Copy Link
Add to Bookmark
Report

Atari Online News, Etc. Volume 07 Issue 39

eZine's profile picture
Published in 
Atari Online News Etc
 · 5 years ago

  

Volume 7, Issue 39 Atari Online News, Etc. September 23, 2005


Published and Copyright (c) 1999 - 2005
All Rights Reserved

Atari Online News, Etc.
A-ONE Online Magazine
Dana P. Jacobson, Publisher/Managing Editor
Joseph Mirando, Managing Editor
Rob Mahlert, Associate Editor


Atari Online News, Etc. Staff

Dana P. Jacobson -- Editor
Joe Mirando -- "People Are Talking"
Michael Burkley -- "Unabashed Atariophile"
Albert Dayes -- "CC: Classic Chips"
Rob Mahlert -- Web site
Thomas J. Andrews -- "Keeper of the Flame"


With Contributions by:




To subscribe to A-ONE, change e-mail addresses, or unsubscribe,
log on to our website at: www.atarinews.org
and click on "Subscriptions".
OR subscribe to A-ONE by sending a message to: dpj@atarinews.org
and your address will be added to the distribution list.
To unsubscribe from A-ONE, send the following: Unsubscribe A-ONE
Please make sure that you include the same address that you used to
subscribe from.

To download A-ONE, set your browser bookmarks to one of the
following sites:

http://people.delphiforums.com/dpj/a-one.htm
http://www.icwhen.com/aone/
http://a1mag.atari.org
Now available:
http://www.atarinews.org


Visit the Atari Advantage Forum on Delphi!
http://forums.delphiforums.com/atari/



=~=~=~=



A-ONE #0739 09/23/05

~ Debate Over ID Theft! ~ People Are Talking! ~ More Trojans Erupt!
~ Cyber Cons Not Vandals ~ Google Tests Copyright ~ Paypal Hit By Snafu!
~ New AOL Antispyware! ~ New Worm Spoofs Google ~ Jeeves Gets Fired!
~ Microsoft EU Concerns! ~ EU Won't Regulate Net! ~ Opera Abandons Ads!

-* Atari Brings Back Bygone Era *-
-* Cyber Cons Are Now Behind Viruses! *-
-* Mac Users Are Nonchalant Over Security! *-



=~=~=~=



->From the Editor's Keyboard "Saying it like it is!"
""""""""""""""""""""""""""



Well, it's official, summer is gone. It certainly doesn't feel like it,
thankfully. It's hard to believe that another season has come and gone.
And, I just got another year older. What's this world coming to?! Another
massive hurricane is about to hit the gulf coast again, but hopefully not
the eastern portion. How these people could possibly go through more
disaster is beyond me.

Well, I don't have much to say this week, so let's move on to more less
serious topics.

Until next time...



=~=~=~=



PEOPLE ARE TALKING
compiled by Joe Mirando
joe@atarinews.org



[Editor's note: Being "under the weather" seems to be taking hold across the
country lately. Our People Are Talking" column will resume next week as Joe
recovers from an illness.]



=~=~=~=



->In This Week's Gaming Section - Metal Gear Solid 3!
""""""""""""""""""""""""""""" Dragon Quest VIII!
Wild Arms 4!
And much more!



=~=~=~=



->A-ONE's Game Console Industry News - The Latest Gaming News!
""""""""""""""""""""""""""""""""""



Metal Gear Solid 3: Subsistence


Metal Gear Solid 3: Subsistence is the enhanced edition of the smash-hit
action game Metal Gear Solid 3: Snake Eater, including all-new game modes
such as the long-awaited addition of online gameplay, new duel mode,
different camera perspectives, a demo theater mode and the original Metal
Gear and Metal Gear 2: Solid Snake games. Subsistence will draw gamers
deeper into the world of Metal Gear Solid 3, with its immersive new content
and action-packed gameplay.

For the first time in the history of the Metal Gear franchise, the game now
provides an online gameplay environment. In the new "Online Mode", gamers
can choose their mission and rules, including "Team Battle" and "Snake and
Enemy" (one person becomes Snake and the other person blocks out his
mission), and then fight it out online. This new mode also brings the
classic Metal Gear Solid combat elements into online play, such as the
"Close Quarters Combat (CQC)" proximity encounters, stealth and sniping.

Metal Gear Solid 3: Subsistence has also added the option of the "Third
Person View Camera" for every stage of the game. This wider field of vision
and complete freedom of movement brings an incredible sense of realism to
the game. Gamers will have an easier time spotting enemies on-screen and
preparing for their next stealth maneuver.

Metal Gear Solid 3: Subsistence also contains the original versions of
Metal Gear and Metal Gear 2: Solid Snake that were previously released only
in Japan for the MSX2 game console. These titles, based on the concept of
infiltrating the enemy base using stealth tactics, rather than eliminating
all of your enemies, were an innovative take on the action genre, proposing
an entirely new approach to gameplay. Metal Gear Solid 3 is set in the
1960's, before the events of the MSX2 titles. Bringing Metal Gear and Metal
Gear 2: Solid Snake to the PlayStation2 computer entertainment system gives
gamers more information about the storyline in what happens following the
events of Metal Gear Solid 3.

New stages have also been added to the popular "Snake vs. Monkey" mode
(staring Snake and the beloved Ape Escape monkeys). Players who complete
the entire game will also unlock a variety of new modes, including "Duel
Mode" (a mode that allows gamers to replay all boss battles), and "Demo
Theater" (where gamers can alter Snake's face paint and camouflage, and
view movies starring their own unique Snake character).



Genji: Dawn of the Samurai Ships For Playstation 2


Sony Computer Entertainment America Inc. announced the release of Genji:
Dawn of the Samurai, available exclusively for the PlayStation 2 computer
entertainment system. Developed by Game Republic, Sony Computer
Entertainment Japan, Genji: Dawn of the Samurai is an intense 3D
single-player samurai swordfighting action-adventure game set upon twelfth
century feudal Japan. A dramatic samurai plot fused with mythology, Genji:
Dawn of the Samurai delivers a story of two noble warriors engaged in a
crusade against mythical forces controlling Japan.

