Cyber Terrosrism

Cyber-terrorism, it is illegal activities that use computer as a tool to steal individuals or organizations secret such as theft of confidential information of companies, money laundering, distortion of information, racketeering, decoding software, including sorties to the computer system as computer viruses, destruction and so on.

Cyber Bullying

The positive aspects of technological progress have brought prosperity and comfort to our lives. Obviously  there is other side of technology called Cyber-bullying or  violence in cyberspace has returned to a bitter and wound in  heart to people who have been suffered with it.
Violence is the beginning of the wound. Bullying between children, we have know since a long time ago, and it's still exist in today's society. Bullying is physical harm to a person like a bigger brother bullies his little sister. The physical fight between the children is visible for us to judge who is the first move of bullying and who is the victim?
Today's technology is getting spread and scatter to even a small child. It has become a part of our lives, and a misuse that called Cyber-Bullying (Being bullied through cyberspace) is initially. Anyone can initiate this kind of violence even little children.
Cyber-bullying is bullying through cyberspace between children by different forms including slur, wording that malign others, slander, forward to others any confidential information via the Internet, or even a mobile phone. It causes the victim feeling pain and affect their psychological mind.
This kind of violence, it is impossible to know who is the culprit. This can be devastating to anyone anywhere at anytime. The offender is able continued to emphasize the violence. The victim, who has been bullied, some day may come back as an act of violence to avenge against the initiator. This wicked cycle has no end with the realization that anyone is committing it




Make your flash player updated

Updating flash player is important because it prevents from hacking. Manufacturers of security software alert to computer users quickly update the new version of Adobe Flash Player to protect from the damage caused  by identities theft or another vulnerabilities. After Adobe issued emergency patch 4 times since earlier year 2013, has found the vulnerabilities of the Flash Player that the theft uses to attack computer system by convincing the user to click a link that links to a website that includes malicious contents to computers.

Cyber Terrorism



Julian Assange answers a student's question about what he thinks of the term 'Cyber Terrorism'and the work of  sites such as 'Anonymous'.About Julian Assange: known worldwide as the founder and public face of WikiLeaks. Julian Assange has made headlines across the world by exposing government misconduct. He has championed the principle of freedom of information, yet some have criticized his activities as reckless and dangerous. Under Assange's leadership, WikiLeaks has published innumerable classified diplomatic cables and played a crucial role in shaping the international political landscape. He has currently as a fugitive in the Education Embassy i London.

The world's Most Famous Hackers

Famous Hackers in the world

1) Vladimir Levin
2) Johan Helsinguis
3) Kevin Mtinick
4) Dennis Ritchie Ken Thompson



Who are cyber criminals ?

~ Cyber Criminals ~
1. Kids: age around 9-16 etc. Most amateur hackers and cyber criminals are teenagers. They attribute into a pride to have hacked into a computer system or a website. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.
2. Organized hacktivists: they are hackers with a particular motive.
3. Disgruntled employees: we cannot reach to people's mind or what they are thinking inside. Similarly, it's hardly believe how spiteful displeased employees can become. In the old fashion way they can go for strike against their organization. Now, since the increase independence on computers, it is easier for disgruntled employees to do more harm to their bosses by doing some unpleasant activities against their employer that lead its system error.
4. Professional hackers: they are mostly employed by organizations to monitor or hack information of rival industry that could be beneficial to them. 

Why computers vulnerable ?

Computers are extremely vulnerable. It's not very tough for hackers to steal national secrets from military computers. Here are examine the reasons for the vulnerability of computers.
1. Computers store large amount of data in tiny space: Let see a CD ROM, it can store an emormouse information.
2. Computer is accessible:  as we have heard nowadays the strongest of firewall authentication systems still  have been cracked.
3. Computer is complex: the complexity of computers allow hackers exploiting and gain what they want. There are always weaknesses or flaws for the criminal to breach the system. Even the weaknesses have been patched up, but the hackers will then find another flaw to exploit and the cycle goes on and on. So designing a great security operating system is very crucial.
4. Human error: people leave careless specifying their password for a system, their use a guessable password.
reference: http://www.bezaspeaks.com/cybercrime/whyit.htm




History of Cyber Crime

The era of modern computer  was begun with the analytical engine of Charles Babbage. In 1820, a textile manufacturer in France,  Joseph-Marie Jacquard  produced loom which is the same that cyber crime was first recorded. The engine allowed the repetition of a series of steps in the weaving of specials fabrics. Jaquard's employee found it in a fear because with the machine they are likely not to be hire, the device will do all the task. So they committed acts of sabotage to stop the using of the device. This is the first recorded cyber crime. 
referenc: http://www.bezaspeaks.com/cybercrime/history.htm

