Search This Blog
Wednesday, June 30, 2010
Another cyber scam by Nigerian
Tuesday, June 29, 2010
In Iran, cyber police
Ismail Ahmadi-Moqaddam said "in line with crimes committed in cyberspace Iran's Internet police is set to begin its activities soon."
Highlighting the importance of the security of cyberspace, Ahmadi-Moqaddam explained that Iran's police forces are set to boost their capabilities in countering such crimes.
Sunday, June 27, 2010
Protecting IP rights in Iran
The Trademark Office has also applied the eighth edition of the International Classification of Goods and Services, bringing the total to 45 classes as of 31st May 2003. According to the new classification, the local class 35, which used to include all service marks, divided into 11 service mark classes. Trademark applications for goods in class 33 remain unacceptable.
Trademark owners are advised to file Iranian applications based on a home or any other foreign registration. Otherwise, it must be mentioned in the application that no registration has been granted for the mark in home or foreign country. Filing the Iranian application based on a foreign registration will be the evidence of prior and continuous use of the trademark.
Friday, June 25, 2010
Cybercrime and the Global Economy: Implications for South Korea and the U.S.
Tuesday, June 22, 2010
Nigerian and internet Crimes
When I goggled, I have found this article about Nigerian cyber criems.
Five Billion US$ (as of 1996, much more now) worldwide Scam which has run since the early 1980's under Successive Governments of Nigeria. It is also referred to as "Advance Fee Fraud", "419 Fraud" (Four-One-Nine) after the relevant section of the Criminal Code of Nigeria, and "The Nigerian Connection" (mostly in Europe). However, it is usually called plain old "419" even by the Nigerians themselves.
The Scam operates as follows: the target receives an unsolicited fax, email, or letter often concerning Nigeria or another African nationcontaining either a money laundering or other illegal proposal OR you may receive a Legal and Legitimate business proposal by normal means. Common variations on the Scam include "overinvoiced" or "double invoiced" oil or other supply and service contracts where your Bad Guys want to get the overage out of Nigeria; crude oil and other commodity deals; a "bequest" left you in a will; "money cleaning" where your Bad Guy has a lot of currency that needs to be "chemically cleaned" before it can be used and he needs the cost of the chemicals; "spoof banks" where there is supposedly money in your name already on deposit; "paying" for a purchase with a check larger than the amount required and asking for change to be advanced; fake lottery 419; and ordering items and commodities off "trading" sites on the web and then cheating the seller. The variations of Advance Fee Fraud (419) are very creative and virtually endless.
Read more
Sunday, June 20, 2010
Cyber Crime Statistics
I have found cyber crime statistics in filed of Hi-tech . The more cyber crimes increase, the more need for investigation increases as well. The statistic are empirical study on the base of 1500 survey conducted online.
Cyber Crime Statistics from the 2008 Internet Crime Report
In 2008, the Internet Crime Complaint Center received and processed over 200,000 complaints.
More than 86,000 of these complaints were processed and referred to various local, state, and federal law enforcement agencies.
Most of these were consumers and persons filing as private persons.
Total alleged dollar losses were more than $194 million.
Email and websites were the two primary mechanisms for fraud.
Although the total number of complaints decreased by approximately 7,000 complaints from 2005, the total dollar losses increased by $15 million.
The top frauds reported were auction fraud, non-delivery of items, check fraud, and credit card fraud.
Top contact mechanisms for perpetrators to victims were email (74%), web page (36%), and phone (18%) (there was some overlap).
Cyber Crime Statistics from the 12th Annual Computer Crime and Security Survey*
Between 2007 and 2008there was a net increase in IT budget spent on security.
Significantly, however, the percentage of IT budget spent on security awareness training was very low, with 71% of respondents saying less than 5% of the security budget was spent on awareness training, 22% saying less than 1% was spent on such training.
71% of respondents said their company has no external insurance to cover computer security incident losses.
90% of respondents said their company experienced a computer security incident in the past 12 months.
64% of losses were due to the actions of insiders at the company.
The top 3 types of attack, ranked by dollar losses, were:
financial fraud ($21.1 million)
viruses/worms/trojans ($8.4 million)
system penetration by outsiders ($6.8 million)
Cyber Crime Statistics from the Online Victimization of Youth, Five Years Later study*
Increasing numbers of children are being exposed to unwanted sexual materials online.
Reports of online sexual solicitations of youth decreased while reports of aggressive sexual solicitation of youth did not (perhaps indicating that some prevention and education measures may be working, while the most serious offenders may not be deterred).
Online child solicitation offenses are rarely reported to any authority.
Incidents of online harassment and bullying increased.
Thursday, June 17, 2010
The Dating Group Internet Scam
Good Day,
We offer a part time job on your computer.
Job Description:
We will provide you with the texts for our employees with the
important information and you will correct the texts as an
english speaking person and send them back to us.
Salary:
We don't have a fixed salary for this vacancy. We will pay you $7.00 for
every 1Kb of the corrected text.
You will get paid at the END of each month.
Every month your salary will be different as it depends on your activity.
Example: If you correct about 5Kb of texts per day you will get over
$1000.00 at the end of the month.
Requirements:
-Location: USA
-Age: 20+
-Home computer, e-mail address and Microsoft Word -Responsibility
To apply for job please send us the following information to:
Dating.Services.73@gmail.com
__________
FULL NAME:
HOME ADDRESS:
CITY, STATE, ZIP CODE:
Phone number (home or cell, but SHOULD BE available any day time):
E-MAIL:
AGE:
OCCUPATION:
EDUCATION:
AVAILABLE HOUR TO WORK WITH US:
----------
As soon as we revise your aplication we will contact you within 24 hours.
If you have any additional questions, feel free to ask.
Awaiting for your application.
With respect
Dating Group Team
Although he felt strange, he applied for the company, after a week he got a respond from the company do to a assignment . after editing assignment and submitting, the company asked for the man's account number. Since he was a wise guy, he started to google about the company and he found out that it was a money laundering scam in Ukraine. They use this method to clean their dirty money.
source : crime research website
Types of IP
Copyright is an automatic right which applies when the work is fixed, that is written or recorded in some way.
Wednesday, June 16, 2010
TYPES OF IP
- Designs
Designs are what something looks like - from the shape of a take-away cup to the body of jet.
Tuesday, June 15, 2010
Cyber Crime
Types of IP
- Trade marks
Trade marks are symbols that distinguish goods and services in the marketplace - like logos and brand names.
Monday, June 14, 2010
Types of IP
- Patents
Patents protect what makes things work - like what makes a wheel turn or the chemical formula of your favourite fizzy drink.