<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2900.6357" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hello all</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>Excellent episode of the Check Out (Ep 4 ABC Thurs
11 April 8pm) at iView <A
href="http://www.abc.net.au/iview/#/program/32372">http://www.abc.net.au/iview/#/program/32372</A></FONT></DIV>
<DIV><FONT face=Arial size=2>about 17 minutes in.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>Looking at how data mining is able to target us,
how good it is getting, and where the data comes from.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>Regards</FONT></DIV>
<DIV><FONT face=Arial size=2>Robert T-A</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<BLOCKQUOTE
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
<A title=mark@vceit.com href="mailto:mark@vceit.com">Mark</A> </DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A title=itapps@edulists.com.au
href="mailto:itapps@edulists.com.au">Year 12 IT Applications Teachers' Mailing
List</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Tuesday, April 16, 2013 1:59
PM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> Re: [Year 12 IT Apps] (no
subject)</DIV>
<DIV><BR></DIV>
<DIV dir=ltr>Hi Jackson.
<DIV>I'd guess the main technique would be phishing - the human is always the
quickest and easiest weak link in any technological security chain, and some
modern phishing can be VERY convincing (e.g. embedding attack code into a
legitimate webpage.)</DIV>
<DIV><BR></DIV>
<DIV>Why Yahoo? I'd say it was purely return on investment due to bulk
targets. Attack the sites with the maximum number of potential victims... the
same logic is used by virus/worm writers who attack Windows instead of Mac and
Linux (leading Mac users to crow smugly and erroneously about their perceived
invulnerability: it's just that the Mac userbase has not until recently been
big enough to justify good hacking time.) </DIV>
<DIV><BR></DIV>
<DIV>And maybe Yahoo's creaking old infrastructure is weak and more easily
breached? Let's see what Marissa does about it.</DIV>
<DIV><BR></DIV>
<DIV>Cheers</DIV>
<DIV>Mark</DIV>
<DIV class=gmail_extra><BR><BR>
<DIV class=gmail_quote>On 16 April 2013 12:52, Jackson Bates <SPAN
dir=ltr><<A href="mailto:bates.j@wcc.vic.edu.au"
target=_blank>bates.j@wcc.vic.edu.au</A>></SPAN> wrote:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Oh
wiser ones,<BR><BR>I'm not much of a security buff, so I'm interested: what
are the various methods spammers and crooks use to infiltrate our email
addresses?<BR><BR>My guesses are brute-force / dictionary attacks (but I
imagine yahoo et al. block repeated guesses or use captcha), phishing,
malware/Trojans (not sure what these would do - capture
keystrokes?).<BR><BR>And do <A href="http://www.seller-service.com/"
target=_blank>http://www.seller-service.com/</A> (for example) know they are
hosting whatever resides at '/qlsnthcd/1tni5/gyqid3oo/x71m/1695jqh' or has
it been snuck on to their server (and again, how? SQL injection leading to
access to admin panel?)<BR><BR>Slightly off-topic, but loosely relevant to
U4O2...and asking here means I don't spend the rest of the afternoon
Googling it :)<BR><BR>Aside: Why does it always seem to be
Yahoo?<BR><BR>Thanks for anything that abates my curiousity,<BR><BR>Jackson
Bates<BR>Waverley Christian College<BR><BR><BR></BLOCKQUOTE></DIV>
<DIV dir=ltr>--
<DIV>Mark Kelly</DIV>
<DIV>mark AT vceit DOT com</DIV>
<DIV><A href="http://vceit.com" target=_blank>http://vceit.com</A></DIV>
<DIV><BR></DIV></DIV></DIV></DIV>
<P>
<HR>
<P></P>_______________________________________________<BR>http://www.edulists.com.au
- FAQ, resources, subscribe, unsubscribe<BR>IT Applications Mailing List
kindly supported
by<BR>http://www.vcaa.vic.edu.au/vce/studies/infotech/itapplications3-4.html -
Victorian Curriculum and Assessment Authority
<br><BR>http://www.vitta.org.au - VITTA Victorian Information
Technology Teachers Association Inc
<br><BR>http://www.swinburne.edu.au/ict/schools - Swinburne
University</BLOCKQUOTE></BODY></HTML>