<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <br>
    <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style><head>
  <style></style>
    <table class="backgroundTable" width="100%" bgcolor="#ffffff"
      cellpadding="0" cellspacing="0">
      <tbody>
        <tr>
          <td valign="top" align="left">
            <table cellpadding="0" cellspacing="0">
              <tbody>
                <tr>
                  <td style="border-top: 0px solid rgb(0, 0, 0);
                    border-bottom: 1px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 255); text-align:
                    center;" align="center"><span style="font-size:
                      10px; color: rgb(96, 96, 96); line-height: 200%;
                      font-family: verdana; text-decoration: none;">Email
not
                      displaying correctly? <a
                        href="http://www.oplin.org/4cast/"
                        style="font-size: 10px; color: rgb(0, 0, 255);
                        line-height: 200%; font-family: verdana;
                        text-decoration: none;">View
                        it in your browser.</a></span></td>
                </tr>
                <tr>
                  <td style="border-top: 0px solid rgb(51, 51, 51);
                    border-bottom: 0px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 255);">
                    <center><a href=""><img id="editableImg1"
                          src="cid:part2.07060900.07090503@oplin.org"
                          title="OPLIN" alt="OPLIN 4Cast" border="0"
                          align="middle"></a></center>
                  </td>
                </tr>
              </tbody>
            </table>
            <table style="width: 763px; height: 877px;"
              bgcolor="#ffffff" cellpadding="20" cellspacing="0">
              <tbody>
                <tr>
                  <td style="font-size: 12px; color: rgb(0, 0, 0);
                    line-height: 150%; font-family: trebuchet ms;"
                    valign="top"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg"
                    bgcolor="#ffffff">
                    <p><!-- Make sure you modify the 4Cast title in this section -->
                      <span style="font-size: 20px; font-weight: bold;
                        color: rgb(0, 0, 0); font-family: arial;
                        line-height: 110%;">OPLIN 4Cast #300:
                        Threatening innovations</span><br>
                      <!-- Make sure you modify the date of the 4Cast in this section -->
                      <span style="font-size: 11px; font-weight: normal;
                        color: rgb(102, 102, 102); font-style: italic;
                        font-family: arial;">September 19th, 2012</span></p>
                    <!-- Begin copy of Web Source here  -->
                    <p style="text-align: justify;font-size: 16px;
                      font-family: arial; line-height: 110%;"><img
                        class="alignleft size-full wp-image-3078"
                        title="malware"
                        src="cid:part4.04060507.09050901@oplin.org"
                        alt="" width="125" height="93">You have to
                      admit, the people who try to take over your
                      computer or steal your private information for
                      their own shady purposes are undoubtedly
                      inventive. It seems as if every month they develop
                      at least one surprising new major exploit of
                      computers and the Internet, and recently they have
                      been <a
href="http://www.securityweek.com/mcafee-sees-biggest-increase-malware-attacks-last-four-years">more
                        active</a> than they have been for years. We're
                      seeing news stories about routers turned into
                      botnet clients, government-built viruses (just who
                      are the good guys?), and new PCs shipped
                      pre-infected with malware. And what the heck is a
                      UDID anyway?
                    </p>
                    <div> </div>
                    <ul style="text-align: left;">
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://www.securityweek.com/router-botnets-are-more-reality-you-think">Router
                          botnets are more of a reality than you think</a>
                        (SecurityWeek/Steve Ragan) "Unfortunately, those
                        are just some of the ways to maliciously flash a
                        router without anyone being the wiser. Updated
                        firmware (as in ensuring the device is current
                        on the latest version) can help in some cases
                        but not all, as attacks that target retained
                        settings within the device's memory can still
                        lead to compromise. In the end, using an open
                        router within an active SOHO [Small Office/Home
                        Office] environment will come down to risk
                        tolerance. If the business is ok with the risk,
                        no need to worry."</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://www.reuters.com/article/2012/09/17/usa-security-viruses-idUSL1E8KEJBV20120917">Cyber
                          clues link U.S. to new computer viruses</a>
                        (Reuters/Jim Finkle) "The United States has
                        already been linked to the Stuxnet Trojan that
                        attacked Iran's nuclear program in 2010 and the
                        sophisticated Flame cyber surveillance tool that
                        was uncovered in May. Anti-virus software makers
                        Symantec Corp of the United States and Kaspersky
                        Lab of Russia disclosed on Monday that they have
                        found evidence that Flame's operators may have
                        also worked with three other viruses that have
                        yet to be discovered."</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://blogs.technet.com/b/microsoft_blog/archive/2012/09/13/microsoft-disrupts-the-emerging-nitol-botnet-being-spread-through-an-unsecure-supply-chain.aspx">Microsoft
                          disrupts the emerging Nitol botnet being
                          spread through an unsecure supply chain</a>
                        (Official Microsoft Blog/Richard Domingues