Genji: Dawn of the Samurai features motion-captured swordplay choreographed
by Japan's leading swordsman, elegantly styled environments of feudal Japan
and more than an hour of rich cinematics developed by industry pioneers to
tell a dramatic story of revenge. Gamers will battle their way through 30
missions against mythical enemies and fantastical creatures using two
characters possessing unique fighting styles, a robust advanced enhancement
system consisting of an extensive weapon, armor, and upgrade system making
Genji: Dawn of the Samurai an intense 3D action-adventure must-have title
for PlayStation 2.

"Genji: Dawn of the Samurai blends the best of both literature and
entertainment to create an epic and historic video game showcasing the dawn
of the samurai," said Susan Nourai, director, online and product marketing,
Sony Computer Entertainment America. "Through our work with motion-picture
industry pioneers in cinematics, motion-capture and more, we've made great
efforts to satisfy fans of the action-adventure and fighting genres. This
immersive title will definitely blow away our PlayStation 2 fans due in
large part to its enriching graphics and unique Japanese historic
storyline."

This historic samurai tale is set against the beautiful and elegant
environments of 1159 A.D. feudal Japan where the aristocratic period has
come to an end and wealth and family lineage no longer control the land.
Power now rules the country and the people. Genji: Dawn of the Samurai
delivers a story of two noble warriors engaged in a crusade against
mythical forces controlling Japan.

The Heishi, a brutal samurai clan armed with powerful mythical stones has
struck fear into the citizens of Kyo with its tyrannical rule and
mysterious power. As Yoshitune, a cunning swordsman and one of the few
surviving descendants of the vanquished Genji clan, players embark on an
epic adventure across the beautiful country of feudal Japan to rid it of
the Heishi clan's oppressive rule. With swords in hand and the aide of a
powerful ally, players must wage war against skilled swordsmen, vicious
demons and a world rife with evil. The dawn of the samurai has arrived.

The independent Entertainment Software Rating Board (ESRB) has rated Genji:
Dawn of the Samurai "M" for Mature.



Dragon Quest VIII: Journey of the Cursed King Ships
Soon For Playstation 2


Square Enix, Inc., the publisher of Square Enix interactive entertainment
products in North America, announced that Dragon Quest VIII - Journey of
the Cursed King (Dragon Qquest VIII) will ship to retailers November 22nd,
exclusively for the PlayStation 2 computer entertainment system.

The first PlayStation2 title in the series, Dragon Quest VIII is the latest
in the legendary franchise that has sold over 40 million units worldwide.
Updates for the North American release include: voice-overs, a
full-orchestral soundtrack, a completely renovated GUI menu system, new
battle abilities, and improved animations. These new additions greatly
enhance the gaming experience for the North American audience. A bonus disc
will also be included with a playable demo of the North American version of
FINAL FANTASY XII.

The wait is finally over. Dragon Quest is back, now in glorious 3D!
Representing the collaboration of some of Japan's finest creative talent,
Dragon Quest VIII showcases the masterfully woven narrative of series'
creator Yuji Horii, the distinctive character designs of legendary manga
artist Akira Toriyama, and the grandly evocative orchestral soundtrack of
renowned composer Koichi Sugiyama. Charged with the task of uniting their
visions, highly respected developer Level-5, Inc. delivers a richly
detailed environment, vast enough to house Yuji Horii's sweeping drama, and
a cel-shaded graphics engine which perfectly captures the spirit of Akira
Toriyama's character designs. The result is a living, breathing world
straight from Japanese anime, where the shapes on the horizon aren't just
scenery, but new places to explore!

A mysterious jester. A forbidden scepter. A fiendish curse. A once idyllic
kingdom lies entangled in a web of enchanted vines, its king and princess
hideously transformed, its castle and subjects frozen in time. Only one
person has survived this horror unscathed: you!

Only you can save your king and country by lifting the shadow of the evil
jester's curse ... But it won't be easy. An epic tale of friendship,
bravery, and adventure awaits you on the grassy fields, snow-capped
mountains, and restless seas of Dragon Quest VIII!

Dragon Quest VIII will be available at North American retailers for a
suggested retail price of $49.99 (USD). Additional information and the
official trailer can be found at http://www.dragonquest8.com. The
Entertainment Software Rating Board (ESRB) has rated the title "T" for
Teen.



Wild Arms 4 and Shadow Hearts: From The New World RPG's
Coming To Playstation 2 In 2006


XSEED Games, a new video game publisher, today announced that it has
obtained exclusive publishing rights for WILD ARMS(R) 4 and SHADOW HEARTS:
FROM THE NEW WORLD (both for the PlayStation(R)2 computer entertainment
system) for the North American market. Both titles are scheduled for
release in Q1 2006.

"We are extremely excited to launch XSEED Games with these two quality
role-playing games," said Jun Iwasaki, president, XSEED Games. "Our
extensive past experience working with some of the highest quality titles
in the industry has really honed our ability to spot the best in
interactive entertainment. These two titles are the first of what the XSEED
Games label will come to represent in bringing great entertainment to the
U.S. audience. We expect both WILD ARMS 4 and SHADOW HEARTS to not only
appeal to the existing fans of the series but also attract newcomers."

XSEED Games was founded in November 2004 by a small group of talented
professionals, all of whom have extensive experience in the video game
industry. Led by president Jun Iwasaki, the team launched several
multi-million seller titles and many quality Japanese titles in multiple
genres across the PlayStation(R), PlayStation 2 and PC platforms. More
information on XSEED Games can be found at http://www.xseedgames.com.

Wild Arms 4

WILD ARMS 4 is the newest chapter in the popular role-playing game series
which has shipped over 2.5 million copies worldwide. Featuring a new cast
of characters, an original storyline, and a new strategic battle system, it
appeals to new players of the series while fans will instantly recognize
the mainstays of the WILD ARMS world of Filgaia. WILD ARMS 4 follows the
journey of four teenagers as they reshape the future of Filgaia.

