<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style><head>

  <style></style>
    <title>OPLIN 4Cast</title>
    <style>

 .headerTop { background-color:#FFFFFF; border-top:0px solid #000000; border-bottom:1px solid #FFFFFF; text-align:center; }

 .adminText { font-size:16px; color:#0000FF; line-height:200%; font-family:verdana; text-decoration:none; }

 .headerBar { background-color:#FFFFFF; border-top:0px solid #333333; border-bottom:0px solid #FFFFFF; }

 .title { font-size:20px; font-weight:bold; color:#000000; font-family:arial; line-height:110%; }

 .subTitle { font-size:11px; font-weight:normal; color:#000000; font-style:italic; font-family:arial; }

 .defaultText { font-size:12px; color:#000000; line-height:150%; font-family:trebuchet ms; }

 .footerRow { background-color:#FFFFCC; border-top:0px solid #FFFFFF; }

 .footerText { font-size:10px; color:#996600; line-height:100%; font-family:verdana; }

 a { color:#0000FF; color:#0000FF; color:#0000FF; }

  </style>
    <table class="backgroundTable" bgcolor="#ffffff" cellpadding="0"
      cellspacing="0" width="100%">
      <tbody>
        <tr>
          <td align="left" valign="top">
            <table cellpadding="0" cellspacing="0">
              <tbody>
                <tr>
                  <td style="border-top: 0px solid rgb(0, 0, 0);
                    border-bottom: 1px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 255); text-align:
                    center;" align="center"><span style="font-size:
                      10px; color: rgb(96, 96, 96); line-height: 200%;
                      font-family: verdana; text-decoration: none;">Email

