected phishing sites found that eBay, PayPal and Bank of America together account for almost two in three (63 per cent) of suspected scam sites. Security researcher Michael Sutton also discovered that Yahoo! hosts a significant number of bogus websites - as identified by Google's …
John Leyden, 05 Jan 2007

UK.gov blacklists Fujitsu from future contracts - report

Japanese IT group Fujitsu is among several companies that have been "blacklisted" by the UK Government, claims the Financial Times. It means that Fujitsu, G4S and other unnamed companies will not be considered for future public sector contracts when they come up for tender because of their poor performance on past and existing …
Anna Leach, 11 Sep 2012

Police arrest suspect in BIGGEST DDoS ATTACK IN HISTORY

The Dutch police have confirmed the arrest of man suspected of taking part in a massive DDoS attack against the anti-spam group Spamhaus back in March. The 35 year-old man is a Dutch national but was arrested at his home in Barcelona under a European arrest warrant, the Netherlands National Prosecution Office told the BBC. His …
Iain Thomson, 26 Apr 2013
The Four Horsemen Apocalypse ride up the grassy mound that adorns the WinXP desktop

The... Windows... XPocalypse... is... NIGH

The XPocalypse is upon us, gentlebeings, and those of us who must keep XP around are doomed! Or so some very expensive marketing pushes would have us believe. As you know by now, I have to keep some XP systems around. In some cases they'll probably be around for a decade or more. If you believe the breathtaking hyperbole of …
Trevor Pott, 08 Apr 2014

Time to blacklist blacklists

Blacklists have their place for detecting and identifying malicious content and activity, with the whole signature-based malware detection industry effectively being built around the concept that blacklists are reliable mechanisms. The only problem is that they aren't. They certainly are an important element of security models …

Don't lose control of those fast-breeding endpoints

So you want to know about security? Well you have come to the right place. I have been here for a while and I can tell you that outside these gates it’s full of cowboys, sharks and pirates, none of whom will hesitate to take what is yours and call it their own. The above is is a quote from a brochure I wrote in an attempt to …
Aaron Milne, 22 Oct 2013
chain_relationship_channel

Feel Cisco's WRATH: Over 1,000 placed on DENIED partner sh*t list

Cisco has launched an EMEA-wide crackdown in the channel after expelling Phoenix IT Group from the Gold Partner network, which our sources alleged was because it flouted support rules by supplying grey market kit. The Brand Protection police at the networking Goliath sent letters to more than 1,000 resellers, integrators and …
Paul Kunert, 08 Nov 2013
cloud

World Bank confirms Wipro is on contractor blacklist

The World Bank has revealed the full list of companies banned for bidding for future contracts because of alleged malpractice. Troubles at Satyam took a turn for the worse when it was revealed on Christmas Eve that it was banned from applying for World Bank contracts for eight years. Now it has emerged that Wipro, India's third …
John Oates, 12 Jan 2009
channel

US reveals intellectual property blacklist

The US has published a blacklist of those of its trading partners that are most ineffective when it comes to protecting intellectual property rights (IPRs). The "Special 301" report from the Office of the US Trade Representative (USTR) fingers Ukraine as the worst offender. The report, published annually by the Office of the …
OUT-LAW.COM, 04 May 2005
channel

Bonfire of the brands: ICANN's top-level domain selloff

Despite what in the final months seemed to be stiff competition, ICANN went ahead with its new generic domain names, letting companies register .whatevertheycanthinkof from 12 January. The generic top level domain names, or gTLDs, are something that ICANN has emphasised are necessary to let more businesses onto the net in what …
channel

'Mark-of-the-Beast' bug topples Java apps

A bug in Oracle's Java programming framework causes computers to freeze when they encounter certain numerical values with large numbers of decimal places, a flaw that makes websites susceptible to highly efficient denial-of-service attacks. The vulnerability in the latest version of Java is similar to a flaw discovered last …
Dan Goodin, 07 Feb 2011
channel

Law Commissions call for new consumer compo law

A new law should be created giving consumers the right to take misleading and aggressive businesses to court, the Law Commission and Scottish Law Commission have said. The new law would only apply to transactions between a business and a consumer, the Law Commissions said as they launched a consultation into whether there should …
OUT-LAW.COM, 19 Apr 2011
channel

Adobe: critical Acrobat flaw fix 4 weeks away

Users of Adobe's Acrobat and Reader programs have a full four weeks to fret over a critical flaw that's being exploited in the wild to install malware on vulnerable machines. Adobe said on Wednesday it would issue an update that plugs the hole on January 12, the same day Microsoft is slated to release its next installment of …
Dan Goodin, 17 Dec 2009
hands waving dollar bills in the air

PC giants ship Chinese censorware anyway

Though the Chinese government has delayed plans to require the shipment of the highly-controversial Green Dam filtering app with all new PCs, several big-name PC manufacturers are shipping the thing anyway. According to the Associated Press, Acer, Sony, and China's the Haier Group are including Green Dam on disk with new PC …
Cade Metz, 02 Jul 2009
For Sale sign detail

Indian police raid PWC in Satyam probe

Police raided PricewaterhouseCooper's offices in Hyderabad today in connection with the ongoing investigation into the alleged billion dollar fraud at outsourcer Satyam. PWC audited Satyam's accounts and was apparently unaware of the large holes they contained. The firm's chairman admitted last week to cooking the books over …
John Oates, 13 Jan 2009

Google and eBay thwart phishing redirection ruse

High-profile websites have cleaned up their act after a small team of security researchers documented how they were unwittingly helping phishing fraudsters. Phishing scams often use "open redirector" exploits on major sites to make their attack URL look more legitimate. The trick also makes it more likely that fraudulent emails …
John Leyden, 23 Jan 2008
homeless man with sign

