Send Bristol mailing list submissions to
bristol@mailman.lug.org.uk
To subscribe or unsubscribe via the World Wide Web, visit
https://mailman.lug.org.uk/mailman/listinfo/bristol
or, via email, send a message with subject or body 'help' to
bristol-request@mailman.lug.org.uk
You can reach the person managing the list at
bristol-owner@mailman.lug.org.uk
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Bristol digest..."
Today's Topics:
1. LinkedIn - Accounts Hacked (Peter Hemmings)
2. Re: LinkedIn - Accounts Hacked (Keith Edmunds)
3. Re: LinkedIn - Accounts Hacked (Ian Plain)
4. Re: LinkedIn - Accounts Hacked (David Smith)
----------------------------------------------------------------------
Message: 1
Date: Thu, 05 Dec 2013 23:20:12 +0000
From: Peter Hemmings <peter@hemmings.eclipse.co.uk>
To: Bristol and Bath Linux User Group <bristol@mailman.lug.org.uk>
Subject: [bristol] LinkedIn - Accounts Hacked
Message-ID: <52A10A2C.9040209@hemmings.eclipse.co.uk>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Hi,
I just received a LinkedIn email from a french friend asking me to join
her network! I did not accept the invitation!
It looks like ther is a problem:
http://www.thedrum.com/news/2013/12/05/two-million-google-twitter-facebook-and-linkedin-accounts-compromised-hackers
Regards
--
Peter H
------------------------------
Message: 2
Date: Fri, 6 Dec 2013 06:46:41 +0000
From: Keith Edmunds <kae@midnighthax.com>
To: bristol@mailman.lug.org.uk
Subject: Re: [bristol] LinkedIn - Accounts Hacked
Message-ID: <20131206064641.305cc372@ws.the.cage>
Content-Type: text/plain; charset=UTF-8
"Individual users had the malware installed on their machines and had
their passwords stolen?
It's 2013, yet still vendors release operating systems that are
vulnerable. In practically any other industry - bridge building, medicine,
aviation, child care - such an attitude of indifference would be met with
public revulsion, even legal action.
--
"You can't live a perfect day without doing something for someone
who will never be able to repay you."
------------------------------
Message: 3
Date: Fri, 6 Dec 2013 07:39:16 +0000
From: Ian Plain <ian@cyber-cottage.co.uk>
To: Bristol and Bath Linux User Group <bristol@mailman.lug.org.uk>
Subject: Re: [bristol] LinkedIn - Accounts Hacked
Message-ID:
<CAPdamw9UGDBtViDTJ6A3PVJTte+HU3rYV0Y=VVFub2j7h+z8QA@mail.gmail.com>
Content-Type: text/plain; charset="windows-1252"
On Friday, December 6, 2013, Keith Edmunds wrote:
> "Individual users had the malware installed on their machines and had
> their passwords stolen?
>
> It's 2013, yet still vendors release operating systems that are
> vulnerable. In practically any other industry - bridge building, medicine,
> aviation, child care - such an attitude of indifference would be met with
> public revulsion, even legal action.
> --
It's not the OS vendors responsibility when it's users who THEMSELVES
install the malware. It's the users to blame themselves.
> "You can't live a perfect day without doing something for someone
> who will never be able to repay you.
> _______________________________________________
> Bristol mailing list
> Bristol@mailman.lug.org.uk <javascript:;>
> https://mailman.lug.org.uk/mailman/listinfo/bristol
--
Thanks
Ian Plain
http://www.cyber-cottage.co.uk
Twitter @cyberco
Skype ba17sw
The information transmitted is intended only for the entity or person to
whom it is addressed and may contain confidential and/or privileged
material. Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited. If you receive
this in error, please contact the sender and delete the material from any
computer or media on which it resides. Any information statements or
opinions contained in this message (including any attachments) are given by
the author. They are not given on behalf of cyber-cottage.co.uk. This
email is for information purposes only and does not create legal relations
unless confirmed in a letter or facsimile. cyber-cottage.co.uk does not
accept any liability for information not relating to its official business.
cyber-cottage.co.uk takes steps to minimise viruses and other errors but
cannot guarantee that this email is error free.
cyber-cottage.co.ukmonitors email traffic for lawful purposes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20131206/18dcf029/attachment-0001.html>
------------------------------
Message: 4
Date: Fri, 6 Dec 2013 09:34:05 +0000
From: David Smith <Dave.Smith@st.com>
To: <bristol@mailman.lug.org.uk>
Subject: Re: [bristol] LinkedIn - Accounts Hacked
Message-ID: <52A19A0D.9040003@st.com>
Content-Type: text/plain; charset="windows-1252"
On 12/06/13 07:39, Ian Plain wrote:
> On Friday, December 6, 2013, Keith Edmunds wrote:
> It's 2013, yet still vendors release operating systems that are
> vulnerable. In practically any other industry - bridge building,
> medicine,
> aviation, child care - such an attitude of indifference would be met
> with
> public revulsion, even legal action.
>
> It's not the OS vendors responsibility when it's users who THEMSELVES
> install the malware. It's the users to blame themselves.
Not necessarily. It depends on how the malware got installed. If it
used an exploit in the OS then it's the vendor's responsibility; if it
was something that the user installed then the blame is obviously on the
user.
------------------------------
_______________________________________________
Bristol mailing list
Bristol@mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/bristol
End of Bristol Digest, Vol 528, Issue 6
***************************************
Tidak ada komentar:
Posting Komentar