Friday, April 30, 2010
Public Key Infrastructure
Wednesday, April 28, 2010
Digital Property Right
Utility rights. Utilities associated with real property are the “tools” that make the property useful and productive – electricity, water lines, and telecommunications lines among them. The digital world has its utilities as well. Discreet software functions, such as file converters, calculators, voice over Internet protocol (VoIP), and defragmentation programs, among others, form a digital “tool belt” that can help make online real estate space more valuable and productive. The opportunity to supply digital utilities to online property spaces represents real revenue potential for software developers.
Commerce rights. The exchange of good and services for money are the basics of commerce in both the physical world and the digital world. In online real estate spaces, enterprising business owners will have the ability to earn profits by placing such things as pay-per-view content (including audio, video, graphics and text files) and vending portals within easy access of visitors to those online environments.
http://digitalpropertyregistry.org/DigitalRightsDefined.html
A Cyberlaw Case: Man who Erases Facebook Data After Threat of Suit

Tuesday, April 27, 2010
Online transaction,has it more benefits or chalanges?
Monday, April 26, 2010
Footbal and cybercrime

In 2009 South Africa was at number 50 on the list of countries where most attacks took place and has jumped 7 places to number 43 in 2010 which is mainly due to FIFA world cup effects. This is not the end of story ,I 'm sure that it will become more popular in the future that many football fans loose their money in this way.So,it is important for both issuers and buyers of online tickets to be aware of fraud activities on the Internet.
Saturday, April 24, 2010
Zeos ,The Most Prevalant Financial Malware
Ironically .Most antivirus was unable to detect zeos , based on study conducted in US and UK in 2009. The new version of Zeos (known as Zeos 2) targeted Internet explorer and FireFox browsers and use complicated methods to avoid antivirus detection.
Wednesday, April 21, 2010
What is zombie computer ?
A zombie computer refers to a computer that connect to the Internet and is controlled by unauthorized third party without permission and awareness of computer's user. Hacker can use zombie computer in many ways, for example Zombies can be used to conduct distributed denial of service attacks or to send spam email.
Furthermore hackers have full access to data on a zombie computer ,and they can copy ,corrupt change or even delete entire of hard copy .Also they can install a software on a zombie computer which help them to get the user name, password , and even financial information such as credit card number and bank account.Hacker can use this information to commit fraud.
Tuesday, April 20, 2010
Online Banking Fraud
Friday, April 16, 2010
Financial and cyber crime most prevalent economic crime in Malaysia
"KUALA LUMPUR, April 13 (Bernama) -- Financial and cyber crimes were among the most prevalent economic crimes commited in Malaysia, says Honorary Group Chairperson of International Cybercrime and Forensics Examiner (ICFE) Group of Companies, Tommy Seah."
As I mentioned in the previous post ,the number of cybercrime cases increases,it is mainly due to increases of online application especially in business area and social networking and lack of knowledge about computer crimes and corresponding issues among Internet users.In the case of Malaysia ,as country that want to be attractive for foreign investors,it is crucial to raise level of knowledge about cybercrime in both public and private sectors . One way to achieve this goal could be developing knowledge of students by putting at least one subject in school curriculum about Internet security,cyberlaw and related issues. Furthermore ,both public and private sectors must train their employees in order to keep customers information from misusing by intruders in the cyber space . In a short , developing skills and knowledge of Internet users could be an importnt step in order to reduce number of cybercrime cases .
Tuesday, April 13, 2010
Need for Inernational Organization on Cybercrime
Refrences:
1.World Internet Users and Population Stats :www.internetworldstats.com/stats.htm