Tips For Buying Online

When you the shop online on the Internet you should use:1. Create a safe password to log in in to the site. Do not a general tern used in everyday life such as date of birth, name of family member. Make password complicated by using uppercase, lowercase, number and symbol. Also use a unique password for each account.
2. The process of ordering and payment. Make sure the online store uses Secure Socket Layer (SSL) which encrypts sensitive information. Try to look an icon key at the bottom of the browser to see if you are on a secure site or not
The reliability of the seller : take a moment to familiarize with the merchant or vendor first. View information about the seller as we ass read the review and comments from customers toward the online shop. Many E-Commerce sites including eBay has feedback system to display the comments and ratings from other buyers. Ask questions about the product from vendors before buying or bidding for auction. Good communication will help the transaction go smoothly.
Look for a return or a refund policy. If there are no such policies, ask vendors if they have limited time to return products, a full refund or exchange for another product of equal value or not.
The specific information of product
-
Product with a high demand/high value, rare or expensive such as jewelry, computer, and electronics require special care. You should double check and make sure before order.
- Confirm as a genuine. For example, a collection of sports, verify to ensure that the product is genuine.
Common Alarm: if you notice signs as the following, you should be extra careful
- Delivery delays. Do not overlook the delivery stated.
- Unsolicited offers. Receiving mail from another vendor offering similar product that you just purchased may  be fraudulent.
- Too good incredible. If the offer is too good to believe, this case the seller set the price very low or selling products that almost impossible to find now

Online shop has been popular among the people, and it seems increasingly nowadays. It is saving time because we do not have to drive to check for physical shops so as to lots of fraudulent has been raised on the online shop we must to be extra careful. Do apply the provided tips that would save us from those breaches.

Facebook Gains for Terrorists Seeking Friends, UN Reports

According to the United Nations, the biggest social network like Facebook is risk for users to share message and picture and so on because there are terrorists try to spread propaganda and plan potential attacks.
Read more please visit http://www.bloomberg.com/news/2012-10-22/facebook-gains-as-tool-for-terrorists-seeking-friends-un-says.html

Facebook is not safe anymore

Cyber Terrorism News

This post I included  a news regarding to cyber-terrorism. The article is about North Korea blamed South Korea for cyber-attack. The details is as the following.

South Korea has accused North Korean spies of masterminding a series of high-profile cyber-attacks last month. Tens of thousands of computers were made to malfunction, disrupting work at banks and television broadcasters in the South. Investigators in Seoul said they had discovered some of the code involved was identical to that used in malware previously linked to Pyongyang. The allegation adds to growing tension on the Korean peninsula. On Tuesday North Korea told foreigners in the South to "work out measures for evacuation" to avoid becoming involved in a "thermonuclear war". Seoul's foreign minister subsequently said that there was a "considerably high" risk that its neighbor might fire a ballistic missile at it over the coming days. North Korea has not commented on the cyber-attack accusation.
Cyber-evidence
About 48,000 PCs and servers in the South were struck on 20 March. The assault shut down computer networks at TV stations KBS, MBC and YTN, and halted operations at three banks - Shinhan, NongHyup and Jeju. Investigators in Seoul reported their initial findings suggested North Korea's military-run Reconnaissance General Bureau had been responsible. A spokesman announced that 30 out of 76 programs recovered from affected computers were the same as those used in previous strikes. In addition he said that 22 of the 49 internet protocol (IP) addresses involved in the incidents matched those used in attacks blamed on the North over the past five years. The recent assaults shortly followed a South Korea-US joint military exercise, but it was suggested they had been long in the planning.
"The attackers gained control of personal computers or server computers within the target organisations at least eight months ago," a government statement reported in the Korea Herald said.
"After maintaining monitoring activities [they] sent out the command to delete data stored in the server, and distributed malware to individual computers through the central server."
South Korea's Financial Services Commission added that no bank records or personal data had been compromised.
Outdated system
Previous cyber-intrusions blamed on Pyongyang include attempts to block access to the website of South Korea's presidential office and other government departments, and hacks of computers at Nonghyup bank and the Joonang Ilbo newspaper.
In turn, North Korea has accused both the South and the US of preventing users from being able to visit its official media sites - the Rodong Sinmun newspaper and the Korean Central News Agency - earlier this year.
It has led some commentators in the South to criticise the state of their cyber-defences bearing in mind the public there is much more reliant on the internet than citizens in the North.
"South Korea cannot cope with unpredictable and sophisticated provocations from North Korea with a bureaucratic, rigid mindset," wroteChae In-taek in the Joonang Ilbo.
"National security cannot be assured through an outdated system. We must come up with an innovative security system fast."

