Tuesday, April 20, 2010

“ICT Profession Supports Removal of Software Patent” plus 3 more

“ICT Profession Supports Removal of Software Patent” plus 3 more


ICT Profession Supports Removal of Software Patent

Posted: 20 Apr 2010 07:48 PM PDT

ICT Profession Supports Removal of Software Patents, says NZCS


The New Zealand Computer Society (NZCS), NZ's independent professional body representing thousands of ICT professionals, today announced strong support for the Commerce Select Committee's recommendation to remove patentability of software.

Following the Commerce Select Committee's recommendation to the Government to remove software from the Patents Act, the Society polled its members (representing ICT professionals throughout New Zealand), and found that 81% of those that had a view supported the recommendation to remove Software from the Patents Act.

NZCS Chief Executive Paul Matthews said today that "This is a big issue for the ICT sector. And whilst not scientific, this poll clearly backs up previous consultation showing widespread support from the ICT sector for the removal of software patents".

"There are a number of reasons for and against software patents, however on balance the Society, and indeed the majority of the ICT profession, believes they are harmful to the innovation of the ICT sector and New Zealand as a whole", Matthews said.

The Society is constitutionally required to consider issues of importance to the sector and advise Government on areas of concern and hence has written to Commerce Minister Hon Simon Power outlining some of the reasons for supporting the Select Committee's recommendations.

A copy of this letter is available here: http://tinyurl.com/nzcs-swp

"The Society strongly supports the concept of Intellectual Property and Copyright, and the right to protect property and gain commercial advantage from the creation and sale of software", Matthews said. "However this has to be weighed against the significant damage software patents cause innovation and the far more appropriate protection provided under Copyright law".

Conceptually, patents protect concepts or an idea whereas Copyright protects manifestation of an idea. Given the nature of software and the fact that it is built upon large layers of prior work, Patents have caused significant problems in the digital world and are unsuited to software.

"Protecting software is important" Matthews said, "in the same way that protecting movies, books and songs is important. However these all rely successfully on Copyright law, rather than Patent law, for protection. It would be ludicrous to allow patents in these areas, just as it's illogical to allow software patents".

"As pointed out by IP law firm Chapman Tripp recently in a release supporting patents, New Zealand is suffering from sustained and alarming Multi-Factor Productivity decline, a measure of technological innovation", Matthews said. "However the Society sees this as actually another indication of the fact that allowing software to be patented hasn't worked in New Zealand, hence a new approach is needed to address this issue".

The Society also pointed out that it was not possible to run a patent system for some and an "opt-out" for others, as recently suggested, as all would be bound by the monopoly patents provided. "It's like saying each villager can decide whether or not to pollute the village pond. Fact is, they all have to drink from it".

"This is a complex issues, however the Society commends the Commerce Select Committee on giving serious consideration to this issue and making a recommendation based on the best interests of the New Zealand's ICT sector and New Zealand as a whole", Matthews concluded.

ENDS

Five Filters featured article: Chilcot Inquiry. Available tools: PDF Newspaper, Full Text RSS, Term Extraction.

Google Hacked Through Computer Code

Posted: 20 Apr 2010 02:23 AM PDT

MOUNTAIN VIEW, Calif. (TheStreet) - Google's(GOOG) systems were hacked by attackers last year through a computer code for the software that authenticates users of Google email, calendar and other online programs, the Wall Street Journal reports, citing a person familiar with the matter.

Attackers gained access to Google's computer code by compromising a workstation used by a Google engineer, the person said.

However, the nature of attacks and the perpetrators behind it remain unclear. Some security experts suspect a group of attackers that has penetrated hundreds more companies since Google went public with its attacks in January. "The exact same group has been exceptionally active," one person familiar with the matter told the Journal.

Cyberwar: Tea Party's New Issue (Forbes)

The group has broadened its victims to include law firms and utility companies, and has been penetrating at least 20 to 50 new companies a week, the person said.

Google confirmed that some of the company's intellectual property was stolen and that it believed the attack originated from China, a Google spokeswoman told the newspaper. Chinese officials have denied their government is responsible.

The New York Times first reported that Google's password system had been breached.

