Blog Posts Tagged with "Intellectual Property"

7ddc1f3000a13e4dfec28074e9e7b658

Trading Away our Digital Rights: More Nations Join TPP

November 23, 2012 Added by:Electronic Frontier Foundation

As TPP talks trudge along with ever more Pacific nations participating in the meetings, our alarm over its intellectual property (IP) provisions has only grown. The IP language in this intricate trade agreement would harm users’ digital rights in profound ways, such as pressuring ISPs to become Internet cops...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congress Probes USTR on the Confidential TPP Negotiations

October 18, 2012 Added by:Electronic Frontier Foundation

The Trans-Pacific Partnership agreement (TPP) threatens to regulate and restrict the Internet in the name of enforcing intellectual property (IP) rights around the world, yet the public and civil society continue to be denied meaningful access to the official text and are even kept in the dark...

Comments  (0)

296634767383f056e82787fcb3b94864

Lockheed Martin's Rip-0ff of Your IP - By Contest Entry

September 08, 2012 Added by:Jeffrey Carr

Lockheed Martin has announced a contest which awards $50,000 to the winners of "Innovate The Future Challenge: How Might We Enable A More Secure Future For Our Planet?". They want you to share your ideas on how to solve that for free. Sound good? You'd better read the fine print...

Comments  (1)

C67c179cd59e50f867e06086f5b2d21f

How the Cloud Disrupted the Corporate Ecosystem

August 29, 2012 Added by:Barrie Hadfield

As the cloud wields increasing influence on corporate environments, the traditional ecosystem becomes more antiquated. There’s some paradox in how the cloud is enabling productivity and collaboration while simultaneously eroding security protocols designed to protect intellectual property and corporate assets...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

TPP: Don’t Let Them Trade Away Internet Freedom

August 28, 2012 Added by:Electronic Frontier Foundation

The intellectual property (IP) chapter would have negative ramifications for freedom and innovation and second, the process has shut out multi-stakeholder participation and is shrouded in secrecy. The TPP is a threat because it rewrites global rules on IP enforcement and restrict the public domain...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Three Domains Seized for Distributing Pirated Android Apps

August 27, 2012 Added by:Headlines

“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Increasingly Target Small Companies

August 26, 2012 Added by:Bill Gerneglia

Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...

Comments  (4)

3e35900ae6facc6c146a85c435c71d82

The Rise of the Virtual-Plagiarist

August 13, 2012 Added by:Ben Rothke

Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

China Has Backdoor Access to Eighty-Percent of Communications

July 16, 2012 Added by:Headlines

Former Pentagon analyst F. Michael Maloof warns that the Chinese government has backdoor access to as much as eighty-percent of the worlds telecom traffic, giving the regime access to sensitive communications made possible by equipment from two Chinese based telecom giants - Huawei Technologies and ZTE...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Espionage and the Greatest Transfer of Wealth in History

July 10, 2012 Added by:Headlines

"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Internet Users Again Shut Out of Secret TPP Negotiations

July 05, 2012 Added by:Electronic Frontier Foundation

We don’t know what’s in the current version of the TPP’s IP chapter - the public has only seen a leaked version. Given what we've seen in this leak, we have every right to be furious that representatives are negotiating an agreement that will harm online expression, privacy, and innovation on the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Company Guilty of Illegal Export of U.S. Military Software to China

July 04, 2012 Added by:Headlines

“Preventing the loss of critical U.S. information and technologies is one of the most important investigative priorities of the FBI. Our adversaries routinely target sensitive research and development data and intellectual property from universities, government agencies, manufacturers, and defense contractors..."

Comments  (0)

296634767383f056e82787fcb3b94864

Breach Alert: Putin Makes Drone Development a National Priority

June 19, 2012 Added by:Jeffrey Carr

Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

No Copyrights on APIs: Judge Defends Interoperability and Innovation

June 18, 2012 Added by:Electronic Frontier Foundation

Judge Alsup, a coder himself, got it right when he wrote that “copyright law does not confer ownership over any and all ways to implement a function or specification of any and all methods used in the Java API.” It's a pleasure to see a judge so fundamentally understand the technology at issue...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security: Back to the "Made in the USA" Tradition

May 23, 2012 Added by:Jayson Wylie

The US government’s Department of Defense had, and may still have, issues with counterfeit components being procured and used in military weapons, vehicles and equipment. It’s a national security issue when the supply chains are compromised by weaknesses and scams...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Hard Power, Soft Power, and the Power of Digital Espionage

May 21, 2012 Added by:Infosec Island Admin

By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...

Comments  (4)

Page « < 1 - 2 - 3 - 4 - 5 > »