Search This Blog

Wednesday, July 7, 2010

Protect your Computer against cyber dangers



To protect you computer against internet scum and frauds, be careful in searching below words:

Lyrics: lyrics of a song, since most children in the age of 12-15 don’t know better to just click on ANY link.

Free or Gratis: Nop matter you know different languages or not but words like this can make you in trouble . Spyware, adware, and viruses leak freely to these search terms.

Gear, gadgets, and games – If you want to get aware of what’s the latest in gadgets, please visit here more often.

Olympics – Michael Phelps was amazing for the United States,because he won all th medals. , but now people are wondering what his next move is… This could lead to spyware being installed on your computer also.

Videos – one of the most vulnerable thins is video, like YouTube, which is Flash.

These are the advises :

1) Anti virus and ad ware software, run every single day. Ad-Ware, SpyBot, Symantic…these should all be companies that you are not only aware of but also quite familiar with when it comes to online safety. These programs will help keep your identity safe.

2) Monitor your childrens’ activities on the internet. Just make sure that they aren’t giving out any personal information to anyone on the internet.

3) Make sure that there are certain steps that you are taking to prevent identity theft other than those listed above. This weekend Lizzie mentioned shopping online for things. Well, most credit card companies now offer ways to shop a little safer including virtual numbers. With a virtual number you can shop and if some online retailer decides to take your credit number for a “spin” they won’t get very far.

Keep these things in mind and perhaps you can have a clear conscious when going to bed at night.

Tuesday, July 6, 2010

The growth of Cyber crime, a report by VOA

This video is a report by VOA regarding cyber crime :

Sunday, July 4, 2010


This post is aimed to introduce Malaysian Fraud Report in cyber space. In their posts, they warn, introduce and mention those preparing scam to deceive people which is mostly due to getting money by trick.
Most of the reported scam are job finding websites. you can read a full report of their discovered frauds by clicking here .

Thursday, July 1, 2010

Rise of Cyber Crime

Rise of Cyber crimes : Just Push to play

Wednesday, June 30, 2010

Another cyber scam by Nigerian

I have advertised my second hand camera in www.Mudah.my . After one day, a Nigerian guy contacted me. He said that he lives in UK and he wants my camera for his cousin in Nigeria.
He offered my a very god price and took asked for my account number.
I was really suspicious but I just send hi my account number to see what will happen.
After 2 days, I received an email from a bank in UK that there is an amount which has been sent for me. but it is pending till I send them the proof of dispatch.
By investigating their email, address and name of bank, I realized that it was a scam by Nigerian.


Tuesday, June 29, 2010

In Iran, cyber police


With the increase in the use of internet In Iran, government has decided to assign a Police dedication to fight the crimes in the cyber space.
Speaking to Iran's Labor News Agency (ILNA) on Friday, head of the police unit in charge of countering Internet crimes General Mehdi Omidi said the special committee would act against "attempted fraud, illegal advertising, insults and spreading lies and falsehood."
The remarks come as earlier on Thursday Iran's police chief announced the establishment of the special unit to counter Internet crimes.

Ismail Ahmadi-Moqaddam said "in line with crimes committed in cyberspace Iran's Internet police is set to begin its activities soon."

Highlighting the importance of the security of cyberspace, Ahmadi-Moqaddam explained that Iran's police forces are set to boost their capabilities in countering such crimes.
Source : Press TV

Sunday, June 27, 2010

Protecting IP rights in Iran

he new Patent and Trademark Law is before the Assembly and is waiting to be ratified to comply with the WIPO standards for the registration and protection of patents and trademarks. In the meantime, the Islamic Republic of Iran has already deposited with the Director General of the World Intellectual Property Organization (WIPO), its instrument of accession to both the Madrid Agreement and the Madrid Protocol Concerning the International Registration of Marks. This was done on 25th September 2003.

table 1

The Trademark Office has also applied the eighth edition of the International Classification of Goods and Services, bringing the total to 45 classes as of 31st May 2003. According to the new classification, the local class 35, which used to include all service marks, divided into 11 service mark classes. Trademark applications for goods in class 33 remain unacceptable.

Trademark owners are advised to file Iranian applications based on a home or any other foreign registration. Otherwise, it must be mentioned in the application that no registration has been granted for the mark in home or foreign country. Filing the Iranian application based on a foreign registration will be the evidence of prior and continuous use of the trademark.