reference: http://www.bbc.co.uk/news/technology-22092051

Cyber-Stalking

Cyber-stalking is the use of information and communications technology, particularly the Internet, by an individual or group of individuals, to harass another individual, group of individual, or organization. The characteristic of cyber-stalking includes false accusation, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors of sexual purpose, and gathering information for harassment purpose.
How Cyber-Stalking harms ? It is working to frighten and destroy friendship, credit, careers, self-image, and confidence. Spyware software can be used to monitor everything happening on your computer or cell phone, giving tremendous power and information to cyber-stalkers.
How to prevent cyber-stalking ? There are simple way to avoid cyber-stalking.
- As we know that it is risk to be destroyed when we share personal information in public spaces so try to not share any personal information anywhere online, not give it to strangers, including in e-mail or chat rooms
- Be cautious about meeting online acquaintances in person. If you choose to meet, do so in a public place and take a long friend.
- Make your that your Internet provider and Internet Relay Chat network have as acceptable use policy that prohibits cyber-stalking
- If a situation online becomes hostile, log off and surf elsewhere. if a situation places you in fear, contact a local law enforcement agency.
These are simple ways to stay away from stalkers. It is not complicated to apply them for your safety and happiness.

Online Defamation (Continued)

In an online defamation, there are some words and their examples need to be understanding. Those words are public figure, libel and slander.
Public Figure: is a term applied in the context of defamation actions as well as invasion of privacy. A public figure (such as a politician, celebrity, or business leader) cannot base a sample on incorrect harmful statements unless there is proof that the writer or publisher acted with actual malice. The burden of proof in defamation actions is higher in the case of public figure.
Libel: is a false statement of fact expressed in a fixed medium, usually writing but also a picture, sign, or electronic broadcast.
Slander: is a defamatory statement expressed in a transitory medium, such as verbal speech. It is considered  a civil injury, as opposed to a criminal offence. Actual damages must be proven for someone to be held liable for slander.
We can see that the two definitions of libel and slander are similar, is false statement or defamation by written or printed words,or in any form other than by spoken words or gestures. 
Examples of Libelous Statement
-
Charging someone with being a communist (in 1995)
- Calling an attorney a " a crook"
- Accusing a minister of unethical conduct
- Accusing a father of violating the confidence of son
Examples of Non- Libelous Statement
- Calling a political foe a "thief" and "liar" in chance encounter
- Calling a TV show participant a "local loser", "chicken butt"
- Calling someone a "bitch" or a "son of bitch"
I would like to make "online defamation" ends here. See you next post. 

Online Defamation

The tort f cyber defamation is considered to be the act of defaming, insulting offending or otherwise causing harm through false statements pertaining to an individual in cyber space. This commonly done through the Internet via websites, blogs, forums, emails and instant messaging, chat rooms and now in the social networking. Defamation law in general describes the tort as "the issuance of a false statement about another person, which causes that person to suffer harm".

Elements of a Defamation Claim: the party making a defamation claim (plaintiff) must ordinary prove four elements.
- a publication to one other than the person defamed;
- a false statement of fact;
- that is understood as being of and concerning the plaintiff; and tending to harm the reputation of plaintiff. If the plaintiff is a public figure, he or she must also prove actual malice.

There are ordinary 6 possibles defenses available to a defendant who is used for libel (published defamatory communication)
1. Truth. This is a complete defense, but may be difficult to prove.
2. Fair comment on a matter of public interest. This defense applies to opinion only, as compared to a statement of fact. The defendant usually needs to prove that the "opinion" is honesty held and the comments were not motivated by actual "malice"
3. Privilege. The privilege may be absolute or qualified. Privilege generally exist where the speaker or writer has a duty to communicate to a specific person on a given occasion. In some cases the privilege is qualified and may be lost if the publication is unnecessarily wide or made with malice.
4. Consent. This is rarely available, as plaintiff will not ordinarily agree to the publication of statement that they find offensive.
5. Innocent dissemination. In some cases a party who has no knowledge of the consent of a defamatory statement may use this defense.
6. Plaintiff's poor reputation. Defendant can mitigate for a defamatory statement by proving that the plaintiff did not have a good reputation to begin with. Defendant can prove plaintiff's poor reputation by calling witnesses with knowledge of the plaintiff's prior reputation relating to the defamatory content.
   Anyway, an opinion cannot be defamatory, but it is merely labeling a statement as your "opinion" does not make it so. Courts look at weather a reasonable reader or listener could understand the statement as asserting a statement of verifiable fact.

Cyber Law

The Cyber law Act in Malaysia: the Malaysian government has passed several cyber law to combat and reduce the Internet fraud. These cyber laws are as the following
- Digital Signature Act 1997: it secures electronic communications especially on the Internet. Digital Signature is an identity verification standard that used encryption techniques to protect against e-mail forgery.
The encrypted code consists of the user's name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.
- Computer Crimes Act 1997: it gives protection against the misuses of computers and computer criminal activities such as unauthorized use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks. By implementing the Computer Crime Act 1997, users can protect their rights to privacy and build trust in the computer system.
- Communication and Multimedia Act 1998: is to secure information, the network is reliable and the service is affordable all over the country. This Act also ensures high level of user's confidence in the information and communication technology industry.

Cyber law refers to any laws relating to protecting the Internet
and other online online communication  technologies