AtomicJake writes: Security weaknesses in the hugely popular file-sharing Web site thepiratebay.org have exposed the user names, e-mail and Internet addresses of more than 4 million Pirate Bay users, according to information obtained by KrebsOnSecurity.com.
AtomicJake writes: Carl Adam Petri died July 2. Petri was the inventor of the Petri net, a powerful graph to analyze networked processes and concurrency. The beauty of the Petri net is that it is mathematically very powerful, but at the same time the graphs are easy to understand also by laymen.
AtomicJake writes: If you buy a new camera, you are bound by its MPEG LA license to only use it for "personal use and non-commercial" purposes. So, if you put your own movie with ads on your server, you may actually be liable to pay royalties. Even, if the distribution format is not under the MPEG LA license. This view is explained by Eugenia Loli-Queru, who thinks that our civilization's video art and culture is threatened by the MPEG LA.
AtomicJake writes: As the World Intellectual Property Organization (WIPO) in known for a very rigid course combating counterfeiting and piracy in general, it comes as a surprise that during a meeting of the WIPO Advisory Committee on Enforcement, several presenters have shown nuanced views on the economics of enforcing the intellectual property rights. Combating clothing piracy might not be beneficial for the welfare of a developing country. Most surprising is the presentation (PDF) of WIPO Chief Economist Carsten Fink, which says that illegal copies of software may actually be beneficial even for consumers of the original goods. Also the piracy of audio-visual goods creates not only losses but also benefits for e.g. hardware manufacturers. Maybe this is because Mr. Fink wrote the presentation before joining WIPO?
AtomicJake writes: Symantec and McAfee have published statistics and graphs that show from where most malware attacks origin. Symantec XI thread report maps top countries for malicious activity with geographical data on: bot-infected computers, bot command-and-control servers, phishing Web sites, malicious code reports, spam relay hosts, and Internet attacks. McAfee's Mapping the Mal Web concentrates on the relative risks when surfing the Web for the different top level domains.