Ian G <[EMAIL PROTECTED]> writes:
> There is a philosophical problem with suggesting an automated protocol
> method for reporting fraud, in that one might be better off ... fixing
> the underlying fraud.
Lets say you're a big company like Amazon or someone similar. You're
pretty sure someone is t
Alex Alten wrote:
Great. What next? I guess air-gap transfer of flash memory might be
the best solution.
Malware's new infection route: photo frames
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2008/01/26/MNE7UHOOQ.DTL
For starters, you can turn off the "feature" that auto-runs cod
[adding Cc: p2p-hackers and cryptography mailing lists as explained
below; Please trim your follow-ups as appropriate.]
Dear Gary Sumner:
On Jan 26, 2008, at 9:44 PM, Gary Sumner wrote:
I was researching on the weekend and came across Tahoe…very
exciting and can’t wait to delve in and under
Great. What next? I guess air-gap transfer of flash memory might be the
best solution.
Malware's new infection route: photo frames
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2008/01/26/MNE7UHOOQ.DTL
- Alex
--
Alex Alten
[EMAIL PROTECTED]
--
Perry E. Metzger wrote:
This evening, a friend of mine who shall remain nameless who works for
a large company that regularly processes customer credit card payments
informed me of an interesting fact.
His firm routinely discovers attempted credit card fraud. However,
since there is no way for t
At 10:24 -0500 26.01.2008, Perry E. Metzger wrote:
"Wikileaks has released documents from the German police revealing
Skype interception technology. The leaks are currently creating a
storm in the German press[...]"
I've skimmed some of the coverage and I can't help but think that
John Ioannidis wrote:
Perry E. Metzger wrote:
That's not practical. If you're a large online merchant, and your
automated systems are picking up lots of fraud, you want an automated
system for reporting it. Having a team of people on the phone 24x7
talking to your acquirer and reading them cred