• Home
  • About
    • Privacy Policy
    • Write for Australian Women Online
  • Advertise With Us
  • Horoscopes
  • Style
  • Shoe Boutique
  • eFashion
  • Weight Watchers Australia

Australian Women Online

Business, career, health and lifestyle content for women

  • Home
  • BLOG
  • BOOKS
  • BUSINESS
  • CAREER
  • COOKING
  • HEALTH
  • LIFESTYLE
    • Automotive
    • Beauty
    • Fashion
    • Pets
    • Relationships
    • Your Home
    • Your Money
  • TECHNOLOGY
  • TRAVEL
    • Discount Holidays
You are here: Home / TECHNOLOGY / Hacking case highlights the dangers of file-sharing

Hacking case highlights the dangers of file-sharing

23 August 2008 by Australian Women Online

Share this:

  • Tweet
  • Click to email a link to a friend (Opens in new window) Email
  • More
  • Share on Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to print (Opens in new window) Print
  • Click to share on WhatsApp (Opens in new window) WhatsApp

ISACA, an association serving more than 86,000 IT governance professionals, says that a significant court case in the United States, in which a 19-year-old hacker has pleaded guilty to modifying a file-sharing application, highlights the dangers of using this type of software.

File-sharing while at work is becoming increasingly common and exposing companies to serious risk, according to ISACA.

A recent national survey of U.S. white-collar workers commissioned by ISACA found that more than one-third (35%) of employees have violated their company’s information technology (IT) policies at least once and that nearly one-sixth (15%) of employees have used peer-to-peer file-sharing at least once at their place of business, opening the door to security breaches and placing sensitive business and personal information at risk.

“Considering that companies rely on their IT infrastructure to store and transmit sensitive company, employee and customer data, risky activities including the ones this survey reveals are of significant concern for all businesses,” said John Pironti, member of ISACA’s Education Board.

“A single seemingly harmless activity, such as using peer-to-peer networks while at work, can breach the confidentiality and security of an entire corporate network, including all of the documents, data and internal communications that reside on that network. On average, at a company of 1,000 white-collar employees, up to 70 employees are likely using peer-to-peer file sharing while at work often or very often, based on the survey findings. Companies and employees should be very concerned about their personal and corporate data in light of this information.”

However, the opposite seems to be true. For example, the telephone survey found that 65% of white-collar professionals are either not very concerned or not concerned at all about their privacy when using a workplace computer. A surprising 63% are not very concerned or are not concerned at all about the security of their information while at work.

Reports on the Limewire case suggest that Jason Milmont faces up to five years in prison and a possible fine of up to $250,000 for modifying Limewire, a popular file-sharing application, which was subsequently used by as many as 15,000 other Internet users.

People that used Milmont’s modified version of Limewire ended up infecting their own machines with botnets, which could then do almost anything on the host PC, ranging from stealing their financial information to forming part of a network to attack major Web portals.

According to Sarb Sembhi, president of the ISACA London Chapter, the case is particularly interesting as, faced with an onslaught of evidence, the Cheyenne, Wyoming-based man has pleaded guilty to the charges.

“This is the first time anyone has been prosecuted for modifying peer-to-peer software in this way and, as such, it highlights the fact that using P2P services and software is a dangerous hobby—with potential legal consequences,” Mr Sembhi said.

For more on the Limewire hacking prosecution visit http://tinyurl.com/6zxut3

You May Also Like:

Filed Under: TECHNOLOGY

Ads by Google
  • Facebook
  • LinkedIn
  • Pinterest
  • Twitter

New Content

  • How to Ladder Your Term Deposits for Maximum Flexibility & Returns
  • Women in Wagering: How the Industry is Finally Tapping Female Players
  • Demolition Safety: 10 Essential Safety Tips and Guidelines
  • The Best E-Scooters in Australia: Features to Look For in 2025
  • Tips for Lingerie Shopping
  • The Checklist: How to Maintain a Commercial Vehicle
  • Safe and Fast: Payment Methods Used by Aussie Online Casino Players
  • Shade Without the Struggle: The Pergola That Makes Sense
  • Creating a Supportive Work Environment with Mental Health and Wellbeing Services
  • 10 Questions You Should Ask to Find the Right Pop-up Camper for You

Popular Content

  • Moore Weekly Stars
  • Sexy and Stylish Short Hairstyles for Women Over 60
  • Write for Australian Women Online
  • Woolworths on board as Fresh Food supporter of 2018 Commonwealth Games
  • Women Who Have Become Gambling Legends
  • How to Ladder Your Term Deposits for Maximum Flexibility & Returns
  • Tigerlily Tanoosa Maxi Dress
  • CHARLES & KEITH Quilted Push-Lock Sling Bag
  • Cue Zip Front Leather Jacket
  • Veronika Maine Monochrome Zebra Georgette Dress Black/White

Australian Women Online © Copyright 2007 - 2025 Deborah Robinson ABN 38 119 171 979 · All Rights Reserved