Follow TheStreet.com on Twitter and become a fan on Facebook.
  •  
  • Loading Comments...
  •  

SHARE:

Five Filters featured article: Chilcot Inquiry. Available tools: PDF Newspaper, Full Text RSS, Term Extraction.

Fake security software 'still a big problem'

Posted: 20 Apr 2010 02:36 AM PDT

Fake security software was the No. 1 cybersecurity woe afflicting computer users in 2009, and Apple users lost some of their immunity to cybercrime as they stored more data online instead of on hard drives, according to the cybersecurity firm Symantec.

In a report released today, Symantec noted that Brazil had risen to third place in the list of countries with "malicious activity," defined as spam, online scam attempts and other types of cybercrime. The United States remained in first place at 19 per cent, with China second at 8 per cent, and Brazil third at 6 per cent.

Conficker - a malicious software program all over the news last April - and sophisticated attacks on websites of Google and other large companies in December and reported in January were the most publicized cyber events of the year.

But the single most prevalent form of cybercrime was fake security software, which computer users normally see as a flashing notice that their computer is infected with a virus, said Vincent Weafer, a Symantec vice president.

The notice often provides a link to software that can be downloaded after payment, but the user does not get security software but rather, a virus or worse, Weafer said.

"Virtually everything we see today is fake AV (anti-virus)," he told Reuters. "It's such a money-making racket."

The scam is popular is because victims willingly hand over their credit card numbers, thinking that they are purchasing legitimate software, and those credit cards can then be used at will.

Weafer also warned that Apple users, as they move their computer activities like storing photographs in remote servers managed by online companies, will have to take the same precautions that savvy PC owners have used for years to avoid identity theft. These precautions include keeping credit card and other key numbers secret and being suspicious of offers that seem too good to be true.

"It's the notion of 'I'm on a Mac.' Yes, you're on a Mac but you're in the cloud," said Weafer. "They've got to be as careful as anybody else."

'); } else { document.write('

Five Filters featured article: Chilcot Inquiry. Available tools: PDF Newspaper, Full Text RSS, Term Extraction.

Lufkin computer expert says hackers on the rise

Posted: 20 Apr 2010 05:39 PM PDT

By Holley Nees - bio | email

LUFKIN, TX (KTRE) – It's not uncommon to find your Facebook account hacked and malicious software infiltrating your PC.  Lufkin computer experts say there are some things people can do to protect themselves against viruses.

After years of working on computers, Brad Adams knows how to spot a virus.

"It used to be just viruses through email and things like that, that I would see," said Best Buy Geek Squad Agent Brad Adams.  "It was common, but not as common as it is now.  I have people that come in and buy computers and two days later they're already infected."

Every day, he sees multiple cases of MalWare or malicious software.  He said it usually shows up as a security tool.

"Your background will turn just completely black and then you will get a pop-up," explained Adams.  "It looks just like a Windows pop-up, but it says that you're infected with all these viruses and it's not true, that's actually the program itself that's the problem."

Adams said try to stay away from anything free and when it comes to social networking sites, be careful what you click on.

"Reading messages, posting messages, posting pictures, viewing pictures on somebody's profile seem to all be pretty safe, but it's the inbox messages and maybe some of the games that are causing the problem," said Adams.

Sam Shupak has been hacked before.

"I had my MySpace account hacked one time about two years ago," remembered Shupak.  "I added somebody that I didn't know and they hacked my account and started sending advertisements to other people in my account."

However, these days, it's more than just a password issue.  Adams said common sense isn't enough to stop them.

"Make sure your computer is fully up to date with Windows updates, that your AntiVirus and anti-spyware protection is installed correctly, that it's up to date," said Adams. "Then, maybe look into getting MalWare protection."

If you let your guard down things often seem safe, until your computer quits running properly.

"You will never ever, ever see a legitimate window pop-up on your computer that says, 'hey you're infected, you need to buy this to clean it off'," Adams said.

"Just be careful about who you add because not everyone on there is going to be your friend," Shupak said.

Adams said it's also a good idea to avoid peer to peer file sharing through programs like LimeWire and FrostWire.

©2010 KTRE. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Five Filters featured article: Chilcot Inquiry. Available tools: PDF Newspaper, Full Text RSS, Term Extraction.

No comments:

Post a Comment