The Story

Jude Maverick has grown up in an isolated town called Ciel, which is
completely enclosed in a large sphere floating thousands of feet above the
surface of Filgaia. His sheltered world changes forever when he sees the
sky "tear" and ships entering his homeland. Upon inspecting the camp site
set up by the intruders, he sees something that he has never seen before; a
girl. The girl's name is Yulie and she is being held captive by the
intruders after being captured by a "Drifter" for hire, Arnaud G. Vasquez.
After the invading army attacks Ciel and brings the whole sphere crashing
down, Jude, Yulie and Arnaud join forces to find out the army's true
intention behind Yulie's abduction. With the help of another Drifter,
Raquel, these four idealistic teenagers travel the war-torn land of Filgaia
in search of truth, their own identities and their individual paths to
adulthood.

Key Features

* Innovative new HEX battle system unlike anything seen before in
turn-based RPGs; easily accessible while providing an amazing amount of
speed, depth and strategy.
* Action elements on the field map such as double-jumps, using the new
"Accelerator" ability to manipulate time, and equipping items to solve
puzzles eliminates the boredom of walking around waiting for random
battles.
* Inspiring coming-of-age storyline as Jude learns to cope with the harsh
realities of the outside world with the help of his newfound friends.
* Events presented in a distinctive use of polygons and shading with
voice-overs.

WILD ARMS 4 is scheduled for release in Q1 2006. The title was released in
Japan on March 24, 2005 by Sony Computer Entertainment Inc. and developed
by Media. Vision Entertainment Inc. Information on the title will be
available at http://www.wildarms4.com.

Shadow Hearts: From The New World

The third and latest installment in the critically acclaimed role-playing
game series, Shadow Hearts: From The New World takes place in the United
States during the Great Depression. Featuring a gripping and inspirational
storyline with up to 60 hours of gameplay, players can expect to run into a
unique set of characters at famous, real-world locations including Chicago,
Grand Canyon, Las Vegas and New York. The addictive Judgment Ring System
has been improved, adding even more excitement and strategy to the overall
gameplay.

The Story

The story begins as Johnny Garland, a young, 16-year old detective who lost
his father, sister and his memory in an accident, accepts an investigation
to track down a criminal suspect who escaped from custody. As he closes in
on the suspect, Johnny witnesses a supernatural occurrence - a huge monster
appears from a green light known as the "window" and swallows up the
criminal. Apparently, a series of horrific incidents similar to this have
been plaguing the cities across the nation. Johnny's female counterpart is
21-year-old bounty hunter Shania, a Native American who is searching for
these mysterious windows and determined to fight them using her spiritual
powers. Together, they travel around the states and are joined by other
characters.

Key Features

* Series trademark Judgment Ring battle system makes a return with
improvements - "Stock System" allowing players the option of executing a
"Combo" command with a second character or "Double" command enabling a
character to perform two different actions in one turn.
* A completely new story and set of new characters will make the title
easily accessible to newcomers of the series with its unique style and
sense of humor.
* A cast of well-drawn, entertaining characters with distinct personalities
and reappearances by a few of the series' favorites.
* Experience a higher level of realism with easy to navigate,
visually-stunning backgrounds, special lighting and illumination effects.
* Huge production values with dramatic events unfolding through high
quality graphics, CG cut scenes, impressive sound effects and voice-overs.

Shadow Hearts: From The New World is scheduled for release in Q1 2006.
The title was released in Japan on July 28, 2005 by Aruze and developed
by Nautilus. The ESRB rating and suggested retail price will be announced
at a later date. Information on the title will be available at
http://www.shadowheartsnewworld.com.



=~=~=~=



->A-ONE Gaming Online - Online Users Growl & Purr!
"""""""""""""""""""



Atari Brings Back Bygone Era


Some sobering news for anyone who has recently crested 40: Everything you
grew up with is now officially retro. Clothes, music, hair styles - even
video games.

Long before "Grand Theft Auto: San Andreas," there was "Pong," a simple
video game from Nolan Bushnell and the folks at the original Atari Inc. Two
paddles, one ball and no Hot Coffee mod to unlock hidden sex scenes. THAT
was gaming.

The Atari brand has traded hands in the years since "Pong" hit the scene,
but the new owners are still milking some mileage out of this game and 39
others with Atari Flashback 2. This $30 device offers a fun and affordable
glimpse into the gaming's past - one that, for better and worse, looks
nothing like the present.

The console itself looks like a scaled-down version of an old Atari 2600,
with faux wood paneling and other dated details. There are no cartridges
to plug in, as technology advances have made it easy to stuff all of the
games onto a small chip inside. And the controllers are exactly like the
Atari 2600 joysticks of yore.

The unit connects to your home television through common audio and video
RCA inputs. Many sets have these connections on the front, which is a bonus
with this console because I found the cables that come with it a bit short.

Among the 40 titles are classics like "Centipede," "Asteroids," "Missile
Command," "Yar's Revenge" and "Pitfall." Some are licensed from Activision
Inc., which made games for the 2600, but most are original Atari gems.

How do these titles hold up in the face of today's video games with highly
detailed graphics, Dolby Digital sound and online connectivity? As well as
could be expected of large primary-colored blocks jumping around the
screen.

But there is magic in the way those blocks moved. Hours of magic.

Games like "Missile Command" have the type of player interaction that
remains viable in plot and movement. My mind was thrust back decades as I
began to protect the cities closest to my ammunition bunker, keeping an eye
peeled for smart bombs, those little blinking diamonds that fell from the
sky and tried to evade my explosions.

And "Millipede," a sequel to the popular "Centipede" title, was a blast. I
was racking up extra lives on only my second attempt as I weaved past that
infernal spider that crept from the corners seeking to squash me.

The action games held up well, but adventure games like "Haunted House" and
"Wizard" were mostly duds and offered little real suspense.

Seriously. How scary can a blinking green square be anyway?

The sounds produced by these games are rudimentary at best. Even my cell
phone makes more intricate tones.

Nonetheless, lots of people simply refuse to let go of retro-gaming.

Consider that many who long for old quarter-gobbling arcade games like
"Joust," "Defender" and "Crystal Castle" have gravitated to free software
called MAME, short for Multiple Arcade Machine Emulator. MAME can run the
original ROMs from hundreds of arcade game machines. And those ROMs are
also readily available online.

