Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] box.net



> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
> bounces+blu=nedharvey.com at blu.org] On Behalf Of Matthew Gillen
> 
> It's possible that your email address was unintentionally leaked,
> although in the case of the bank, that is much scarier than the other
> explanation (that the bank sold your info to spammers).

Actually, the story behind Citizens Bank was:  When I was new in the
neighborhood at a former residence, I went to the bank to open a new
checking account, and I forgot my new home address.  I mistakenly gave them
the wrong address, a street number which didn't exist, 7 houses away from my
actual house.  The post office was smart enough and friendly enough to
always deliver mail addressed to 320 South Rd, although I lived at 313.
Unfortunately, they never delivered anything addressed to 320 that I
actually wanted to receive.  ;-)

After posting this message about box.net, I got another reply from another
user, who referenced the following:
http://community.box.com/boxnet/topics/after_joining_box_net_my_email_addres
s_is_getting_spammed

I replied with the following:

I agree that box.net, like any other reputable company, isn't going to
underhandedly disclose information like this to spammers.  However, I've
witnessed enough scenarios where some hackers implanted a virus into a GIF
or a JPG or whatever at yahoo, or similar sites...  I believe most likely,
the *actual* cause of the problem here is...  Either box.net as a whole, or
some individuals in the company, or just one of their servers use hacked up
laptops with viruses and junk in them.  They think they have it under
control (as most people do) but ...

Last I knew, the antivirus/antimalware business was a $4b industry.  And
credit fraud/identity theft was a $40b industry.  The job of the bad guys is
to find any unknown or unfixed vulnerability, and exploit it.  The job of
the good guys is to prevent *every* such possible attack.  The bad guys make
their money by stealing from you, or stealing from somebody else on your
behalf.  The good guys must convince you to voluntarily pay them for
protection before you get something bad.  Most users think antivirus should
be free (and consequently don't pay.)  Most users run some kind of
antivirus, but even after their antivirus fails them, they still just use
antivirus and antimalware, thinking they'll be able to clean it out after
the infestation.

Long story short, the good guys are losing.  And when the good guys are
losing, the best strategy is to retreat.

This means...  Yes, you should run antivirus and stuff, but you should not
rely on it.  The only suitable defense is good backups.  At the first sign
of any virus or any junk on your computer, simply nuke the whole thing back
to yesterday.  It's the only strategy that works, but unfortunately, it only
works if you prepared in advance.  Which most people don't do.

In the many, many times that I've helped somebody rid their computer of some
kind of infestation...  99% of the time it's a failure.  The bad guys are
smarter, more motivated than the good guys.  Even if you successfully clean
it, they put hooks in that just immediately re-infest you.

The discussion you referenced is dated seven months ago.  In the last 7
months, they have had plenty of time to get their act straight.  If they
didn't do it yet, I don't believe they will ever be successful.  Not because
they don't care, but because they just don't know how.   It represents a lot
of work, to clean their systems, or they don't know how or which systems
need to be cleaned.




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org