Sunderland businessman John Finn has been declared bankrupt over unpaid court costs.
The housing boss and his company were left with legal bills running into hundreds of thousands of pounds after accepting they were responsible for publications on a controversial website.

Mr Finn and Pallion Housing agreed to pay a £119,000 settlement in what was believed to be at the time the UK's biggest Internet defamation payout, after the High Court hearing in April 2008.

They were told to hand over the six-figure sum to Peter Walls, boss of gentoo, formerly Sunderland Housing Group.

The payout came after anonymous statements were made on the Dad's Place website and in other publications, which over a two-year period made serious allegations about gentoo and its managers.

Pallion Housing went into administration on July 22, 2009.

But it is understood that £409,000 in costs are still outstanding, which were accruing interest at a rate of £805 a week.

Andrew Taylor, deputy chief executive of gentoo group, confirmed that gentoo had petitioned for bankruptcy against John Finn at Newcastle Law Courts on Wednesday.(Read more)

How do you feel about a United States President having the power to possibly shutdown portions of the Internet?
The US Senate committee has approved legislation which effectively gives President Obama the power to shut off parts of the internet when there is a national emergency.The legislation is called Protecting Cyberspace as a National Asset Act and will allow the President in times of national emergency to implement response plans for protecting the infrastructure of the web, as well as the electrical grid and telcom networks.



Hi I read a news and found this case about phishing in Malaysia.This case is about Maybank. Somebody send email to so many addresses has gotten onto some local Malaysian scam/spam e-mail list. The e-mail which supposedly sent the phishing mail was "Maybank (maybank@security.com.my)" with the mail looking as follows:



















and contain this text that was terrible grammar , so should give you a warning bell in your head that this probably isn't a legitimate e-mail.
"We are hereby notifying you that we've recently suffered a DDos-Attack on one of our's Online Banking server. For security reasons you must complete the next steps to verify the integrity of your Maybank account. If you fail to complete the verification in the next 24 hours your account will be suspended.

Here's how to get started:

1. Log in to Maybank online account (click here).

2. You must request for TAC via Maybank online banking - your TAC will be sent via SMS to the mobile phone number you registered. (you can find the "Request a TAC" button in the Utilities menu of your account)

3. Logout from your account and close the browser.

4. When you have received the TAC (Transaction Authorization Code) on your mobile phone, go to our secured verification server and submit the requested information (Username, password and TAC). (click here) to go on our secured server.

5. Please allow 48 hours for processing.

Please comply and thanks for understanding.

***This is an automated message, please do not reply***"


so many user from Maybank uploaded their information in this site and Hackers got use name and password of them .after that Maybank came whit the following message:

Please do not login in this website or comply, it is fake!!

Hi, in this post I want to write about phishing.What is phishing ? The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a special web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The web site however, is bogus and set up only to steal the user’s information.

Hello my friends ,today I understand that WordPress.com website got filtered in Iran. It means a large number of Farsi blogs hosted on WordPress are inaccessible in Iran. I don't understand what! but in this months so many blogs such as Blogspot.com (Blogger) was also filtered while ago but the blockage was lifted after a few days.

Hi my friends .I want to speak about cyber law in malaysia in this post.Cyber laws are the law used to control the behavior of computer users in the country. For your information, there are currently four cyber laws which have been approved by the government of Malaysia which is known as Digital Signature Act 1997, Computer Crimes Act 1997, Telemedicine Act 1997 and Communication and Multimedia Act 1998.

Digital Signature Act 1997

The Digital Signature Act 1997 are used to protect computer user who use electronic communications especially on the Internet.

Digital Signature is a technology to verify the identity of a person using encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message.

Telemedicine Act 1997

In Telemedicine Act 1997 stated that only qualified medical practitioners can use telemedicine and that their patient's rights and interests are protected.

Communication and Multimedia Act 1998

By the implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is safe, reliable and the service is affordable all over Malaysia.


Computer Crimes Act 1997

Protection against the misuses of computers and computer criminal activities are ensured by the Computer Crimes Act 1997. Such as unauthorized use of program mes, illegal transmission of data or messages over computers and hacking and cracking of computer OP and networks are banned by this law, therefore to those who disobey this law can be charged on the court.






Hi there , I watched this video yesterday and I uploaded in my blog because is about privacy in workplace and discus about two cases one of them is 4 employees busted for using company cellphone for personal texts !


Recent surveys have found that a majority of employers monitor their employees.

Employers want to be sure their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring.

New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications.

Close to half of employers track content, keystrokes, and time spent at the keyboard. And 12% monitor blogs to see what is being written about the company. Another 10% monitor social networking sites.

Almost half of the companies use video monitoring to counter theft, violence and sabotage. Of those, only 7% state they use video surveillance to track employees’ on-the-job performance. Most employers notify employees of anti-theft video surveillance (78%) and performance-related video monitoring (89%).

Telephone Monitoring
Can my employer listen to my phone calls at work?
yes. For example, employers may monitor calls with clients or customers for reasons of quality control. However, when the parties to the call are all in California, state law requires that they be informed that the conversation is recorded or monitored by either putting a beep tone on the line or playing a recorded message.

Computer Monitoring
If you have a computer terminal at your job, it may be your employer's window into your workspace. There are several types of computer monitoring.
  1. Employers can use computer software that enables them to see what is on the screen or stored in the employees' computer terminals and hard disks. Employers can monitor Internet usage such as web-surfing and electronic mail.