The legality of using MAME to play ROMs you don't actually own is up for
debate. But an enthusiastic online community is keeping the old titles
alive, and there's no debating the lure of a pixelated pastime that helped
define a generation.

Atari has done a nice job of legally giving us another look at these early
games, long after the consoles themselves have been relegated to the dust
bin.



=~=~=~=



A-ONE's Headline News
The Latest in Computer Technology News
Compiled by: Dana P. Jacobson



Cyber Cons, Not Vandals, Now Behind Viruses


Computer hackers seeking financial gain rather than thrills or notoriety
are increasingly flooding the Internet with malicious software code,
according to a semi-annual report issued on Sunday.

Symantec Corp.'s Internet Security Threat Report said during the first half
of 2005 the number of new viruses targeting Microsoft Windows users jumped
48 percent to nearly 11,000 compared to the previous six months as hackers
used new tools and a growing sophistication to create malicious code.

The latest report by the world's biggest security software maker also found
that viruses exposing confidential information made up three-quarters of
the top 50 viruses, worms and Trojans, up from 54 percent in the last six
months of 2004.

It also said an increasing amount of menacing software allowed spam to be
relayed automatically from computer to computer. These so-called "Trojan"
programs can download and install adware to display pop-up ads in a user's
Web browser.

More so-called robot, or "bot" networks, which are created when a hacker
illegally gains control of a large number of computers, are now available
for sale or rent in the underworld of the Internet, Symantec said.

"As financial rewards increase, attackers will likely develop more
sophisticated and stealthier malicious code that will attempt to disable
antivirus, firewalls, and other security concerns," the report said.

Vincent Weafer, a security expert at Symantec, said early generations of
cybervandals tended to unleash viruses as a way to bolster their
reputations in the murky hacker world but now the motivation has turned to
financial gain using more targeted malicious software.

The number of headline-grabbing viruses has slowed since the Blaster worm
outbreak in 2003, which targeted Microsoft software and devastated hundreds
of thousands of computers worldwide.

Instead, there is now a surge in people trying to gain control over a
network of computers to launch attacks as well as a growing number of
phishing scams that trick users into clicking onto a Web site that contains
infected code, he said.

"We are seeing a very significant change where we are seeing far fewer
large pandemics," Weafer said. "However we are seeing a large volume
increase in cyberattacks, viruses and variants."

Indeed, Symantec saw an average of 10,532 active bot network computers per
day, an increase of more than 140 percent over the prior six months.

It also said phishing messages grew to an average 5.70 million messages a
day from 2.99 million.

"What we are saying is that attackers are increasingly targeting your
assets and your private information," Weafer said.



New P2P Worm Spoofs Google


A computer worm that creates a bogus Google Web site and spreads via
peer-to-peer networks continues to proliferate worldwide after being
detected late last week by security specialist PandaLabs.

The P2Load.A worm, with both malware and adware functions, is transmitted
via the P2P programs Shareaza and Imesh. It copies itself to the shared
directory of these programs as an executable file called "Knights of the
Old Republic II," in reference to a computer game based on the Star Wars
universe.

When the file is executed, an error message is displayed, informing the
user that there is a missing file and offering to download it. Once the
file is downloaded, the worm modifies the user's start page and hosts file
to spoof the identity of Google, explained Forrest Clark, senior manager of
consumer product marketing for PandaLabs.

The modified hosts file, which associates domain names and Internet
Protocol addresses, redirects users to a replica of Google hosted on a
server in Germany. Although search results generally are rendered as they
would be with a normal Google search, the sponsored links are different.

Instead of links to the Web sites of Google's paying customers, others
appear that have been specified by the malware creator. The result is
increased traffic and revenue for these Web sites, Clark said.

"With the ability to alter the hosts file and hijack a Web browser, this
worm represents a higher level of sophistication of online attack, focusing
on financial gain," Clark said. "It has the potential to lead someone to
other sites by changing the content of the file downloaded, and to use
other phishing techniques against other Web sites."

PandaLabs was able to shut down the Web page that hosted one of the files
of the P2Load.A worm after contacting the page's ISP. Today, Clark said
that while the worm initially appeared in Chile and the U.S., it has spread
throughout Europe and is considered a medium-grade threat.

"It's becoming more difficult to segregate attacks that use multiple venues
to do their damage," Clark said. "This is a serious issue because the worm
could be used to redirect users to a popular banking or e-commerce site and
send a message prompting them to reveal sensitive personal information."



Hacker Spams Huge Quantities Of Trojans, Again


For the second day in a row, an unknown attacker Tuesday spammed major
quantities of a new Bagle-esque Trojan horse that turns off virtually every
known security program and blocks access to security sites on the Internet.

Several variants of the BagleDI-U Trojan - dubbed Bagle.cd by McAfee, and
Bagle.da by Trend Micro - have been spammed since Monday at approximately
11 a.m. EDT. A second wave hit the Internet around the same time Tuesday,
said U.K.-based security firm Sophos.

"This is the second massive e-mail attack from this hacker in two days, the
creator is obviously intent on infecting as many people as possible," said
Carole Theriault, a senior security consultant at Sophos, in a statement.

The variants are easy to spot, since all come with a blank subject head
with a message of "new price" and an attached file in .zip format that
takes monikers such as "09_price.zip," "price_new.zip," and "price2.zip."

BagleDI-U (or whatever others call it), attempts to turn off a long list of
security-related processes; deletes Windows Registry keys for software from
Symantec, MacAfee, Kaspersky, Panda, Zone Labs, and Agnitum; blocks the
browser from accessing Web sites; and downloads additional code from a wide
range of malicious Web sites.

The Trojan (or worm; some vendors claim it's the latter) also boasts an
anti-Netsky feature that prevents worms in that family from executing on an
infected PC.

Most security vendors have pegged BagleDI-U as a low- to medium-level
threat.



New Mobile Virus Can Jump to PCs


Yet another virus targeting mobile devices has emerged, this time with a
new twist: It has the potential to infect PCs when users transfer data from
phone to computer.

