The Internet Patrol default featured image
Continue Reading

Federal Law Enforcement Announces Operation D-Elite, Takes Down Elite Torrents (News Release)

WASHINGTON, D.C. – Acting Assistant Attorney General John C. Richter of the Criminal Division, Homeland Security Assistant Secretary for Immigration and Customs Enforcement Michael J. Garcia, and Assistant Director Louis M. Reigel of the FBI’s Cyber Division today announced the first criminal enforcement action targeting individuals committing copyright infringement on…

The Internet Patrol default featured image
Continue Reading

Use Encryption – Go to Jail (And Watch that Search History Too!)

Just when you thought that the state of the law with regards to the Internet couldn’t get any more convoluted, a Minnesota appeals court has held that a defendant’s use of the PGP (Pretty Good Privacy) program can be admitted as evidence against someone accused of Internet wrongdoing. The case…

The Internet Patrol default featured image
Continue Reading

Stanford Computer System Hacked – Personal Information of Thousands Compromised

Stanford University has joined that special inner circle – no, not the top tier schools – those which have had their computer systems hacked and data compromised. Earlier this month a hacker broke in to the Stanford Career Development Center’s computer, compromising the personal information of nearly 10,000 individuals, including…

The Internet Patrol default featured image
Continue Reading

The Plague of the Zombies – An Open Letter from the FTC to ISPs and Networks

An Open Letter from the Federal Trade Commission to ISPs and Network Professionals: Dear Network professionals: We are writing on behalf of an international group of government agencies to request that your organization join a worldwide effort to prevent spammers from compromising consumers’ computers and using them as “spam zombies.â€?…

The Internet Patrol default featured image
Continue Reading

Federal Anti Spyware Law to Become a Reality

The nation is one step closer to having a Federal anti-spyware law, and all odds point to it becoming a reality before the year is out. At this very moment the House is working with two proposed anti-spyware laws, I-SPY (the Internet Spyware Prevention Act of 2005), and the SPY…

The Internet Patrol default featured image
Continue Reading

Bank of America Announces Industry-Leading Security Feature for Its Customers

Aunty’s bank has this system in place. It’s a pain in the neck, but a good way to be sure that you are actually at your bank’s website. Of course, it requires you to remember what the extra image and phrase are, but, again, it’s a good way to ensure…

The Internet Patrol default featured image
Continue Reading

TiVo Inc.to Web Broadcast Its Earnings Report

You gotta hand it to Tivo – they are always hip! This just came across Aunty’s newsdesk, just in case any of you are interested: TiVo Inc. Invites You to Join Its First Quarter Fiscal Year 2006 Conference Call and Webcast (News Release) ALVISO, Calif., May 16 /PRNewswire-FirstCall/ — TiVo…

The Internet Patrol default featured image
Continue Reading

Website Outs Private Information of Public Officials to Demonstrate Privacy Problem

Most of us are concerned about Internet privacy, or the lack thereof, but Betty “BJ” Ostergren is doing something about it. Ostergren maintains a webpage which outs the private personal information of public officials – all of which is available to anyone with an Internet connection and a clue –…

The Internet Patrol default featured image
Continue Reading

Internet Check Services Let Anyone Write Fraudulent Checks on Your Checking Account!

Do you know what a “demand draft” is? If you’ve ever received an electronically-generated check which had “Your depositor has authorized this payment to payee” on it, or “signature not required” in place of the signature, then you’ve received a demand draft, or “remotely created check”. If you’ve ever used…

online computer extortion blackmail
Continue Reading

Internet Infection Holds Your Files Hostage for Ransom – On Your Own Computer!

Federal authorities are investigating what they have dubbed an “Internet infection” which holds personal computer files hostage for ransom. This Internet infection is the first known instance of a virus or other malware which gets onto your computer, locks up your files, and then leaves behind a digital ransom note demanding $200 if you ever want to see your files again.

suretmail logo
Continue Reading

Deleting Email Leads to $1.45billion Judgement Against Company

Employees at Morgan Stanley may think twice before they delete their email, after a judge slapped a $1.45billion judgement on the financial giant because they just hit delete.

The Internet Patrol default featured image
Continue Reading

Real Examples of Pirated Websites

Don’t believe that pirated website content is really a problem? Can’t imagine that anyone would really steal somebody else’s website look, feel, or content? Well, think again, because it’s real, and it happens. But don’t take Aunty’s word for it. Because there is a website out there which is devoted…

The Internet Patrol default featured image
Continue Reading

Biggest Bank Breach Beleaguers Bank of America, Others

In what may be the biggest leak of personal data to date, police are reporting that a whopping 676,000 bank customers have had their personal information stolen from Bank of America, Wachovia, Commerce Bancorp, and PNC Financial Services. B of A has already notified over 60,000 customers that their confidential…

suretmail logo
Continue Reading

Institute for Social Internet Public Policy Advises Companies to Avoid Legal Trouble with Strong Email Handling Policies

The Institute for Social Internet Public Policy (ISIPP) is advising companies to take the $1.45billion email mismanagement judgement recently announced against Morgan Stanley as a wake-up call.

The Internet Patrol default featured image
Continue Reading

Internet Vigilantes Hack and Deface Phishing Sites

Groups and individuals being dubbed as Internet vigilantes are taking matters into their own hands when it comes to phishers and their phishy sites, and are using their hacking powers for good (they would argue) by hacking into phishing sites and defacing and mutilating them in some fashion so as…