Search This Blog

Wednesday, June 30, 2010

Another cyber scam by Nigerian

I have advertised my second hand camera in www.Mudah.my . After one day, a Nigerian guy contacted me. He said that he lives in UK and he wants my camera for his cousin in Nigeria.
He offered my a very god price and took asked for my account number.
I was really suspicious but I just send hi my account number to see what will happen.
After 2 days, I received an email from a bank in UK that there is an amount which has been sent for me. but it is pending till I send them the proof of dispatch.
By investigating their email, address and name of bank, I realized that it was a scam by Nigerian.


Tuesday, June 29, 2010

In Iran, cyber police


With the increase in the use of internet In Iran, government has decided to assign a Police dedication to fight the crimes in the cyber space.
Speaking to Iran's Labor News Agency (ILNA) on Friday, head of the police unit in charge of countering Internet crimes General Mehdi Omidi said the special committee would act against "attempted fraud, illegal advertising, insults and spreading lies and falsehood."
The remarks come as earlier on Thursday Iran's police chief announced the establishment of the special unit to counter Internet crimes.

Ismail Ahmadi-Moqaddam said "in line with crimes committed in cyberspace Iran's Internet police is set to begin its activities soon."

Highlighting the importance of the security of cyberspace, Ahmadi-Moqaddam explained that Iran's police forces are set to boost their capabilities in countering such crimes.
Source : Press TV

Sunday, June 27, 2010

Protecting IP rights in Iran

he new Patent and Trademark Law is before the Assembly and is waiting to be ratified to comply with the WIPO standards for the registration and protection of patents and trademarks. In the meantime, the Islamic Republic of Iran has already deposited with the Director General of the World Intellectual Property Organization (WIPO), its instrument of accession to both the Madrid Agreement and the Madrid Protocol Concerning the International Registration of Marks. This was done on 25th September 2003.

table 1

The Trademark Office has also applied the eighth edition of the International Classification of Goods and Services, bringing the total to 45 classes as of 31st May 2003. According to the new classification, the local class 35, which used to include all service marks, divided into 11 service mark classes. Trademark applications for goods in class 33 remain unacceptable.

Trademark owners are advised to file Iranian applications based on a home or any other foreign registration. Otherwise, it must be mentioned in the application that no registration has been granted for the mark in home or foreign country. Filing the Iranian application based on a foreign registration will be the evidence of prior and continuous use of the trademark.

Friday, June 25, 2010

Cybercrime and the Global Economy: Implications for South Korea and the U.S.


In South Korea and US internet is intensely widespread. I has changed the peoples' way of thinking. living, etc. Thus, illegal activities is also grown. Cybercrime has many faces: from computer hacking and online piracy of copyrighted content, to spam, spyware and malware, or any of a host of other issues unimaginable a few decades ago.

How is the law faring against this ever elusive opponent?
to get the answer, you can listen to this podcast by Joseph DeMarco who shares his perspective on the Internet revolution, evolving trends in cybercrime, and how developments on both sides of the law have forever affected the way businesses, individuals and criminals interact in the global economy.

Podcast Available!





Source : Koran society website.

Tuesday, June 22, 2010

Nigerian and internet Crimes

It is a long time that I am concerned with crimes of Nigerian in the Cyber space. I have received so many email from Nigerian that I have been selected in a lottery for a large amount of money. So many of friends have also faced the same situation.

When I goggled, I have found this article about Nigerian cyber criems.

Five Billion US$ (as of 1996, much more now) worldwide Scam which has run since the early 1980's under Successive Governments of Nigeria. It is also referred to as "Advance Fee Fraud", "419 Fraud" (Four-One-Nine) after the relevant section of the Criminal Code of Nigeria, and "The Nigerian Connection" (mostly in Europe). However, it is usually called plain old "419" even by the Nigerians themselves.

The Scam operates as follows: the target receives an unsolicited fax, email, or letter often concerning Nigeria or another African nationcontaining either a money laundering or other illegal proposal OR you may receive a Legal and Legitimate business proposal by normal means. Common variations on the Scam include "overinvoiced" or "double invoiced" oil or other supply and service contracts where your Bad Guys want to get the overage out of Nigeria; crude oil and other commodity deals; a "bequest" left you in a will; "money cleaning" where your Bad Guy has a lot of currency that needs to be "chemically cleaned" before it can be used and he needs the cost of the chemicals; "spoof banks" where there is supposedly money in your name already on deposit; "paying" for a purchase with a check larger than the amount required and asking for change to be advanced; fake lottery 419; and ordering items and commodities off "trading" sites on the web and then cheating the seller. The variations of Advance Fee Fraud (419) are very creative and virtually endless.


Read more

Sunday, June 20, 2010

Cyber Crime Statistics

I have found cyber crime statistics in filed of Hi-tech . The more cyber crimes increase, the more need for investigation increases as well. The statistic are empirical study on the base of 1500 survey conducted online.