The Cardtrap.A Trojan resembles other malware targeting handhelds running
the Symbian operating system, such as Cabir, that typically spread through
a phone's built-in messaging applications or by way of Bluetooth wireless
connections.

However, unlike earlier mobile-phone viruses, Cardtrap.A has a built-in
mechanism that plants two worms on a phone's memory card with the ultimate
goal of infecting a PC.

In addition to planting Win32/Padobot.Z and Win32/Rays worms, the mobile
virus also creates an autorun file on the memory card so that when the card
is inserted into the Windows PC, it automatically installs and runs
the malware.

In addition, the virus overwrites normal applications installed on the
affected mobile device, preventing said applications from working properly.

The ultimate objective of the Trojan is most likely to cause the user to
infect his or her PC with worms in the act of trying to disinfect the
phone, said Mikko Hypponen, chief research officer at F-Secure.

A typical reaction of many users who discover the infection of Cardtrap.A
would be to insert the phone memory card into the PC to copy the file
manager or disinfection tool to the card. But this is precisely what would
create the PC infection.

"This is interesting because it is the first mobile virus that tries to
infect a Windows machine using a virus it carries in addition to the mobile
Trojan," Hypponen said.

Cardtrap.A presents a low risk to most mobile users, Hypponen explained,
because it has not spread very far at this point. It apparently originated
at a Web site that is distributing pirated games for mobile phones,
Hypponen said. It can infect devices running the Symbian Series 60 OS,
including products from Nokia, Panasonic, Sendo and Siemens.

While this virus might not have a massive impact on mobile-phone users
around the world, malware practitioners clearly are taking a keener
interest in mobile phones. But most analysts and security professionals
contend that it will be a few years before mobile viruses will have much of
an impact.

Still, Hyponnen said one mobile-phone provider, which he declined to
identify, reported to F-Secure that it is receiving some 200 infected
phones a day from customers. "The first mobile virus appeared about a year
ago, and since Cabir emerged, the number of viruses has increased to about
80," he said.

Hyponnen suggested that Cardtrap.A could represent a new trend in mobile
malware, with future variants written so that they can jump back and forth
between handheld and PC through memory cards, USB connections or Bluetooth.

A vast majority of phones used today don't have the power to receive
viruses, noted Gregg Mastoras, senior security analyst at Sophos. "There
are not that many smartphones out there, and there is no ubiquitous
operating system for those devices, so the potential for a major outbreak
is very low."

But, he added, given the millions of mobile phones in use, the devices are
attractive targets and it might be only a matter of time before someone is
able to create a virus that wreaks widespread havoc.



Mac Users Deluding Themselves Over Security


Mac users are operating under a false sense of security, according to
Symantec, and Firefox users will have to recognize that the open-source
browser is currently a greater security risk than Internet Explorer.

Symantec s latest Internet Security Threat Report, published Monday, found
evidence that attackers are beginning to organize for attacks on the Mac
operating system. Researchers also found that over the past six months,
nearly twice as many vulnerabilities surfaced in Mozilla browsers as in
Explorer.

It is now clear that the Mac OS is increasingly becoming a target for the
malicious activity, contrary to popular belief that the Mac OS is immune to
traditional security concerns, the report said.

Symantec said OS X - based on BSD Unix - now shares many of the security
concerns affecting Unix users. As Mac OS X users demand more features and
implement more ports of popular UNIX applications, vulnerabilities and
exploits targeting this operating system and its underlying code base are
likely to increase, Symantec said in the report.

The number of security bugs confirmed by Apple has remained about the same
over the past two six-month reporting periods, with no widespread exploits,
Symantec said. But an analysis of a rootkit called Mac OS X/Weapox - based
on the AdoreBSD rootkit - indicates the situation might not last much
longer. While there have been no reports of widespread infection to date,
this Trojan serves to demonstrate that as Mac OS X increases in popularity
so too will the scrutiny it receives from potential attackers, the report
said. Mac users may be operating under a false sense of security.

Twenty-five vulnerabilities were disclosed for Mozilla browsers, including
Firefox, in the first half of the year, compared with 13 for Explorer,
Symantec said. Eighteen of the Mozilla flaws were classified as high
severity, compared with eight high-severity Explorer flaws.

Symantec warned of other emerging threats, notably to increasingly popular
IP telephony systems, wireless networks and mobile devices. Meanwhile,
attack code is becoming more sophisticated, with attackers deploying
modular code that can avoid detection systems, Symantec said.



Credit Card Court Battle Tests Laws


Testing the bounds of consumer protection laws, Visa USA Inc. and
MasterCard International Inc. are headed for court to determine whether
they are obliged to notify 264,000 customers that a computer hacker stole
their account information.

The dispute to be argued Friday in San Francisco County Superior Court
revolves around a highly publicized security breakdown at CardSystems
Solutions Inc., one of the nation's largest payment processors.

Although a ruling in the class-action consumer lawsuit wouldn't have legal
standing outside the state, it would increase the pressure on Visa and
MasterCard to notify all affected accountholders in this and any future
breaches.

That would compound the headaches that the CardSystems imbroglio already
has caused.

The breach, initially disclosed by MasterCard three months ago, exposed up
to 40 million credit and debit card accounts to potential abuse between
August 2004 and May 2005.

It's the largest of more than 70 consumer information security breaches
reported in the past seven months, according to the Privacy Rights
Clearinghouse.

Although the scope of the CardSystems break-in has been generally outlined,
the credit card associations haven't sent warnings to the most vulnerable
customers.

San Francisco-based Visa and Purchase, N.Y.-based MasterCard maintain that
responsibility should fall to the myriad banks that administer the accounts
because neither credit card association has direct relationships with the
affected customers.

Both Visa and MasterCard provide processing and marketing services to
thousands of banks nationwide. It's a profitable endeavor. MasterCard's
parent company earned $213.5 million on revenue of $1.4 billion during the
first half of this year, according to documents filed in preparation for
an initial public offering of stock. Visa doesn't disclose its profit.

Internal investigations have determined that the still-unknown thief
grabbed enough sensitive details from CardSystems to defraud about 264,000
Visa and MasterCard accountholders nationwide, according to evidence
gathered in the lawsuit, which was filed by San Rafael, Calif., attorney
Ira Rothken.