                        Boscovich) "The discovery and successive action
                        against the Nitol botnet stemmed from a
                        Microsoft study looking into unsecure supply
                        chains. The study confirmed that cybercriminals
                        preload malware infected counterfeit software
                        onto computers that are offered for sale to
                        innocent people. In fact, twenty percent of the
                        PCs researchers bought from an unsecure supply
                        chain were infected with malware."</li>
                      <li style="text-align: justify; font-size: 16px;
                        font-family: arial; line-height: 110%;"><a
href="http://arstechnica.com/apple/2012/09/ask-ars-whats-the-big-deal-with-iphone-udids/">What's
                          the big deal with iPhone UDIDs?</a> (Ars
                        Technica/Chris Foresman) "The UDID [Unique
                        Device Identifier] could be used as a sort of
                        'anonymized' token. However, many developers
                        connected a UDID with users' real names, user
                        names, passwords, location, or other data. While
                        the UDID alone would be of little use to hackers
                        or identity thieves, network snoopers could
                        correlate these UDIDs with other data gleaned
                        from multiple apps, which privacy advocates
                        believe is plenty to home in on a particular
                        person."</li>
                    </ul>
                    <div style="text-align: left;"> </div>
                    <p style="text-align: left; font-size: 20px;
                      font-family: arial; line-height: 110%;"><small><strong><em>Malware
                            fact:</em></strong></small><br>
                    </p>
                    <div style="text-align: justify; font-size: 16px;
                      font-family: arial; line-height: 110%;">According
                      to <a
href="http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2012.pdf">McAfee
                        Labs</a> [pdf], more than eight million new
                      kinds of malware were launched in the second
                      quarter of 2012.
                    </div>
                    <div style="text-align: left;"> </div>
                    <!-- End paste of web source here --> </td>
                </tr>
                <tr>
                  <td style="" solid="" background-color:="" rgb(255,=""
                    255,="" 255);="" >="" valign="top" width="760"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg"><span
                      style="font-size: 10px; color: rgb(96, 96, 96);
                      line-height: 100%; font-family: verdana;">
                      <hr><!-- Begin standard subscription verbiage -->
                      <div style="text-align: justify;">The <strong><em>OPLIN
                            4cast</em></strong>
                        is a weekly compilation of
                        recent headlines, topics, and trends that could
                        impact public
                        libraries. You can subscribe to it in a variety
                        of ways, such as: <br>
                      </div>
                      <div style="text-align: left;"> </div>
                      <ul>
                        <li style="text-align: justify;"><strong>RSS
                            feed.</strong>
                          You
                          can receive the OPLIN 4cast
                          via RSS feed by subscribing to the following
                          URL:
                          <a class="moz-txt-link-freetext" href="http://www.oplin.org/4cast/index.php/?feed=rss2">http://www.oplin.org/4cast/index.php/?feed=rss2</a>.
                        </li>
                        <li style="text-align: justify;"><strong>Live
                            Bookmark.</strong>
                          If you're using the Firefox
                          web browser, you can go to the 4cast website
                          (<a class="moz-txt-link-freetext" href="http://www.oplin.org/4cast/">http://www.oplin.org/4cast/</a>) and click on the
                          orange "radio wave" icon
                          on the right side of the address bar. In
                          Internet Explorer 7, click on
                          the same icon to view or subscribe to the
                          4cast RSS feed. </li>
                        <li style="text-align: justify;"><strong>E-mail.</strong>
                          You
                          can have the OPLIN 4cast
                          delivered via e-mail (a'la OPLINlist and
                          OPLINtech) by subscribing to
                          the 4cast mailing list at
                          <a class="moz-txt-link-freetext" href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>.
                        </li>
                      </ul>
                    </span> </td>
                </tr>
                <tr>
                  <td style="border-top: 0px solid rgb(255, 255, 255);
                    background-color: rgb(255, 255, 204);" valign="top"
                    width="760"
background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg">
                    <br>
                  </td>
                </tr>
              </tbody>
            </table>
          </td>
        </tr>
      </tbody>
    </table>
    <title>OPLIN 4Cast</title>
    <style>
 .headerTop { background-color:#FFFFFF; border-top:0px solid #000000; border-bottom:1px solid #FFFFFF; text-align:center; }
 .adminText { font-size:16px; color:#0000FF; line-height:200%; font-family:verdana; text-decoration:none; }
 .headerBar { background-color:#FFFFFF; border-top:0px solid #333333; border-bottom:0px solid #FFFFFF; }
 .title { font-size:20px; font-weight:bold; color:#000000; font-family:arial; line-height:110%; }
 .subTitle { font-size:11px; font-weight:normal; color:#000000; font-style:italic; font-family:arial; }
 .defaultText { font-size:12px; color:#000000; line-height:150%; font-family:trebuchet ms; }
 .footerRow { background-color:#FFFFCC; border-top:0px solid #FFFFFF; }
 .footerText { font-size:10px; color:#996600; line-height:100%; font-family:verdana; }
 a { color:#0000FF; color:#0000FF; color:#0000FF; }
  </style>
  </body>
</html>