not
                      displaying correctly? <a
                        href="http://www.oplin.org/4cast/"
                        style="font-size: 10px; color: rgb(0, 0, 255);
                        line-height: 200%; font-family: verdana;
                        text-decoration: none;">View
                        it in your browser.</a></span></td>
                </tr>
                <tr>
                  <td style="border-top: 0px solid rgb(51, 51, 51);
                    border-bottom: 0px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 255);">
                    <center><a href=""><img id="editableImg1"
                          src="cid:part1.08040202.01060701@oplin.org"
                          title="OPLIN" alt="OPLIN 4Cast" align="middle"
                          border="0"></a></center>
                  </td>
                </tr>
              </tbody>
            </table>
            <table style="width: 763px; height: 877px;"
              bgcolor="#ffffff" cellpadding="20" cellspacing="0">
              <tbody>
                <tr>
                  <td style="font-size: 12px; color: rgb(0, 0, 0);
                    line-height: 150%; font-family: trebuchet ms;"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg"
                    bgcolor="#ffffff" valign="top">
                    <p><!-- Make sure you modify the 4Cast title in this section -->
                      <span style="font-size: 20px; font-weight: bold;
                        color: rgb(0, 0, 0); font-family: arial;
                        line-height: 110%;">OPLIN 4Cast #265:
                        Innovations in cyber crime</span><br>
                      <!-- Make sure you modify the date of the 4Cast in this section -->
                      <span style="font-size: 11px; font-weight: normal;
                        color: rgb(102, 102, 102); font-style: italic;
                        font-family: arial;">January 18th, 2012</span></p>
                    <!-- Begin copy of Web Source here  -->
                    <p style="text-align: justify; font-size: 16px;
                      font-family: arial; line-height: 110%;"><a
                        href="http://www.oplin.org/4cast/wp-content/uploads/2012/01/spyware.jpg"><img
                          class="alignleft wp-image-2479"
                          style="margin-right: 4px;" title="spyware"
                          src="cid:part2.03040109.06090707@oplin.org"
                          alt="" height="68" width="67"></a>Malicious
                      attacks on websites continue to make the news.
                      Whether it's Anonymous <a
href="http://www.infoworld.com/d/security/anonymous-publishes-israeli-scada-log-in-details-183975">exposing
                        a whole country's</a> control and data systems
                      or hackers stealing huge amounts of data <a
href="http://www.pcworld.com/businesscenter/article/248244/zappos_hacked_what_you_need_to_know.html">last
                        weekend from Zappos</a>, the pace of malicious
                      activity on the web has certainly not slowed down.
                      While these big-news attacks generally use rather
                      traditional hacking methods, the nasty people on
                      the web have also been busy developing new attack
                      vectors, and you might want to be aware of them.
                    </p>
                    <div> </div>
                    <ul style="text-align: left;">
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
                          href="http://www.securitynewsdaily.com/fake-apps-android-market-1407/">Developer
                          sneaks fake apps into Android market</a>
                        (SecurityNewsDaily/Matt Liebowitz) "Behind their
                        innocent facade, the cloned apps hid a secret
                        weapon - they compromised customers' smartphones
                        by using them to send premium-rate text messages
                        to the tune of about $20. 'The texts are
                        notifications that the user has been charged
                        around $5, but you end up getting 3-4 of them in
                        one shot,' DroidGamers wrote. 'A free download
                        just became a $20 purchase.'"</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
                          href="http://www.bbc.co.uk/news/technology-16576542">Hackers
                          spread malware via children's gaming websites</a>
                        (BBC News) "'I believe that children's computers
                        are more vulnerable to attacks because they are
                        usually in worse shape - in other words the
                        owners are less likely to have the latest
                        security updates installed,' said Mr Vlcek
                        [AVAST Software chief technical officer]. 'The
                        child may also be less suspicious that something
                        wrong is happening than an adult would be.'"</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://www.securityweek.com/cyber-criminals-target-mobile-devices-qr-codes">Cyber-criminals
                          target mobile devices with QR codes</a>
                        (SecurityWeek/Brian Prince) "'This is the first
                        time we have seen a QR code used in an active
                        spam campaign,' Patrik Runald, senior manager of
                        security research at Websense, told <em>SecurityWeek</em>.
                        'Because QR codes are the ultimate URL
                        obfuscator, with the right social lure, QR codes
                        can become increasingly more successful in
                        driving users to websites hosting malware
                        targeting the mobile device.'"</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://www.huffingtonpost.com/2011/11/29/security-flaw-in-printers_n_1119558.html">Security
                          flaw in printers could expose businesses to
                          hackers</a> (Huffington Post/Janean Chun)
                        "Keith Moore, HP's chief technologist, also
                        disagrees that the threat of security breaches
                        through printer hacking could already be
                        widespread. Moore points out that the
                        researchers didn't use passwords on the printers
                        they tested and adds that no consumers have
                        reported similar incidents. 'There has been no
                        data at all that any of this has been exploited.
                        So we're looking at the theoretic possibility,
                        in a lab, to see if that can ever occur in a
                        real world situation.'"</li>
                    </ul>
                    <div style="text-align: left;"> </div>
                    <p style="text-align: left; font-size: 20px;
                      font-family: arial; line-height: 110%;"><small><strong><em>Cyber
                            attack fact:</em></strong></small><br>
                    </p>
                    <div style="text-align: justify; font-size: 16px;
                      font-family: arial; line-height: 110%;">This
                      sobering <a
href="http://www.youtube.com/watch?feature=player_embedded&amp;v=CS01Hmjv1pQ">11-minute
                        video</a> of a TED talk by Ralph Langner reminds
                      us that cyber attacks may not always come from
                      criminals.
                    </div>
                    <div style="text-align: left;"> </div>
                    <!-- End paste of web source here --> </td>
                </tr>
                <tr>
                  <td style="" solid="" background-color:="" rgb(255,=""
                    255,="" 255);="" &gt;=""
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg"
                    valign="top" width="760"><span style="font-size:
                      10px; color: rgb(96, 96, 96); line-height: 100%;
                      font-family: verdana;">
                      <hr><!-- Begin standard subscription verbiage -->
                      <div style="text-align: justify;">The <strong><em>OPLIN
                            4cast</em></strong>
                        is a weekly compilation of
                        recent headlines, topics, and trends that could
                        impact public
                        libraries. You can subscribe to it in a variety
                        of ways, such as: <br>
                      </div>
                      <div style="text-align: left;"> </div>
                      <ul>
                        <li style="text-align: justify;"><strong>RSS
                            feed.</strong>
                          You
                          can receive the OPLIN 4cast
                          via RSS feed by subscribing to the following
                          URL:
                          <a class="moz-txt-link-freetext" href="http://www.oplin.org/4cast/index.php/?feed=rss2">http://www.oplin.org/4cast/index.php/?feed=rss2</a>.
                        </li>
                        <li style="text-align: justify;"><strong>Live
                            Bookmark.</strong>
                          If you're using the Firefox
                          web browser, you can go to the 4cast website
                          (<a class="moz-txt-link-freetext" href="http://www.oplin.org/4cast/">http://www.oplin.org/4cast/</a>) and click on the
                          orange "radio wave" icon
                          on the right side of the address bar. In
                          Internet Explorer 7, click on
                          the same icon to view or subscribe to the
                          4cast RSS feed. </li>
                        <li style="text-align: justify;"><strong>E-mail.</strong>
                          You
                          can have the OPLIN 4cast
                          delivered via e-mail (a'la OPLINlist and
                          OPLINtech) by subscribing to
                          the 4cast mailing list at
                          <a class="moz-txt-link-freetext" href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>.
                        </li>
                      </ul>
                    </span> </td>
                </tr>
                <tr>
                  <td style="border-top: 0px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 204);"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg"
                    valign="top" width="760"> <br>
                  </td>
                </tr>
              </tbody>
            </table>
          </td>
        </tr>
      </tbody>
    </table>
  </body>
</html>