No home addresses or Social Security numbers were stolen in the CardSystems
breach, minimizing the risk for identity theft. But the hacking obtained
customer names, account numbers and security codes that could be used to
create bogus credit and debit cards.

The lawsuit seeks a court order requiring Visa and MasterCard to warn each
Californian whose information was compromised. The order is being sought
under a pioneering state law that requires consumers to be alerted whenever
personal information stored on computers is lost, stolen or breached.

Since California imposed the mandate in July 2003, 35 other states have
approved or proposed similar laws, according to the U.S. Public Interest
Research Group. That means other states could end up addressing similar
legal issues raised by this California case.

"We are trying to establish an efficient method that would hold Visa and
MasterCard responsible for giving all consumers their due notices, so each
customer can decide whether they want to change their card number," Rothken
said.

Replacing a credit card costs an issuer about $35.

That would total $9.24 million for 264,000 cards that might have to be
replaced if customers learn of the fraud risk, with the cost rising even
higher to the industry if it's discovered even more of the 40 million
accounts are vulnerable.

Both Visa and MasterCard have blamed CardSystems' lax security for the
breach. Infuriated by the breakdown, Visa has since cut its ties with
Atlanta-based CardSystems, which says it has tightened controls to comply
with industry standards.

In their legal briefs, Visa and MasterCard have argued there's little
chance any affected customer will lose a cent because of the association's
long-standing policies to reverse all charges for fraudulent transactions.
The "zero liability" policy lessens the need to alert individual customers
about the fraud risks, said MasterCard spokeswoman Sharon Gamsin.

In a statement, Visa also said it is comfortable with its anti-fraud
measures. But both companies worry that the opposite message might be sent
if they are ordered to warn individual customers.

"Such an order would harm the banks' goodwill because some customers would
certainly be confused by the notice and believe the issuing banks were
somehow to blame for the security breach," Visa's attorneys argued in a
court brief.

The companies' fraud-fighting assurances don't soothe Eric Parke, a Marin
County resident representing consumer interests in the suit. In a sworn
declaration, Parke said he has been fretting about his potential fraud
exposure since news of the CardSystems theft broke.

"I do not think it's fair for ... me to have to look through cryptic credit
card statements with (an) eye toward forensically determining if fraud was
committed ... when Visa and MasterCard can just tell me if my data was
compromised," said Parke, who has seven MasterCard and Visa accounts.



AOL Unveils New Antispyware Tools


America Online is rolling out a new suite of antispyware tools that it
claims will be faster, more effective and less confusing for its members.

The new application, AOL Spyware Protection 2.0, was developed with
technology from Computer Associates. In the past, AOL had used technology
provided by Aluria Software. Although Aluria was acquired by rival firm
Earthlink, AOL insists that it went with Computer Associates prior to the
takeover.

"Computer Associates simply has a bigger database, and its technology is
faster and has more scanning ability," said AOL spokesperson Andrew
Weinstein. "We felt this was the best antispyware that we could offer our
members."

According to the company, the new antispyware tools scan for more than
28,000 known types of adware, keyloggers, spyware and Trojan horses. The
number of scans can be done as frequently as every minute.

The scanning engine is based on CA's eTrust PestPatrol product. Users who
have AOL 9.0 will have the program download automatically. Those using
other versions of AOL's software can manually download it.

One significant change in AOL's spyware tools comes with how blocked or
discovered applications are reported to users. In the previous version of
the software, spyware was ranked according to threat level, with terms like
"elevated" describing the spyware's potential threat to user security.

But AOL heard from its members that such terms were confusing and that they
often were unsure about whether to delete a program or keep it.

In response, AOL revamped its spyware-ranking system so there are only two
definitions: "security risk" and "nuisance." Users now are given the option
of deleting the spyware after being informed about whether a program
presents a threat or is simply deemed irritating because it causes pop-ups
or something that won't actually do users harm.

"Users don't want to spend time trying to figure out if something is a
security risk," said Weinstein. "This way, they can see that it is, delete
it and move on."



PayPal Hit By Tech Snafu


PayPal, the online payment service owned by online auctioneer EBay Inc., on
Wednesday confirmed that charges were showing up twice on some customers'
bills, causing confusion.

The problem stems from a technical snafu with a third-party transaction
processor, which a PayPal spokeswoman declined to name. As of Wednesday,
the companies were still trying to fix the problem, which started early in
the month.

Some customers using PayPal debit cards on Sept. 8 or Sept. 9 to make
offline purchases had the transactions listed on their online bill Sept. 15
and then again on Sept. 18. The earlier transaction said "completed," while
the other "pending." No one has actually been charged twice, PayPal
spokeswoman Amanda Pires said.

Nevertheless, some customers have been irate at seeing the duplicate line
item.

"That's very confusing to people," Pires said. "We apologize, and we know
we have to fix it."

The problem was technical and only with the third-party processor, Pires
said. She couldn't say when the companies would finish reversing all of the
duplicate transactions.

The problem was confined to the United States and affected only a "small
percentage" of customers, Pires said. PayPal has 79 million customers
worldwide.

Many people who make a living selling on EBay use PayPal debit cards to
draw off the money received from buyers. Merchants who have sites outside
of EBay, but use PayPal as a payment method also use the cards. The snafu
affected only debit card users.



Jeeves Gets Fired


The search engine Ask Jeeves's dapper, grinning butler will soon be out of
a job.

Jeeves's pink slip came from IAC/InterActiveCorp chair and chief executive
officer Barry Diller, who announced the change during a Goldman Sachs Group
investor conference in New York. IAC/InterActiveCorp completed its purchase
of Ask Jeeves in July.

"By the way, Jeeves will disappear, and we will be called Ask or Ask.com,"
Diller said during the conference. "Not that I don't like that butler. He's
actually a thinner butler now."

Jeeves, created by British humorist P.G. Wodehouse, was slimmed down and
given a tan last year, said Lisa Meakin, a London-based spokesperson for
Ask Jeeves. But surveys revealed that users tended to pigeonhole the search
engine as "old-fashioned" and appropriate for only question-based queries,
Meakin said.