Cyber Crime Statistics from the 2008 Internet Crime Report

In 2008, the Internet Crime Complaint Center received and processed over 200,000 complaints.

More than 86,000 of these complaints were processed and referred to various local, state, and federal law enforcement agencies.

Most of these were consumers and persons filing as private persons.

Total alleged dollar losses were more than $194 million.

Email and websites were the two primary mechanisms for fraud.

Although the total number of complaints decreased by approximately 7,000 complaints from 2005, the total dollar losses increased by $15 million.

The top frauds reported were auction fraud, non-delivery of items, check fraud, and credit card fraud.

Top contact mechanisms for perpetrators to victims were email (74%), web page (36%), and phone (18%) (there was some overlap).

Cyber Crime Statistics from the 12th Annual Computer Crime and Security Survey*

Between 2007 and 2008there was a net increase in IT budget spent on security.

Significantly, however, the percentage of IT budget spent on security awareness training was very low, with 71% of respondents saying less than 5% of the security budget was spent on awareness training, 22% saying less than 1% was spent on such training.

71% of respondents said their company has no external insurance to cover computer security incident losses.

90% of respondents said their company experienced a computer security incident in the past 12 months.

64% of losses were due to the actions of insiders at the company.

The top 3 types of attack, ranked by dollar losses, were:

financial fraud ($21.1 million)

viruses/worms/trojans ($8.4 million)

system penetration by outsiders ($6.8 million)

Cyber Crime Statistics from the Online Victimization of Youth, Five Years Later study*

Increasing numbers of children are being exposed to unwanted sexual materials online.

Reports of online sexual solicitations of youth decreased while reports of aggressive sexual solicitation of youth did not (perhaps indicating that some prevention and education measures may be working, while the most serious offenders may not be deterred).

Online child solicitation offenses are rarely reported to any authority.

Incidents of online harassment and bullying increased.

Thursday, June 17, 2010

The Dating Group Internet Scam

A man has reported that when seeking for job online he came across a posting which said :
Good Day,
We offer a part time job on your computer.

Job Description:
We will provide you with the texts for our employees with the
important information and you will correct the texts as an
english speaking person and send them back to us.

Salary:
We don't have a fixed salary for this vacancy. We will pay you $7.00 for
every 1Kb of the corrected text.
You will get paid at the END of each month.
Every month your salary will be different as it depends on your activity.
Example: If you correct about 5Kb of texts per day you will get over
$1000.00 at the end of the month.

Requirements:
-Location: USA
-Age: 20+
-Home computer, e-mail address and Microsoft Word -Responsibility
To apply for job please send us the following information to:
Dating.Services.73@gmail.com
__________
FULL NAME:
HOME ADDRESS:
CITY, STATE, ZIP CODE:
Phone number (home or cell, but SHOULD BE available any day time):
E-MAIL:
AGE:
OCCUPATION:
EDUCATION:
AVAILABLE HOUR TO WORK WITH US:
----------

As soon as we revise your aplication we will contact you within 24 hours.

If you have any additional questions, feel free to ask.
Awaiting for your application.
With respect
Dating Group Team


Although he felt strange, he applied for the company, after a week he got a respond from the company do to a assignment . after editing assignment and submitting, the company asked for the man's account number. Since he was a wise guy, he started to google about the company and he found out that it was a money laundering scam in Ukraine. They use this method to clean their dirty money.

source : crime research website

Types of IP

Copyright
Copyright is an automatic right which applies when the work is fixed, that is written or recorded in some way.

Wednesday, June 16, 2010

TYPES OF IP

  • Designs
    Designs are what something looks like - from the shape of a take-away cup to the body of jet.

Tuesday, June 15, 2010

Cyber Crime


I have been asked repeatedly in comments to explain more about cyber crime. That's right the interesting idea of IP made me no to deal with cyber crimes in general enough, so I am going to gather more information and news regarding cyber crimes.

Regadrs,
Hoorieh

Types of IP

  • Trade marks
    Trade marks are symbols that distinguish goods and services in the marketplace - like logos and brand names.

Monday, June 14, 2010

Types of IP

  1. Patents
    Patents protect what makes things work - like what makes a wheel turn or the chemical formula of your favourite fizzy drink.

Wednesday, June 9, 2010


India has been provided an e-police to fight against cyber crimes. They has catogorized the
cyber crimes into different types of crimes including Intellectual property too.

The is also a related office which is called cyebr crime polcie station office :







Friday, June 4, 2010

Introducing an article about IP crimes

I have found an article which reviews the intellectual property crime by addressing the problems and the factors contributing to the growth of intellectual property crime. This article has tried to analyse the cost to the right holder and the legal protection relating to intellectual property crime while also providing the Indian perspective to the whole issue.
The info :
INTELLECTUAL PROPERTY CRIME
Authored by Dr. Sudhir Ravindran & S.A. Chenthil Kumaran
IP Consultants with Altacit Global