Oz govt pushes mandatory net filters

Australia's newly elected Labor government is pushing plans that would make it mandatory for local ISPs to install porn-blocking filters, offering "clean" internet feeds as a preferred option. Telecomms Minister Stephen Conroy said the policy would protect children from online pornography and violent websites, ABC News reports. …
John Leyden, 31 Dec 2007

Anti-spam sites weather DDoS assault

Prominent anti-spam services came under a sustained denial of service attack late last week. The assault targeted Spamhaus, Spam URI Realtime Blocklists (SURBL), and Realtime URI Blacklist (URIBL). The URIBL (which, like SURBL - filters junk mail based on spam sites mentioned in their message bodies) website was rendered …
John Leyden, 11 Jun 2007
For Sale sign detail

ICANN refuses to pull Spamhaus domain

Internet governance organisation ICANN has said it does not have the authority to suspend the website of The Spamhaus Project. An Illinois court last week proposed pulling Spamhaus.org in response to a lawsuit brought against the anti-spam organisation by an company it accuses of spamming. The threat of domain loss came after …
John Leyden, 12 Oct 2006
Warning Stop

Vista SP1 kills and maims security apps, utilities

Microsoft has admitted that Windows Vista service pack one (SP1) renders useless a number of well-known third party security products. Redmond said in a knowledge base article yesterday that due to "reliability" issues with Vista SP1, it has been forced to prevent some security products from running after the service pack is …
Kelly Fiveash, 22 Feb 2008
globalisation

Spamhaus fights US court domain threat

Spamhaus is at risk of losing its domain because of court action by a firm it has labelled as a spammer. The threat comes after the anti-spam organisation refused to comply with a September ruling by a US court requiring it to pay $11.7m in compensation to e360 Insight, pull the organisation's listing, and post a notice stating …
John Leyden, 10 Oct 2006
channel

EC wants pan-Euro online shopping laws

An EU directive that will harmonise consumer protection for online and bricks and mortar sales made another lurch along the Brussels’ legislative roadmap yesterday. The European Commission’s proposed consumer rights directive builds on proposals first made last year to simplify and replace four existing directives covering …
Joe Fay, 09 Oct 2008
channel

Taiwan fingered as the hub of spam distribution

Almost two thirds (64 per cent) of servers controlling spam traffic are located in Taiwan, according to a survey by email security firm CipherTrust. Such servers, used by internet low lives to relay spam and phishing emails through zombie, compromised PCs, are also commonly located in the US. The US accounts for 23 per cent of …
John Leyden, 12 Jun 2006
channel

Swiss gov 'mulls' spyware to tap VoIP calls

The Swiss government is "considering" the use of a spyware application called Superintendent Trojan to eavesdrop on IP telephony conversation, Heise Security reports. Swiss firm ERA IT Solutions said it hopes to supply the Superintendent Trojan only to government agencies, a policy it hopes will leave it off malware blacklists …
John Leyden, 10 Oct 2006
Stop sign

Stay ahead of Web 2.0 worms

Think you've protected your web applications from cross-site scripting (XSS) vulnerabilities? The odds are against you. Roughly 90 per cent of web applications have this problem, and it's getting worse as web applications and web services share more and more data. Many frameworks and libraries are encoding, decoding, and re- …
Jeff Williams, 07 Jan 2008
Nokia 6125

Gov claims mobile phone theft waning as penalty rises

Mobile phone theft has almost been eliminated, according to the Home Office. It announced last week that 80 per cent of handsets are now blocked within 48 hours of the theft being notified, and new jail terms have been introduced for those found attempting to reprogramme stolen handsets. The use of SIM chips allowed stolen …
Bill Ray, 11 Apr 2007

Cybercrooks lurk in shadows of big-name websites

A small team of security researchers has documented how many high-profile websites are unwittingly helping phishing fraudsters. Phishing scams often use "open redirector" exploits on major sites to make their attack URL look more legitimate. The trick also makes it more likely that fraudulent emails that form the basis of …
John Leyden, 12 Dec 2007
graph up

US-only trials for MS anti-phishing toolbar

Microsoft released a test version of an anti-phishing toolbar on Wednesday. Europeans need not apply because the software is only available to US users. That's not because Microsoft reckons scam emails that form the basis of phishing attacks are a US-only problem but because the code is still only in beta, a Microsoft …
John Leyden, 01 Sep 2005
channel

Verisign backs Vista security green streak

The Mozilla Foundation risks losing the browser battle if it fails to keep up with Microsoft by incorporating new security technology into Firefox, a Verisign exec has claimed. According to Verisign product marketing director Tim Callan, the "loose collection of technoanarchists" which make up the open source development …
homeless man with sign

Trusted search software labels fraud site as 'safe'

Digital certificate firm GeoTrust's launch of a search engine with built in trust features this week has been marred by the classification of a phishing site as genuine. Powered by Ask Jeeves, GeoTrust TrustWatch search aims to protect users against fraudulent behaviour and phishing attacks by giving web sites a verification …
John Leyden, 27 Sep 2005

Opinion

Houses of Parliament in night-time

Andrew Orlowski

Come on everybody, let's upload all our stuff into Government by Cloud
Joe Tucci EMC
frustration_anger_irritation_annoyance pain

Felipe Costa

Pressure to perform for stock market bearing down on disties
Columns of coins in the cloud

Michael Cote

Anything that simple to use has got to be complex to set up

Features

Alistair Darling and Alex Salmond debate Scottish independence
You keep the call centres, Hamish, we'll take the banks
Internet of Things
Everyone loves those Things, just not on each others' terms
No email? No CRM? No Daily Mail iPad edition? You need a plan
Sinofsky's hybrid strategy looks dafter than ever