The company's research has shown that use of the Jeeves character as the
prominent symbol of the brand blinds people to recent changes and
improvements in the search engine, the company said in a statement.

No timeline has been given for Jeeves's departure, and no final decision on
a new name for the search engine has been made, Meakin said.



Google to Put Copyright Laws to the Test


Copyright laws written long before the digital age are about to be tested
as Google Inc. attempts to scan millions of books and make their text fully
searchable on the Internet.

Tony Sanfilippo is of two minds when it comes to Google's ambitious
program. On the one hand, Sanfilippo credits the program for boosting sales
of obscure titles at Penn State University Press, where he works. On the
other, he's worried that Google's plans to create digital copies of books
obtained directly from libraries could hurt his industry's long-term
revenues.

With Google's book-scanning program set to resume in earnest this fall,
copyright laws that long preceded the Internet look to be headed for a
digital-age test.

The outcome could determine how easy it will be for people with Internet
access to benefit from knowledge that's now mostly locked up - in books
sitting on dusty library shelves, many of them out of print.

"More and more people are expecting access, and they are making do with
what they can get easy access to," said Brewster Kahle, co-founder of the
Internet Archive, which runs smaller book-scanning projects, mostly for
out-of-copyright works. "Let's make it so that they find great works rather
than whatever just happens to be on the Net."

To prevent the wholesale file-sharing that is plaguing the entertainment
industry, Google has set some limits in its library project: Users won't
be able to easily print materials or read more than small portions of
copyright works online.

Google also says it will send readers hungry for more directly to
booksellers and libraries.

But many publishers' remain wary.

To endorse Google's library initiative is to say "it's OK to break into my
house because you're going to clean my kitchen," said Sally Morris, chief
executive of the U.K.-based Association of Learned and Professional Society
Publishers. "Just because you do something that's not harmful or (is)
beneficial doesn't make it legal."

Morris and other publishers believe Google must get their permission first,
as it has under the Print Publisher Program it launched in October 2004,
two months before announcing the library initiative.

Under the publishers' program, Google has deals with most major U.S. and
U.K. publishers. It scans titles they submit, displays digital images of
selected pages triggered by search queries and gives publishers a cut of
revenues from accompanying ad displays.

But publishers aren't submitting all their titles under that program, and
many of the titles Google wants to scan are out of print and belong to no
publisher at all.

Jim Gerber, Google's director of content partnerships, says the company
would get no more than 15 percent of all books ever published if it relied
solely on publisher submissions.

That's why it has turned to libraries.

Under the Print Library Project, Google is scanning millions of copyright
books from libraries at Harvard, Michigan and Stanford along with
out-of-copyright materials there and at two other libraries.

Google has unilaterally set this rule: Publishers can tell it which books
not to scan at all, similar to how Web site owners can request to be left
out of search engine indexes. In August, the company halted the scanning
of copyright books until Nov. 1, saying it wanted to give publishers time
to compile their lists.

Richard Hull, executive director of the Text and Academic Authors
Association, called Google's approach backwards. Publishers shouldn't have
to bear the burden of record-keeping, agreed Sanfilippo, the Penn State
press's marketing and sales director.

"We're not aware of everything we've published," Sanfilippo said. "Back in
the 50s, 60s and 70s, there were no electronic files for those books."

Google, which wouldn't say how many books it has scanned so far, says it
believes its initiative is protected under the "fair use" provisions of
copyright law.

Gerber argues that the initiative will "stimulate more people to contribute
to the arts and the sciences by making these books more findable."

Washington lawyer Jonathan Band says Google's case is strong given the
limits on display - a few sentences at a time for works scanned from
libraries, with technology making it difficult to recreate even a single
page.

"I don't see how making a few snippets of a work available to a user could
have any negative impact on the market," said Band, who has advised library
groups and Internet companies on copyright issues.

Under Google's strictures, readers can see just five pages at a time of
publisher-submitted titles - and no more than 20 percent of an entire book
through multiple searches. For books in the public domain, they can read
the entire book online.

Not all publishers are opposed.

"For a typical author, obscurity is a far greater threat than piracy," said
Tim O'Reilly, chief executive of O'Reilly Media and an adviser to Google's
project. "Google is offering publishers an amazing opportunity for people
to discover their content."

James Hilton, associate provost and interim librarian at the University of
Michigan, said his school is contributing 7 million volumes over six years
because one day, materials that aren't searchable online simply won't get
read.

"That doesn't mean it's going to be read online, but it's not going to be
found if it's not online," he said.

Hal Hallstein, a 2003 Colby College graduate, said Google's project would
have been useful for his studies in Buddhism. He typed the word "shunyata"
- Sanskrit for emptiness - and found several books he didn't know existed.

"The card catalog in my experience is rather limited in terms of the amount
it really describes," he said.

Nonetheless, as e-media coordinator at Wisdom Publications, he believes
each publisher should be able to decide whether to join, as his company
has.

Much of the objections appear to stem from fears of setting a precedent
that could do future harm to publishing.

"If Google is seen as being permitted to do this without any response, then
probably others will do it," said Allan Adler, a vice president at the
Association of American Publishers. "You would have a proliferation of
databases of complete copies of these copyrighted works."

Publishers won't rule out a lawsuit against Google.

The technology juggernaut, whose name is synonymous with online search,
isn't just shaking up book publishing.

Google has a separate project to archive television programs but has so far
received limited permissions. The company also faces lawsuits over
facilitating access to news resources and porn images online.

Jonathan Zittrain, an Internet legal scholar affiliated with Oxford and
Harvard universities, says the book-scanning dispute comes down balancing
commercial and social benefits.

"From the point of view of the publishers, you can't blame them for playing
their role, which is to maximize sales," he said. "But if fair use wasn't
found, (Google) would never be able to do the mass importation of books
required to make a database that is socially useful."



Microsoft Could Face Fresh EU Case in Future


The European Commission may bring a new competition case against Microsoft
after the EU executive received fresh complaints about the U.S. software
giant, the EU competition commissioner said in a newspaper interview on
Tuesday.