Friday, June 25, 2010

Cybercrime and the Global Economy: Implications for South Korea and the U.S.


In South Korea and US internet is intensely widespread. I has changed the peoples' way of thinking. living, etc. Thus, illegal activities is also grown. Cybercrime has many faces: from computer hacking and online piracy of copyrighted content, to spam, spyware and malware, or any of a host of other issues unimaginable a few decades ago.

How is the law faring against this ever elusive opponent?
to get the answer, you can listen to this podcast by Joseph DeMarco who shares his perspective on the Internet revolution, evolving trends in cybercrime, and how developments on both sides of the law have forever affected the way businesses, individuals and criminals interact in the global economy.

Podcast Available!





Source : Koran society website.

Tuesday, June 22, 2010

Nigerian and internet Crimes

It is a long time that I am concerned with crimes of Nigerian in the Cyber space. I have received so many email from Nigerian that I have been selected in a lottery for a large amount of money. So many of friends have also faced the same situation.

When I goggled, I have found this article about Nigerian cyber criems.

Five Billion US$ (as of 1996, much more now) worldwide Scam which has run since the early 1980's under Successive Governments of Nigeria. It is also referred to as "Advance Fee Fraud", "419 Fraud" (Four-One-Nine) after the relevant section of the Criminal Code of Nigeria, and "The Nigerian Connection" (mostly in Europe). However, it is usually called plain old "419" even by the Nigerians themselves.

The Scam operates as follows: the target receives an unsolicited fax, email, or letter often concerning Nigeria or another African nationcontaining either a money laundering or other illegal proposal OR you may receive a Legal and Legitimate business proposal by normal means. Common variations on the Scam include "overinvoiced" or "double invoiced" oil or other supply and service contracts where your Bad Guys want to get the overage out of Nigeria; crude oil and other commodity deals; a "bequest" left you in a will; "money cleaning" where your Bad Guy has a lot of currency that needs to be "chemically cleaned" before it can be used and he needs the cost of the chemicals; "spoof banks" where there is supposedly money in your name already on deposit; "paying" for a purchase with a check larger than the amount required and asking for change to be advanced; fake lottery 419; and ordering items and commodities off "trading" sites on the web and then cheating the seller. The variations of Advance Fee Fraud (419) are very creative and virtually endless.


Read more

Sunday, June 20, 2010

Cyber Crime Statistics

I have found cyber crime statistics in filed of Hi-tech . The more cyber crimes increase, the more need for investigation increases as well. The statistic are empirical study on the base of 1500 survey conducted online.

Cyber Crime Statistics from the 2008 Internet Crime Report

In 2008, the Internet Crime Complaint Center received and processed over 200,000 complaints.

More than 86,000 of these complaints were processed and referred to various local, state, and federal law enforcement agencies.

Most of these were consumers and persons filing as private persons.

Total alleged dollar losses were more than $194 million.

Email and websites were the two primary mechanisms for fraud.

Although the total number of complaints decreased by approximately 7,000 complaints from 2005, the total dollar losses increased by $15 million.

The top frauds reported were auction fraud, non-delivery of items, check fraud, and credit card fraud.

Top contact mechanisms for perpetrators to victims were email (74%), web page (36%), and phone (18%) (there was some overlap).

Cyber Crime Statistics from the 12th Annual Computer Crime and Security Survey*

Between 2007 and 2008there was a net increase in IT budget spent on security.

Significantly, however, the percentage of IT budget spent on security awareness training was very low, with 71% of respondents saying less than 5% of the security budget was spent on awareness training, 22% saying less than 1% was spent on such training.

71% of respondents said their company has no external insurance to cover computer security incident losses.

90% of respondents said their company experienced a computer security incident in the past 12 months.

64% of losses were due to the actions of insiders at the company.

The top 3 types of attack, ranked by dollar losses, were:

financial fraud ($21.1 million)

viruses/worms/trojans ($8.4 million)

system penetration by outsiders ($6.8 million)

Cyber Crime Statistics from the Online Victimization of Youth, Five Years Later study*

Increasing numbers of children are being exposed to unwanted sexual materials online.

