Forums before death by AOL, social media and spammers... "We can't have nice things"
|    az.general    |    What goes on in exciting Arizona...    |    2,973 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,097 of 2,973    |
|    Lolololol! to All    |
|    Cities probe worker emails linked to Ash    |
|    28 Aug 15 06:16:16    |
      XPost: alt.fat-smelly-hippie, alt.rectum.nearly.killed-um, alt.connecticut       XPost: alt.lefthanders       From: lololol@divorces.com              Cities across the USA, including ones in Ohio, North Carolina,       South Carolina and Texas, are investigating email domains listed       among the millions registered to popular spouse-cheating website       AshleyMadison.com.              At least four North Texas cities are looking into whether their       employees used municipal email accounts to sign up and three       city of Cincinnati email domains were listed, according to The       Cincinnati Enquirer and WFAA-TV.              "We are going to pursue it," City Manager Harry Black told the       Enquirer on Wednesday night. "We have some information, but not       enough. I don't know if it would be a fireable offense, but we       will look at our Internet-use policy."              The email domains were part of a massive data breach by hackers       of the Ashley Madison website, which claims to have 39 million       members and boasts about being a matchmaker for cheating spouses.              The hackers on Wednesday released millions of email addresses       registered to the website, saying in a posted message they       exposed the information because Ashley Madison's Toronto-based       owner refused to comply with their demands to shut down the       website.              Black does not have a timetable for his investigation. Even once       he finds out who the email domains are linked to, it's possible       those employees did not register on the adultery site. The       website does not require email addresses to be verified so       members could use another person's email address to sign up and       log onto Ashley Madison.              Black says the city has a "very stringent" Internet policy, and       city-issued computers have a monitoring system that blocks       access to several websites.              "All we can do is look at our protocols and programming of       software and make sure it is as all-encompassing as possible,"       Black said. "But nothing is going to be fail-safe in 2015."              Many other government-issued email domains from across Ohio were       listed in the data breach, according to an Enquirer analysis.       The City of Columbus had five email domains on the list. The       cities of Akron, Toledo, Troy and Tiffin also had email domains       listed.              In Texas, Fort Worth is one of the cities linked to an Ashley       Madison account.              The hacker data indicates that 15,000 addresses ending with a       ".gov" designation were listed as an Ashley Madison customer,       including DeSoto, Frisco, Garland, Fort Worth and Arlington,       Texas.              However, "jumping to conclusions about the origination of that       IP or email address could be dangerous," civil attorney Tim Hoch       told WFAA-TV.              Nevertheless, the City of Plano has launched an investigation.       "We find it unfortunate that an employee of the City of Plano       allegedly elected to use an official work e-mail account for an       inappropriate personal purpose such as this," an official       statement said.              The City of DeSoto blocks access to Ashley Madison on most of       its computers, except for a small number used for law       enforcement. DeSoto officials said if someone is found to have       violated computer policy, he or should would be disciplined.              "What if someone was doing an online impersonation?" attorney       Hoch asked. "We see that quite a bit in our practice ...       especially the divorce side, folks who impersonate others       online."              Using a government email address to register for an adultery       website may seem foolish, but CybelAngel Vice President of       Operations Damien Damuseau said there was a certain logic to it.       Using a professional address, he said, keeps the messages out of       personal accounts "where their partner might see them."              "It's not that dumb," Damuseau said.              A blog by Salted Hash-Top Security News published a list, along       with disclaimers, since some of the names are fake. Among the       accounts on the list were three tied to South Carolina state       agencies and five tied to local ones.              The domains in the list included sc.gov, dhec.sc.gov, ed.sc.gov,       charleston-sc.gov, greenwoodsc.gov, jaspercountysc.gov and       blumenau.sc.gov.              And one CharlotteNC.gov address was released in the data dump       Wednesday, along with one from Iredell County and two from the       City of Salisbury in North Carolina.              WCNC-TV reached out to each of the municipalities for comment.              Traci Ethridge, assistant director of corporate communications       for the City of Charlotte told WCNC-TV, "From the information       provided to us, it is unclear if the extension is from a city of       Charlotte server or from an email address of an employee. We       have had no data breaches relative to the city of Charlotte       server."              Ashley Madison's owner, Avid Life Media Inc., has previously       acknowledged suffering an electronic break-in and said in a       statement Tuesday it was investigating the hackers' claim. U.S.       and Canadian law enforcement are involved in the probe, the       company said.              The AP wasn't immediately able to determine the authenticity of       the leaked files, although many analysts who have scanned the       data believe it is genuine.              TrustedSec Chief Executive Dave Kennedy said the information       dump included full names, passwords, street addresses, credit       card information and "an extensive amount of internal data." In       a separate blog, Errata Security Chief Executive Rob Graham said       the information released included details such as users' height,       weight and GPS coordinates. He said men outnumbered women on the       service five-to-one.              http://www.usatoday.com/story/news/nation-now/2015/08/20/ashley-       madison-ohio-texas-probe/32042771/                             --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca