• Home
  • About
    • Privacy Policy
    • Write for Australian Women Online
  • Advertise With Us
  • Horoscopes
  • Style
  • Shoe Boutique
  • eFashion
  • Weight Watchers Australia

Australian Women Online

Business, career, health and lifestyle content for women

  • Home
  • BLOG
  • BOOKS
  • BUSINESS
  • CAREER
  • COOKING
  • HEALTH
  • LIFESTYLE
    • Automotive
    • Beauty
    • Fashion
    • Pets
    • Relationships
    • Your Home
    • Your Money
  • TECHNOLOGY
  • TRAVEL
    • Discount Holidays
You are here: Home / TECHNOLOGY / Hacking case highlights the dangers of file-sharing

Hacking case highlights the dangers of file-sharing

23 August 2008 by Australian Women Online

Share this:

  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • More
  • Share on Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to print (Opens in new window) Print
  • Click to share on WhatsApp (Opens in new window) WhatsApp

ISACA, an association serving more than 86,000 IT governance professionals, says that a significant court case in the United States, in which a 19-year-old hacker has pleaded guilty to modifying a file-sharing application, highlights the dangers of using this type of software.

File-sharing while at work is becoming increasingly common and exposing companies to serious risk, according to ISACA.

A recent national survey of U.S. white-collar workers commissioned by ISACA found that more than one-third (35%) of employees have violated their company’s information technology (IT) policies at least once and that nearly one-sixth (15%) of employees have used peer-to-peer file-sharing at least once at their place of business, opening the door to security breaches and placing sensitive business and personal information at risk.

“Considering that companies rely on their IT infrastructure to store and transmit sensitive company, employee and customer data, risky activities including the ones this survey reveals are of significant concern for all businesses,” said John Pironti, member of ISACA’s Education Board.

“A single seemingly harmless activity, such as using peer-to-peer networks while at work, can breach the confidentiality and security of an entire corporate network, including all of the documents, data and internal communications that reside on that network. On average, at a company of 1,000 white-collar employees, up to 70 employees are likely using peer-to-peer file sharing while at work often or very often, based on the survey findings. Companies and employees should be very concerned about their personal and corporate data in light of this information.”

However, the opposite seems to be true. For example, the telephone survey found that 65% of white-collar professionals are either not very concerned or not concerned at all about their privacy when using a workplace computer. A surprising 63% are not very concerned or are not concerned at all about the security of their information while at work.

Reports on the Limewire case suggest that Jason Milmont faces up to five years in prison and a possible fine of up to $250,000 for modifying Limewire, a popular file-sharing application, which was subsequently used by as many as 15,000 other Internet users.

People that used Milmont’s modified version of Limewire ended up infecting their own machines with botnets, which could then do almost anything on the host PC, ranging from stealing their financial information to forming part of a network to attack major Web portals.

According to Sarb Sembhi, president of the ISACA London Chapter, the case is particularly interesting as, faced with an onslaught of evidence, the Cheyenne, Wyoming-based man has pleaded guilty to the charges.

“This is the first time anyone has been prosecuted for modifying peer-to-peer software in this way and, as such, it highlights the fact that using P2P services and software is a dangerous hobby—with potential legal consequences,” Mr Sembhi said.

For more on the Limewire hacking prosecution visit http://tinyurl.com/6zxut3

You May Also Like:

Filed Under: TECHNOLOGY

  • Facebook
  • LinkedIn
  • Pinterest
  • Twitter

New Content

  • Streaming Power: How Online Platforms Are Driving Women’s Sports Viewership
  • Why Australian Women Are Rewriting the Rulebook on Everyday Skincare
  • A Season of Power: Women’s Sport Steps Into the Spotlight
  • How Concierge Medicine Empowers Busy Women to Take Control of Their Health
  • Pet Food Australia: The Ultimate Guide to Premium Pet Food for a Healthier, Happier Pet
  • Your Fertility Journey Begins Here: Trusted Care, Expert Guidance
  • New vs. Used Cars: Know the Pros and Cons of Each
  • Beating the Odds in Aviator: Myth or Math?
  • 5 Types of Purlins: What Are Their Pros and Cons
  • Incident & Risk Dashboards: Avoiding Six‑Figure Fines Under New NDIS Rules

Popular Content

  • Moore Weekly Stars
  • Advertise with Australian Women Online
  • Streaming Power: How Online Platforms Are Driving Women’s Sports Viewership
  • Over 70% of Aussies feel guilty when spending money
  • 5 Types of Purlins: What Are Their Pros and Cons
  • How Sharing Vacation Photos on Social Media Can Cost You
  • Write for Australian Women Online
  • Aussie Mums open male escort agency catering exclusively to women
  • New vs. Used Cars: Know the Pros and Cons of Each
  • Sass & Bide Interstella Printed Sheer Silk Skirt Print

Australian Women Online © Copyright 2007 - 2025 Deborah Robinson ABN 38 119 171 979 · All Rights Reserved