Reports of online sexual solicitations of youth decreased while reports of aggressive sexual solicitation of youth did not (perhaps indicating that some prevention and education measures may be working, while the most serious offenders may not be deterred).

Online child solicitation offenses are rarely reported to any authority.

Incidents of online harassment and bullying increased.

Thursday, June 17, 2010

The Dating Group Internet Scam

A man has reported that when seeking for job online he came across a posting which said :
Good Day,
We offer a part time job on your computer.

Job Description:
We will provide you with the texts for our employees with the
important information and you will correct the texts as an
english speaking person and send them back to us.

Salary:
We don't have a fixed salary for this vacancy. We will pay you $7.00 for
every 1Kb of the corrected text.
You will get paid at the END of each month.
Every month your salary will be different as it depends on your activity.
Example: If you correct about 5Kb of texts per day you will get over
$1000.00 at the end of the month.

Requirements:
-Location: USA
-Age: 20+
-Home computer, e-mail address and Microsoft Word -Responsibility
To apply for job please send us the following information to:
Dating.Services.73@gmail.com
__________
FULL NAME:
HOME ADDRESS:
CITY, STATE, ZIP CODE:
Phone number (home or cell, but SHOULD BE available any day time):
E-MAIL:
AGE:
OCCUPATION:
EDUCATION:
AVAILABLE HOUR TO WORK WITH US:
----------

As soon as we revise your aplication we will contact you within 24 hours.

If you have any additional questions, feel free to ask.
Awaiting for your application.
With respect
Dating Group Team


Although he felt strange, he applied for the company, after a week he got a respond from the company do to a assignment . after editing assignment and submitting, the company asked for the man's account number. Since he was a wise guy, he started to google about the company and he found out that it was a money laundering scam in Ukraine. They use this method to clean their dirty money.

source : crime research website

Types of IP

Copyright
Copyright is an automatic right which applies when the work is fixed, that is written or recorded in some way.

Wednesday, June 16, 2010

TYPES OF IP

  • Designs
    Designs are what something looks like - from the shape of a take-away cup to the body of jet.

Tuesday, June 15, 2010

Cyber Crime


I have been asked repeatedly in comments to explain more about cyber crime. That's right the interesting idea of IP made me no to deal with cyber crimes in general enough, so I am going to gather more information and news regarding cyber crimes.

Regadrs,
Hoorieh

Types of IP

  • Trade marks
    Trade marks are symbols that distinguish goods and services in the marketplace - like logos and brand names.

Monday, June 14, 2010

Types of IP

  1. Patents
    Patents protect what makes things work - like what makes a wheel turn or the chemical formula of your favourite fizzy drink.

Wednesday, June 9, 2010


India has been provided an e-police to fight against cyber crimes. They has catogorized the
cyber crimes into different types of crimes including Intellectual property too.

The is also a related office which is called cyebr crime polcie station office :







Friday, June 4, 2010

Introducing an article about IP crimes

I have found an article which reviews the intellectual property crime by addressing the problems and the factors contributing to the growth of intellectual property crime. This article has tried to analyse the cost to the right holder and the legal protection relating to intellectual property crime while also providing the Indian perspective to the whole issue.
The info :
INTELLECTUAL PROPERTY CRIME
Authored by Dr. Sudhir Ravindran & S.A. Chenthil Kumaran
IP Consultants with Altacit Global

Saturday, May 29, 2010

Intellectual Property on the Internet: A Survey of Issues




A report has been published WIPO under the title of "Intellectual Property on the Internet: A Survey of Issues" in which the effects of digital technology and internet in particular have on the IP systems.
After a brief introduction describing general trends affecting the evolution of the Internet, the Survey addresses the evolving digital economy and the migration of intellectual property to the Internet, as well as the broader questions raised for intellectual property by the impact of information and communications technologies in the digital environment.

This report is accessible through

Monday, May 24, 2010

Free Intellectual Property App for Iphone


Recently, a free application of iphone has been relased by PLC in which you have access to wide range of patents, trademarks and copyright sources.
It has been made easy to access over he status of trademark and patent applications, review relevant statutes, and keep up with popular intellectual property blogs.
Apptorney: IP is available free from the App Store on iPhone, iPad, and iPod touch at http://itunes.apple.com/us/app/apptorney-ip/id369878225?mt=8.

Tuesday, May 18, 2010


The popular file-hosting service RapidShare is not guilty of copyright infringement, the United States District Court of California has ruled. The ruling is an important victory for RapidShare, which has been increasingly targeted by the entertainment industries.
Last year, adult media company Perfect 10 filed a lawsuit against the leading file-hosting service, RapidShare. Among other claims, Perfect 10’s lawsuit stated that RapidShare was guilty of infringing the copyrights of many of its images.
RapidShare itself does all it can to avoid such claims and is hoping to convert pirates into paying customers. Instead of simply removing pages where copyrighted material can be downloaded, RapidShare would like to redirect users to an online store where the same content can be bought legally.

Thursday, May 13, 2010

Types of IP

Intellectual Property (IP) is about far more than just Patents. There are four main types of IP rights which you can use to protect your inventions or creations.

U.S. unveils plan to fight intellectual property piracy




WASHINGTON - The United States unveiled a wide-ranging strategic plan on Tuesday protect intellectual property from pharmaceuticals to films and pledged to confront governments that fail to crack down on piracy.

“Piracy hurts, it hurts our economy,” Vice-President Joe Biden said in releasing the 61-page plan drafted by several government agencies.

“It hurts our health and safety. We need to protect our citizens from unsafe products [such as] counterfeit pharmaceuticals.”

Victoria Espinel, co-ordinator of the intellectual property task force, said China — which has long been singled out for allowing piracy of software, music and other goods — would remain under close scrutiny for copyright and patent protection.

“We will initiate a comprehensive review of current efforts in support of U.S. businesses that have difficulty enforcing their intellectual property rights in overseas markets, with a particular focus on China,” she said.

The plan underscores U.S. efforts to protect U.S. products and service from piracy, citing the range of vulnerable items such as pharmaceuticals, medical devices, software, films and music.



Read more: http://www.nationalpost.com/news/unveils+plan+fight+intellectual+property+piracy/3187224/story.html#ixzz0rkKFlPuM

Read more: http://www.nationalpost.com/news/unveils+plan+fight+intellectual+property+piracy/3187224/story.html#ixzz0rkKByJ17

Monday, May 10, 2010

The intelectual Property Office of UK


Every nation tries to protect the Intellectual Properties. The IP office of UK helps the people to protect their ideas, innovations, creation or invention.
Patents, trade marks, designs and copyright are the services if this office. They claimed that Intellectual Property (IP) results from the expression of an idea. So IP might be a brand, an invention, a design, a song or another intellectual creation. IP can be owned, bought and sold.

Saturday, May 8, 2010



Intellectual property as an important issue to protect the innovations and creativity has been put in the limelight by apple . In Jan 2009, apple has been awarded by Us Trademark office the patent covering the key aspects of iphone's multi touch interface.

Steve Jobs, as the first auther , of the published 356 pages of drawings describing the iphone's functions and operation systems interface.

Source

Thursday, May 6, 2010

The necessity of protecting Intellectual Property


The necessity of protecting Intellectual properties is unclear to some people. They ask why the IP must be protected.

The answer is that innovation is something critical for every field. If innovation and creativity were not secured and protected, businesses would not reap the full benefits of their inventions and would focus less on research and development.


Tuesday, May 4, 2010




In this post of my weblog, I am gonna introduce a digital water marking to protect the intelectual Property. :

"
Visual Watermark is photo watermarking software for digital photo protection. This photo watermark software places very strong watermarks that no one can remove. Your digital photos will be effectively protected from unauthorized use. It is useful for everyone who wants to protect their photos.


"
By paying only 20$ . Pictures could be protected .

Richard Humphrey, USAWAREZ.COM Operator Sentenced for Selling Pirated Copies of Movies


Richard Humphrey, 22, of North Ridgeville, Ohio, due to distributing and selling of counterfeit copyrighted movies in the internet was sentenced to 29 months in prison. This was made but the judge of District Court Judge Lesley Wells. being 3 years under supervision after his 29 months in prison is the other side of his sentence. All the computers and hard drives being used by Humphery for this crime were forfeited .
His main website of activity was USAWAREZ.COM in which he has distributed many copies of movies, games and software product without authorization from the copyright owners.
This crime has been detected by Attorneys Tyler Newby and Tara Swaminatha of the
Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S.