    People involved in intensive word-processing and data entry jobs may be subject to keystroke monitoring. Such systems tells the manager how many keystrokes per hour each employee is performing. It also may inform employees if they are above or below the standard number of keystrokes expected. Keystroke monitoring has been linked with health problems including stress disabilities and physical problems like carpal tunnel syndrome.
  2. Another computer monitoring technique allows employers to keep track of the amount of time an employee spends away from the computer or idle time at the terminal.
Electronic Mail and Voice Mail
Is electronic mail private? What about voice mail?
no. If an electronic mail (e-mail) system is used at a company, the employer owns it and is allowed to review its contents. Messages sent within the company as well as those that are sent from your terminal to another company or from another company to you can be subject to monitoring by your employer. This includes web-based email accounts such as Yahoo , Gmail and Hotmail as well as instant messages. The same holds true for voice mail systems. In general, employees should not assume that these activities are not being monitored and are private.


In an attempt to quell increasing privacy concerns among its users, Facebook this week launched a new page aimed at helping them better protect personal information posted on the social network.

The company announced the new Facebook privacy page in a blog post yesterday.

"The Facebook Privacy Page serves as a living resource and a venue to facilitate an interactive discussion about privacy with all of you," wrote Simon Axten, a manager on Facebook's public policy team, in the post. "We'll regularly post updates on relevant new content, products and news stories related to online privacy. Already you'll find a repository of online privacy resources both from Facebook and outside experts, including our video tutorials on how to choose your settings, as well as links to our privacy guide and FAQs."

Facebook has been hit with increasing criticism from privacy advocates over the past couple of years. The criticism heated up markeedly in April after Facebook unveiled a bevy of tools that would allow the sharing of user information with other Web sites.

That move caused an uprising among users and even prompted a handful of U.S. Senators to pen an open letter calling on Facebook to amend its privacy policies.

Facebook first responded last week with the release of a set of new, simpler privacy controls. That move appeared to appease many users who had complaine that the earlier controls were too complicated and confusing.

However, Facebook CEO Mark Zuckerberg stirred up the issue again earlier this week when he sidestepped questions about privacy at the Wall Street Journal's All Things Digital, or D8, conference.

Ezra Gottheil, an analyst with Technology Business Research, said the social networking firm has to work on reviving its image, and that a big part of the effort will have to be listening to the privacy concerns of Facebook users.

"A privacy page could be very helpful," Gottheil said. "I'd like to see how effectively Facebook directs users to that page, and I'd like them to be very public about any changes to their policy. That's really my biggest problem with Facebook. They haven't encourage people to think about those settings.

"The problem is that Facebook wants to pretend there's no potential downside to sharing everything," he added. "They are now showing they understand that some people care, but they are not showing that they understand why."


Kevin Mitnick was one of the most talented hackers, and the one one most prosecuted by the state. Mitnick's hacker handle was "Condor". He became the first hacker to appear on an FBI "Most Wanted" poster, for breaking into the Digital Equipment Company computer network. When he was captured he was sentenced to a year in a treatment center to get over his "computer addiction".

In February, 1995, Mitnick was arrested again for breaking into various computers and downloading 20,000 credit card numbers. In April, 1996, he pleaded guilty to illegal use of stolen cellular telephone numbers. But his most celebrated hacking exploits involved breaking into company computers and downloading proprietary software as a kind of trophy to prove that his hack was successful.

The story of Mitnick's capture is described in The Hacker Takedown, starting with the discovery by security expert Tsutomu Shimomura that his computer had been hacked, and ending by tracking the incursion to a specific modem in a NETCOM.com site in Raleigh, North Carolina. Finally, the FBI used cell-phone tracking equipment to find and capture Mitnick in his apartment.

Because Mitnick was seen to be so dangerous around any electronic network, he was held in jail without bail for four years without trial, before finally pleading guilty and accepting a five year sentence including time served, and was freed ten months later in January 2000. However, even then, the conditions of his release included no contact with a computer or a cell phone, making it difficult for him to make a living.

Mitnick has become something of a celebrity in hacker circles due to his unusually vigorous, some say unfair, prosecution by the state authorities. Several hacker groups have broken into various websites and posted messages in Mitnick's defence, most notably on the website of the New York Times.


New Facebook of Pakistan:Muslim Facebook Called Millat Facebook

he Pakistani Facebook controversy over the Draw A Mohammad Day page has taken a new twist with some Pakistani developers launching a new site to rival Facebook. The site called Millat Facebook (millatfacebook.com) and is created to cater to 1.57 billion Muslims around the world.

The about page of the site says this about Millatfacebook:

Millatfacebook is Pakistan’s very own, first social networking site. A site for Muslims by Muslims where sweet people of other religions are also welcome!!

The site goes on to tell how Facebook has not been listening to complaints and how it is making almost 50% of revenue from Muslim Facebook users.

Earlier this month a Pakistan court had banned access to Facebook due to the Draw A Mohammad Day page, the ban in question will remain in effect till May 31, 2010.

The Millatfacebook or MFB developers are working to add more features to the site to make it similar to those of Facebook. There are several similar features right now including Wall, Friends and more.

As per reports the site already has over 4,300 users in the page few days, most of them are Pakistanis. This number may grow further considering that Pakistani Facebook users are on the lookout to catch up with their Facebook friends and aren’t able to do so.

Don’t expect the same Facebook experience on MFB yet, it still has a long way to match the standards of Facebook, this is also reflected by several current users of the site.

Cyberlaw

Cyberlaw

About this blog

This blog is about cyberlaw

Labels

About Me

My photo
Hello my friends my name is Mehran ,I'm going to write about cyberlaw. This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the web-log owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this web-log and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Followers

Labels


Labels

Search This Blog


Labels