Saturday, 30 April 2011

Cyber Stalking



The paradoxical nature of the internet makes the accurate way of using this facility more difficult. Day-to-day we witness the misusing of the cyber space like releasing viruses, hackings, frauds or trespassing on other’s privacy. One of these infringements is cyber stalking.
When an individual or group of individuals or even an organization exposures to repeated acts like harassment or threatening behavior through internet or other electronic means we call this as cyber stalking. These acts can be included of following the victim, make threats, damage to data or equipment or also the solicitation of minors for sex and so on. In this part, young people face more risk of having cyber stalkers like attempting to set-up meeting between them.
Research has shown that the majority of the stalkers are the dejected or ex-lovers who failed to satisfied their secret desire.
Social networks such as Facebook provide an easier way for cyber stalkers. For example, one of the misusing of the social networks occurs when stalkers steal some private information like images to create an account under the name of victim and publish the fake information against that victim in that mentioned page.



Thursday, 28 April 2011

This weblog is created for the purposes of assignment for the subject BYL 7134, Cyberlaw by Faculty of Management, Multimedia University, Malaysia. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research only. Appropriate acknowledgements to the materials that do not belong to the weblog owner have been publicly made. If you are the author or a copyright or a trademark owner of any of the articles or images or graphics or pictures or any material posted in this weblog herein and you object to such posting on any grounds, including copyright or trademark infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. “


Cyber crime goes mobile


The increase in use of mobile devices or in particular smart phones is shifting from PC's environment to mobile users. It causes new terms of criminal acts since 2009. For example, Mobile malware, a program in which a harmful code was used to steal banking information by keystroke logging so far. 
Products like iPhones, iPads and iTunes media service that are developed with high operating systems and better shape are not either immune from these crimes despite the company is ensuring the users that these devices are much more safer and secure than others, notably Windows. The main problem is malware that allowed applications to access information on an iPhone users location without permission. 

Grounded in definition of computer under S.2 Computer Crime Acts 1997, computer is a "an electronic, magnetic, optical, electrochemical, or other data processing device,  performing logical, arithmetic, storage and display function, and includes any data storage facility or communications facility”. As a matter of fact, devices such as iPhone, iPhads or iTunes are counted as computer. So, the users should be aware of the way of using these devices to prevent commiting computer crimes.


Sunday, 17 April 2011

Be aware of phishing





Phishing is the act of sending an email (claiming to be a legitimate enterprise) to users.
 this email direct the users to visit a website on which they are asked to update personal information like passwords,credit card,social security and also bank account numbers, that the legitimate organization already has.
An example of phishing happened in 2003 that the users receive an email from eBay,falsely claiming that the users account were about to be suspended unless the users clicked on the provided link and then updated the credit card information. people simply thought that email as real and went to eBays site and updated their account information. phisher can uses this information to fraud or simply transfer funds of user's account.
This act is a sample of computer crime and based on act 1997, section , is liable to a maximum RM50'000 fine or to five years imprisonment or to both. 
To additional information, some new softwares have been recently produced to protect users against phishing such as Anti-Phishing Phyllis Training Game which teaches users how to recognize phishing traps indicative of fraudulent emails.