Tuesday, April 27, 2010

Digital watermarking








Internet has made intellectual property rights more susceptible to violations. But there are many kinds of digital management solutions to defend IP portfolios. Nowadays, there is many of companies proffering a diversity of digital programs for IP management.one of these programs called “digital watermarking” that created by Digimarc, an American provider of IP management solutions.

Digital Watermarking allows copyright owners to track distribution, access and payment of its material. Bits of information are embedded in data codes that are imperceptible during normal use but readable by computers and software. Digital watermarks may be used in audio, video, images, printed documents, music and any digital or analog format. The watermarks are made very difficult to remove, and if removed, there would be a distortion of the IP material.


Source: http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1711

http://www.alpvision.com/watermarking.html

Sunday, April 18, 2010

Cyber Crime - Intellectual Property Theft


Intellectual property (IP) theft is defined as theft of material that is copyrighted, the theft of trade secrets, and trademark violations. A copyright is the legal right of an author, publisher, composer, or other person who creates a work to exclusively print, publish, distribute, or perform the work in public. The United States leads the world in the creation and selling of IP products to buyers nationwide and internationally. Examples of copyrighted material commonly stolen online are computer software, recorded music, movies, and electronic games.

Theft of trade secrets means the theft of ideas, plans, methods, technologies, or any sensitive information from all types of industries including manufacturers, financial service institutions, and the computer industry. Trade secrets are plans for a higher speed computer, designs for a highly fuel-efficient car, a company's manufacturing procedures, or the recipe for a popular salad dressing, cookie mix, or barbeque sauce. These secrets are owned by the company and give it a competitive edge. Theft of trade secrets damages the competitive edge and therefore the economic base of a business.

A trademark is the registered name or identifying symbol of a product that can be used only by the product's owner. A trademark violation involves counterfeiting or copying brand name products such as well-known types of shoes, clothing, and electronics equipment and selling them as the genuine or original product.

The owner of Napster at a 2001 news conference following a court ruling that the company must stop allowing users to share copyrighted music.(AP/Wide World Photos)

The two forms of IP most frequently involved in cyber crime are copyrighted material and trade secrets. Piracy is a term used to describe IP theft—piracy of software, piracy of music, etc. Theft of IP affects the entire U.S. economy. Billions of dollars are lost every year to IP pirates. For example, thieves sell pirated computer software for games or programs to millions of Internet users. The company that actually produced the real product loses these sales and royalties rightfully due to the original creator.

Historically, when there were no computers, IP crimes involved a lot of time and labor. Movie or music tapes had to be copied, physically produced, and transported for sale. An individual had to make the sale in person. To steal a trade secret, actual paper plans, files, or blueprints would have to be physically taken from a company's building and likewise sold in person.

In the twenty-first century software, music, and trade secret pirates operate through the Internet. Anything that can be digitized—reduced to a series of zeroes and ones—can be transmitted rapidly from one computer to another. There is no reduction of quality in second, third, or fourth generation copies. Pirated digital copies of copyrighted work transmitted over the Internet are known as "warez." Warez groups are responsible for illegally copying and distributing hundreds of millions of dollars of copyrighted material.

Pirated trade secrets are sold to other companies or illegal groups. Trade secrets no longer have to be physically stolen from a company. Instead, corporate plans and secrets are downloaded by pirates onto a computer disc. The stolen information can be transmitted worldwide in minutes. Trade secret pirates find pathways into a company's computer systems and download the items to be copied. Companies keep almost everything in their computer files. Pirated copies are sold over the Internet to customers who provide their credit card numbers then download the copy.



Read more: Cyber Crime - Intellectual Property Theft http://law.jrank.org/pages/11992/Cyber-Crime-Intellectual-property-theft.html#ixzz0lTCJhWbz

An Introduction to Intellectual Property

Intellectual property (IP) is a term referring to a number of distinct types of legal monopolies over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets in some jurisdictions.

Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the 19th century that the term intellectual property began to be used, and not until the late 20th century that it became commonplace in the United States.[2] The British Statute of Anne 1710 and the Statute of Monopolies 1623 are now seen as the origin of copyright and patent law respectively.[3]