Monday, July 5, 2010
Cyber Liability Insuranse
Saturday, July 3, 2010
Data is a Colorful Gold that must be protected
Wednesday, June 30, 2010
Advertisement on Cyberspace and Need for Regulation
Sunday, June 27, 2010
Love in Cyberland
Friday, June 25, 2010
AMC files Rs 10-cr defamation against Canadian national
Sunday, June 20, 2010
Kids and Internet
Wednesday, June 16, 2010
SMS Blocker
Saturday, June 12, 2010
Cyber space and freedom of speech
Saturday, June 5, 2010
Online Fraud :An Obstacle for Economic Activity on th Internet
Tuesday, June 1, 2010
Online Scam
Monday, May 31, 2010
25% increase in attempts to infect computers
Thursday, May 27, 2010
Fury over Facebook Murder
YouTube and copyright Issues
Friday, May 14, 2010
Google Earth and Privacy Issues

Sunday, May 9, 2010
Hacking
Thursday, May 6, 2010
Cyberbullying and Online Harrasment

Tuesday, May 4, 2010
Cyberlaw in Iran
Part I: Definitions
Article 1 - The meaning of law in the following terms are used:
A - Computer system
Any device or set of devices connected hardware is software that through implementation of automated data processing applications to act.
B - Communication Systems
any electronic transfer of information between a source (transmitter, the light source) and a receiver or detector light path through one or more communication protocols by which receptor is understood and interpreted.
C - Computer data
Each symbol of the events, information or concepts in a way favorable for processing in a computer system that includes a program is appropriate and makes the performance of computer systems to implement these steps. Given a financial value.
D - Data content
Each symbol of topics, concepts or instructions, such as text, sound or picture, either during or stored for the communication between computer systems or processing by a person or computer system used by the computer system and to create .
E - Data traffic
Any given by the computer in the communication chain is produced to the communication from source to destination routing and communication, including source, destination, route, time, date, size, duration and type of core services, etc. will be.
And - info (information) Data, text, images, sounds, code, computer programs, software and database or computer is created.
F - Subscribe information
any information available on service provider there and to its member services and communication services, including technical requirements and courses using the service, shared identity, IP address or postal or geographic telephone numbers and other personal details, he is.
G- Service provider
Every natural or juridical person that the user of its services can communicate with computer system provides the computer or data or the service provider rather than communication or its users to process or store.
Part II: Crimes and Punishments
Chapter One
crimes against privacy and data communications and computer systems
Part one - unauthorized access
Article 2
Anyone who intentionally and without authorization, in violation of safeguards data or computer system or communications, access to finds a fine of one million rials to six million Rials or imprisonment of ninety-one days to one year sentence be.
Part two - listening and receiving unauthorized
Article 3
Whoever intentionally and without authorization data in moving non-public in a relationship private, or from one or more computer system or telecommunications or electromagnetic waves, hear or receive a sentence of ninety-one day to one year or pay fine one million to six million Rials Rials will be sentenced.
Part three: crimes against national security
Article 4
Whoever intentionally and without authorization to transfer data in series or in computer or telecommunications system or data carrier that value for internal security or foreign country, the following acts committed crimes will be sentenced under :
A -data subject access to material or study them from one to three years imprisonment and fine of up to ten million rials hundred million rials
B-Putting these data available to persons unqualified access to imprisonment from two to ten years
C- revealing and putting these data available to the government, organization, company, or group of foreign powers or their agents to imprisonment from five to fifteen years
Note :
1-series data, data that expose them to national security or harm to national interests.
2-Regulations on series data and how they classify will provide in three months from the date of adoption of this law by the Justice Department and in cooperation with the ministries of the country, information, communications and information technology and defense forces supported.
Reference:
Sunday, May 2, 2010
Cyberlaw case in Hyderabad
Friday, April 30, 2010
Public Key Infrastructure
Wednesday, April 28, 2010
Digital Property Right
Utility rights. Utilities associated with real property are the “tools” that make the property useful and productive – electricity, water lines, and telecommunications lines among them. The digital world has its utilities as well. Discreet software functions, such as file converters, calculators, voice over Internet protocol (VoIP), and defragmentation programs, among others, form a digital “tool belt” that can help make online real estate space more valuable and productive. The opportunity to supply digital utilities to online property spaces represents real revenue potential for software developers.
Commerce rights. The exchange of good and services for money are the basics of commerce in both the physical world and the digital world. In online real estate spaces, enterprising business owners will have the ability to earn profits by placing such things as pay-per-view content (including audio, video, graphics and text files) and vending portals within easy access of visitors to those online environments.
http://digitalpropertyregistry.org/DigitalRightsDefined.html
A Cyberlaw Case: Man who Erases Facebook Data After Threat of Suit

Tuesday, April 27, 2010
Online transaction,has it more benefits or chalanges?
Monday, April 26, 2010
Footbal and cybercrime

In 2009 South Africa was at number 50 on the list of countries where most attacks took place and has jumped 7 places to number 43 in 2010 which is mainly due to FIFA world cup effects. This is not the end of story ,I 'm sure that it will become more popular in the future that many football fans loose their money in this way.So,it is important for both issuers and buyers of online tickets to be aware of fraud activities on the Internet.
Saturday, April 24, 2010
Zeos ,The Most Prevalant Financial Malware
Ironically .Most antivirus was unable to detect zeos , based on study conducted in US and UK in 2009. The new version of Zeos (known as Zeos 2) targeted Internet explorer and FireFox browsers and use complicated methods to avoid antivirus detection.
Wednesday, April 21, 2010
What is zombie computer ?
A zombie computer refers to a computer that connect to the Internet and is controlled by unauthorized third party without permission and awareness of computer's user. Hacker can use zombie computer in many ways, for example Zombies can be used to conduct distributed denial of service attacks or to send spam email.
Furthermore hackers have full access to data on a zombie computer ,and they can copy ,corrupt change or even delete entire of hard copy .Also they can install a software on a zombie computer which help them to get the user name, password , and even financial information such as credit card number and bank account.Hacker can use this information to commit fraud.
Tuesday, April 20, 2010
Online Banking Fraud
Friday, April 16, 2010
Financial and cyber crime most prevalent economic crime in Malaysia
"KUALA LUMPUR, April 13 (Bernama) -- Financial and cyber crimes were among the most prevalent economic crimes commited in Malaysia, says Honorary Group Chairperson of International Cybercrime and Forensics Examiner (ICFE) Group of Companies, Tommy Seah."
As I mentioned in the previous post ,the number of cybercrime cases increases,it is mainly due to increases of online application especially in business area and social networking and lack of knowledge about computer crimes and corresponding issues among Internet users.In the case of Malaysia ,as country that want to be attractive for foreign investors,it is crucial to raise level of knowledge about cybercrime in both public and private sectors . One way to achieve this goal could be developing knowledge of students by putting at least one subject in school curriculum about Internet security,cyberlaw and related issues. Furthermore ,both public and private sectors must train their employees in order to keep customers information from misusing by intruders in the cyber space . In a short , developing skills and knowledge of Internet users could be an importnt step in order to reduce number of cybercrime cases .
Tuesday, April 13, 2010
Need for Inernational Organization on Cybercrime
Refrences:
1.World Internet Users and Population Stats :www.internetworldstats.com/stats.htm