3G means more porn, China laments amid cleanup

China called for a cleanup of mobile porn Web sites on Wednesday, blaming their rise on high-speed mobile data services, deployment of which has otherwise been a point of pride for the country. This year the country has also closed thousands of Web sites and arrested dozens in a campaign against online pornography that is increasingly shifting focus to mobile Web sites. "Lawless people have begun using the full commercial deployment of 3G and its faster download speeds for pictures and videos... to spread obscene and pornographic content," Su Jinsheng, an engineer in China's IT ministry, said in a speech, according to a transcript on the ministry Web site. China issued 3G (third generation) mobile network licenses to its three mobile carriers early this year, and the number of 3G users in China has slowly climbed since then.

A cleanup is needed to "protect the healthy growth of the next generation and purify the social environment," he said. But owners of mobile porn Web sites have been able to evade authorities through technical tactics such as frequently switching domain names and IP (Internet Protocol) addresses, Su said. China sees its long-delayed rollout of 3G services as a step toward its goal of becoming a global technology power. Counter-tactics being used by authorities include a blacklist to prevent pornographic Web sites from reappearing online and the design of content-filtering technology to help network operators themselves block obscene content, he said, giving a rare official glimpse into how Chinese regulators control information on the Internet. Earlier this year Google had a row with Chinese authorities over pornographic search results that ultimately led to Google.com and other Google services being briefly blocked in the country.

Pornography is illegal in China and authorities have long seen it as a scourge on the country's culture.

World of Warcraft players targeted by 'free mounts' phishing scheme

The popular online game World of Warcraft (WoW) is being hit with a new phishing scheme that lets attackers steal players' accumulated "gold" and other treasure by luring players with offers of free "mounts" used in the online game, say security researchers at F-Secure. The link takes the player to a site that looks exactly like World of Warcraft and offers them free "mounts," the fantasy horses that humans would ride or trusted wolf mounts that the Orcs prefer, which have powers like helping move the player more quickly through the game or defend them against monsters. It's an attack that exploits the WoW-based in-game chat to lure a player into clicking on a link. If the victim falls for the "free mounts" phishing fraud and enters his online credentials, the attacker can take over his account and steal all the "gold" or other treasures the player accumulated in the game's progress. "This is like physical property, it can be traded," said Sean Sullivan, security researcher at F-Secure about the value of the online game's items like "gold" and "mounts," which can bring money in auctions in sites in China, for example.

Sullivan added that over two years ago, eBay declared a ban on auctioning WoW items like fantasy "gold," apparently because of the fraud level. The latest phishing scam to hit WoW, which F-Secure describes here, is a new twist on some of the older attacks that made use of malicious banner ads on WoW to try and install trojans on victim's desktops. The current "mounts" phishing scam allows the successful attacker to steal whatever treasures the victim has associated with the WoW account, and then to go after other victims. F-Secure's Internet Security 2010 product recognizes this type of phishing scam and blocks against it, the vendor says.

Microsoft: No TCP/IP patches for you, XP

Microsoft late last week said it won't patch Windows XP for a pair of bugs it quashed Sept. 8 in Vista, Windows Server 2003 and Windows Server 2008. The news adds Windows XP Service Pack 2 (SP2) and SP3 to the no-patch list that previously included only Windows 2000 Server SP4. "We're talking about code that is 12 to 15 years old in its origin, so backporting that level of code is essentially not feasible," said security program manager Adrian Stone during Microsoft's monthly post-patch Webcast , referring to Windows 2000 and XP. "An update for Windows XP will not be made available," Stone and fellow program manager Jerry Bryant said during the Q&A portion of the Webcast ( transcript here ). Last Tuesday, Microsoft said that it wasn't patching Windows 2000 because creating a fix was "infeasible." The bugs in question are in Windows' implementation of TCP/IP, the Web's default suite of connection protocols. In the revised advisory, Microsoft explained why it won't patch Windows XP, the world's most popular operating system . "By default, Windows XP SP2, Windows XP SP3 and Windows XP Professional x64 Edition SP2 do not have a listening service configured in the client firewall and are therefore not affected by this vulnerability," the company said. "Windows XP SP2 and later operating systems include a stateful host firewall that provides protection for computers against incoming traffic from the Internet or from neighboring network devices on a private network." Although the two bugs can be exploited on Windows 2000 and XP, Microsoft downplayed their impact. "A system would become unresponsive due to memory consumption ... [but] a successful attack requires a sustained flood of specially crafted TCP packets, and the system will recover once the flood ceases." Microsoft rated the vulnerabilities on Windows 2000 and XP as "important" on Windows 2000, and as "low" on XP. The company uses a four-step scoring system, where "low" is the least-dangerous threat, followed in ascending order by "moderate," "important" and "critical." The same two bugs were ranked "moderate" for Vista and Server 2008, while a third - which doesn't affect the older operating systems - was rated "critical." During the Q&A, however, Windows users repeatedly asked Microsoft's security team to explain why it wasn't patching XP, or if, in certain scenarios, their machines might be at risk. "We still use Windows XP and we do not use Windows Firewall," read one of the user questions. "We use a third-party vendor firewall product. All three of the vulnerabilities highlighted in the MS09-048 update were patched in Vista and Server 2008. Only two of the trio affect Windows Server 2000 and Windows XP, Microsoft said in the accompanying advisory, which was refreshed on Thursday.

Even assuming that we use the Windows Firewall, if there are services listening, such as remote desktop, wouldn't then Windows XP be vulnerable to this?" "Servers are a more likely target for this attack, and your firewall should provide additional protections against external exploits," replied Stone and Bryant. Windows Server 2000 SP4, for example, is to receive security updates until July 2010; Windows XP's support doesn't expire until April 2014. Stone's and Bryant's answer: "We will continue to provide updates for Windows 2000 while it is in support unless it is not technically feasible to do so." Skipping patches is very unusual for Microsoft. Another user asked them to spell out the conditions under which Microsoft won't offer up patches for still-supported operating systems. According to a Stone and Bryant, the last time it declined to patch a vulnerability in a support edition of Windows was in March 2003 , when it said it wouldn't fix a bug in Windows NT 4.0. Then, it explained the omission with language very similar to what it used when it said it wouldn't update Windows 2000. "Due to these fundamental differences between Windows NT 4.0 and Windows 2000 and its successors, it is infeasible to rebuild the software for Windows NT 4.0 to eliminate the vulnerability," Microsoft said at the time.

IBM offers cheaper Linux mainframe bundles

IBM is introducing new Linux-focused mainframe bundles that it says will provide discounts of up to 80% over previous offerings. But Linux has been a bright spot, with 70% of IBM's top 100 mainframe customers running Linux, according to Gartner. How to really bury a mainframe IBM's mainframe business has struggled in 2009, with year-over-year revenue declines of 26% in the third quarter and 39% in the second quarter. In an attempt to boost falling sales, IBM has taken several steps to lure new customers and capitalize on interest in consolidating Linux workloads on mainframes using IBM's virtualization technology.

IBM also cut prices nearly in half for some specialty Linux processors known as Integrated Facility for Linux (IFL). In IBM's latest move, announced Tuesday, the company is releasing a new mainframe bundle called the Enterprise Linux Server, which starts at a little more than $200,000. The least expensive version includes two IFL processors, plus memory, I/O connectivity, licenses for the z/VM mainframe virtualization software, and three years worth of maintenance. In August IBM released seven hardware, software and services packages which are known as the "Solution Edition Series" and are aimed at specific application workloads like data warehousing and SAP software. The business class version can scale up to 10 IFLs, while the enterprise class machine can scale up to 64. Savings per processor improve the more a customer buys, and can cost as much as 80% less than previous mainframe offerings, according to IBM. The basic $200,000 machine with two IFL processors can run about 50 Linux-based virtual machines, says Reed Mullen, IBM's System z virtualization strategy manager. IBM hopes to lure customers away from competing platforms such as Itanium and Sun's Solaris, he says. IBM partners Novell and Red Hat are offering discounted Linux licenses when purchased with the Enterprise Linux Server.

IBM has been successful in selling more capacity to existing Linux-on-mainframe customers, but has had trouble convincing new organizations of the economic benefits of putting Linux on System z, Mullen says. "We want to target not just existing mainframe clients with this solution, we also want to target non-mainframe clients who are waking up to some of the realities of large-scale server consolidation," he says. "We believe those who have yet to embrace Linux on the mainframe are ready to do so more aggressively." In addition to the Enterprise Linux Server, IBM is releasing two new Solution Edition bundles, one for Linux and one for Chordiant CRM software. Because IBM mainframe's division is struggling, now is a good time for customers to negotiate with Big Blue, Gartner analyst Mike Chuba recently said. While the Enterprise Linux Server is a stand-alone mainframe for new deployments, the Solution Edition bundles add capacity to existing machines, according to Mullen. The Solution Edition bundles represent some of the best deals IBM has offered to date. "If you're going to go into a negotiation with IBM right now and want to get the best price, the first two words out of your mouth should be 'solution edition,'" Chuba said. Follow Jon Brodkin on Twitter.