Feeds

Cyberstrike man slammed for spam

Unmetered calls action group hits out at member’s actions

  • alert
  • submit to reddit

Seven Steps to Software Security

The Campaign for Unmetered Telecommunications (CUT) has condemned the actions of a rogue member who sent spam to 25,000 people yesterday. Loose cannon David Hawker sent the unsolicited email to promote a European-wide cyberstrike due to take place on June 6. In open defiance of what many people believe to be the scourge of the Net, Hawker wrote: "If you receive this message then your email address is stored on my computer. This message is being sent out to about 25,000 potential email addresses from my email archives. I apologise in advance if this message is of no interest to you - this is a 'spam', but not the bad variety that most of us know about, rather it may be the first useful spam you've had. :-)" But CUT -- which campaigns for fairer telecomms pricing for Net access -- has condemned the act and apologised for the behaviour of one of its members. "I can only apologise profusely," said Erol Ziya, a spokesman for CUT. "Hawker did it without our knowledge and we do not endorse his actions in any way. I sincerely hope that it doesn't do too much damage to our campaign," he said. Ziya confirmed that Hawker will be reprimanded for his actions and could even be kicked out of CUT for sending the spam. Any decision to expel him from the pressure group will be taken on Monday when the CUT committee gets together for its weekly meetings. ®

Boost IT visibility and business value

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.