
Monthly inside-back-cover column in the Communications of the ACM. "Inside Risks" distills some of the discussion into a Is maintained by Lindsay Marshall, and includes a nice search facility. "login anonymous", "cd risks" (which gets the "dir" for the current volume,Īnd "cd i" then gets you into the subdirectory for any preceding volume i = Line "subscribe" (append desired address only if not your From: address), or Send e-mail to for a subscription, single text Read the Risks Forum as comp.risks if you can, or SEN regular issues, by year, volume&number This list is updated at least quarterly and is browsable on-lineĬheong's Hyperlatex), also printable in a two-column 8-point format Please send me corrections and new cases, along with suitable references. A fewĪre of questionable authenticity, and are noted as such ("bogus?"). Some incidents are well documented, while others need further study. Security and Control Review, where vol 16 is 1998, which was the final Year, with vol 25 being the year 2000 page numbers are given primarily onlyįrom 1993 on (SAC vol no) indicates an item in the quarterly SIGSAC Vol no:page) denotes an issue of SEN, where there has been one volume per Of mostly one-liner summaries, (R i j) denotes RISKS volume i issue j (S Published ACM SIGSOFT Software Engineering Notes (SEN). This list summarizes items that have appeared in the Internet Risks Forumĭigest (RISKS) - which I moderate (comp.risks newsgroup) - and/or Achieving Better System Development and Operation.Other Computer System Development Difficulties.Further Miscellaneous Hardware/Software Problems.Calendar/Date/Clock Problems including Y2K.Identity Theft, Mistakes, Related Problems.Law Enforcement Abuses, False Arrests, etc.Other Unintentional Denials of Service:.Spamming, Junkmail, and Related Annoyances:.Other Telephone and Communication Problems.Financial Frauds and Intentionally Caused Losses.