Neelie Kroes told the International Herald Tribune she would not wait for
the outcome of an appeal by Microsoft before considering more action
against the U.S. firm.

"We have had informal complaints, and we are using our time now to look at
them. We're not going to wait and do nothing," Kroes told the newspaper.

A Commission spokesman, however, denied that Brussels had any plans at the
moment to file another suit against Microsoft, although he admitted new
complaints had been lodged which the Commission was examining before taking
any decisions.

Microsoft was ordered last year to change the way it sells its software in
Europe, and the company has appealed against the decision.

Kroes said the new, informal complaints were similar to the previous ones
and focused on the bundling of existing and future applications.

The newspaper quoted a lawyer as saying the latest complaints centered on
Microsoft's Office suite of software applications, including Microsoft Word
and Outlook, the e-mail program.

Jonathan Todd, spokesman for Kroes, said there were no plans currently for
a new case against Microsoft.

"The European Commission is not intending at the moment to open a new case
against Microsoft. The Commission is, however, determined to ensure the
proper application of the March 2004 decision and in particular the
remedies imposed by that decision," Todd told Reuters.

Todd declined to reveal the content of the complaints.

"We are currently in the throes of analyzing these informal complaints and
the decision as to whether or not we will open up new case against
Microsoft will only be taken once we have completed our scrutiny, our
examination of the information we have received," he later told a news
conference.

Earlier this month Microsoft filed a new lawsuit against the European
Commission, the latest move in its long-running battle against antitrust
sanctions imposed by the Commission for abuse of its dominant Windows
software.

In March 2004, the Commission found Microsoft abused dominance of the
Windows operating system so it could damage rival makers of work-group
servers and media players.

Microsoft paid a 497-million-euro fine and issued remedies on the two
issues, but nearly one and a half years later those sanctions have yet to
bite.



EU Insists It Won't Regulate the Internet


The European Union head office insisted Thursday that it had no plans to
regulate the Internet as it launches new broadcasting rules later this
year.

"I have no intention to 'regulate the Internet,'" EU Information Society
Commissioner Viviane Reding told a broadcasting conference in Liverpool,
England. However, she said the European Commission had the duty to protect
shared European values.

"Who in this room is in favor of child pornography on the new media? Who
stands for the freedom to spread incitement to racial hatred on the new
media?"

She said there was a broad consensus that child protection and hate speech
rules should also apply to "nonlinear" services, such as pay-TV or Internet
broadcasts.

Internet firms and some broadcasters have firmly voiced their opposition to
an EU-wide law over content.

British Broadcasting Corporation director general Mark Thompson said
Wednesday that regulators needed to be realistic about how practical and
desirable it was to enforce content in an on-demand, online world.

"Our own research suggests that public expectations of BBC online content
are very different from their expectation of what they see on BBC
Television - they simply do not feel they need, or want, the same level of
protection."

He said self regulation grounded in continuous research into public
attitudes was a better option for new media.

In a paper published on the Commission's Web site ahead of the conference,
AOL Europe Services said it believed the Internet industry has already
responded to customer demand by creating common standards.

"As AOL has demonstrated over a number of years, it is in our commercial
interests to be a responsible self-regulating service provider," it said.

Yahoo! Europe said the online environment was no Wild West as companies
have worked together with national governments to tackle problems such as
child porn.

In a letter to the Commission, it also warned that new media was evolving
so quickly that the audiovisual world in 10 or 15 year's time will not have
any resemblance to today's limited environment.

"Already, Internet users have access to a host of filtering, parental
control and other tools enabling them to decide what is appropriate viewing
for them and their families. It is not unreasonable to expect similar
market-driven solutions to be provided for Internet Protocol TV," it said.



Opera Browser Abandons Advertising


Opera Software announced that users of the free PC version of its Web
browser, Opera, will no longer have to view advertising banners in exchange
for getting the browser without a licensing fee.

The company noted that the browser's growth has made it possible to go
free. Opera Software does still charge for its premium support services,
though, which costs $35 per year. Also a source of revenue for the company
are versions of the browser for mobile phones and other non-PC platforms.

"Today we invite the entire Internet community to use Opera and experience
Web browsing as it should be," said Jon S. von Tetzchner, Opera's chief
executive. "Removing the ad banner and licensing fee will encourage many
new users to discover the speed, security and unmatched usability of the
Opera browser."

Opera currently commands a very small slice of the browser market, but the
company is optimistic that this shift toward an advertising-free, non-fee
model will make it more popular.

"We think the market is ready for another competitor to Internet Explorer,"
said Tor Odland, Opera spokesperson.

"Firefox has demonstrated that an alternative browser can succeed, and
we're looking forward to seeing greater adoption through this strategy
shift," he added.

Although the inclusion of advertising might have given Opera somewhat of a
boost to get the company where it is today, it is likely the browser maker
no longer needs that type of help, considering its growth on other
platforms.

"We're the leading browser vendor on the mobile side of things," said
Odland, who pointed out that the browser can be seen on Nokia, Motorola
and several Chinese and Japanese
phones.

Because of Opera's small size, many mobile-device companies have found it
to be an ideal browser for their PDAs and mobile phones. Odland anticipates
that Opera will establish an even firmer foothold in those areas in the
future.

"We may have a small share when it comes to PCs," he said. "But many people
see us as the leading mobile browser."




=~=~=~=


Atari Online News, Etc. is a weekly publication covering the entire
Atari community. Reprint permission is granted, unless otherwise noted
at the beginning of any article, to Atari user groups and not for
profit publications only under the following terms: articles must
remain unedited and include the issue number and author at the top of
each article reprinted. Other reprints granted upon approval of
request. Send requests to: dpj@atarinews.org

No issue of Atari Online News, Etc. may be included on any commercial
media, nor uploaded or transmitted to any commercial online service or
internet site, in whole or in part, by any agent or means, without
the expressed consent or permission from the Publisher or Editor of
Atari Online News, Etc.

Opinions presented herein are those of the individual authors and do
not necessarily reflect those of the staff, or of the publishers. All
material herein is believed to be accurate at the time of publishing.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT