latest news
Source - Forbes News

Software Is Dominating Venture Capital Investments In 2014

Just over $4B was invested in software deals by venture capitalists (VCs) during Q1, 2014, four times as much as biotechnology. Software deals netted out 42% of all dollars invested in the first quarter, with biotechnology receiving 11%.  VCs invested $816M in IT Services or 9% of all dollars, making this the third largest investment category.  Interest in IT Services continues to accelerate, with dollars invested in this category increasing 33% compared to the prior quarter.
break line

For banks in cyber heist, how to get their money back?

Because the sums were large and such attacks are relatively new, the two Middle East banks hit in a
break line
Source - Forbes News

Galaxy S5 is Very Good But Not Amazing

After spending several days using the new Samsung Galaxy S5, I'm generally impressed but not overjoyed. It's a solid phone and an incremental improvement over last year's Galaxy S4 but it's not a game changer.
break line
Source - Forbes News

Is Big Data A Potential Distraction?

Many businesses would benefit from asking themselves if the time and effort that they are devoting to their ?Big Data? projects is the best use of their skills and limited resources. And, to ask what impact it is having on their ability to deliver a great service and experience to their customers.
break line

INTERNATIONAL: E-Commerce and Tax Law Journal

IBLS is pleased to announce its newest law publication: E-Commerce and Tax Law Journal. The Law Journal is
break line
Source - Forbes News

Best- And Worst-Performing Cloud Computing Stocks April 11th To April 17th And Year-to-Date

The six highest performing cloud computing stocks year-to-date in the Cloud Computing Index are F5 Networks (NASDAQ: FFIV), Akamai (NASDAQ: AKAM), VMWare (NYSE:VMW), Juniper Networks (NYSE:JNPR), EMC (NYSE:EMC), and Fusion-IO (NYSE: FIO).  A $10K investment in F5 Networks shares made on January 2nd of this year is worth $12,195 as of market close yesterday.
break line
Source - Forbes News

As Unexpected Medical Expenses Mount, Crowdfunding Site Lifts Boston Marathon Victims

Out-of-pocket (OOP) medical expenses in the United States cost Americans nearly $328 billion in 2012 , with many attributing significant numbers of yearly bankruptcies to medical expenses. No one knows these kinds of unexpected costs like Pat and Jess, a couple who, both sustained severe leg injuries after one of the bombs went off at the finish line of the Boston Marathon on April 15th, 2013. When faced with an expected $500,000 lifetime cost for each amputee, with much of their needs not covered by insurance, the couple did not know where to turn. Then their friends started a fundraiser for them on GiveForward, the brainchild of two individuals who wanted to see crowdfunding in the health and nonprofit space .
break line

OXFORD/IBLS: Global E-Business Law and Taxation

IBLS and its global legal network of experts bring you a representative masterpiece of global
break line
Source - Forbes News

Hearthstone vs. Rollercoaster Tycoon 4: The Battle For The Soul Of Mobile Games

It's been an interesting month for mobile games, one that I believe clearly illustrates a split for the scene with the release of two high profile games, Blizzard's Hearthstone and Atari's RollerCoaster Tycoon 4. Hearthstone is a new game drawing from old concepts, but has seen great popularity in its recent PC release. RollerCoaster Tycoon is a storied franchise responsible for many great memories in gamers' childhoods and beyond.
break line
Source - Forbes News

Cyphort Adding Context To Advanced Malware Detection

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors paid a fee to cover the expense of producing the videos.
break line
Source - Forbes News

How I Give Back Time -- To Science

When it comes to scientific research, sometimes the biggest obstacle of them all is time. It takes time to conduct research, plan experiments, and analyze findings that lead to scientific breakthroughs. The National Ignition Facility (NIF) recently announced its own breakthrough. How does its CIO maximize NIF scientists' time?
break line
Source - Forbes News

Pebble Is Winning The Wearables War and What That Means For The iWatch

Pebble has defined the terms of success, for now, and other wearable wannabes from Apple to Google to Samsung should study what it has done right.
break line
Source - Forbes News

How Cell Phone Carriers Stiff Consumers

Eight ways cell phone carriers are sticking it to consumers.
Source - BBC News

BBC and Sky experience fault on iOS

The BBC and Sky's video-on-demand apps simultaneously experience a fault on iPhones and iPads that prevents TV shows from streaming.
break line
Source - BBC News

German media boss criticises Google

In an open letter to Google's Eric Schmidt the boss of German publishing firm Axel Springer says it is afraid of the search giant.
break line
Source - BBC News

Lavabit loses contempt appeal

A US appeals court upholds a contempt of court ruling against the secure email service provider Lavabit used by whistleblower Edward Snowden.
break line
Source - BBC News

Cyborg glasses express fake emotions

A Japanese researcher creates glasses that show computer-generated eyes that express emotions so that the wearer does not need to bother.
break line
Source - BBC News

Galaxy S5 fingerprint sensor hacked

German security researchers say that a spoof fingerprint can be used to unlock Samsung's new handset and steal money.
break line

INTERNATIONAL: E-Commerce and Tax Law Journal

IBLS is pleased to announce its newest law publication: E-Commerce and Tax Law Journal. The Law Journal is
from legal correspondent
by Mike Redford, JD, LL.M, JSD

Identity Theft (Part 10)

Identity Theft and Assumption Deterrence Act, 18 USC 1028 The courts have consistently used Title 18, part I, chapter 47 § 1028 for dealing with identity theft. What is surprising is that section § 1028(a) in relevant part refers to “fraud and related activity in connection with identification documents, authentication features, and information [More...]
break line
by Mike Redford JD, LL.M, JSD

Primary Cyber Crime Sources in the US (Part 9)

Primary Cyber-Crime Sources in the US a. Hacking Hacking is the illegal access of a computer network or information technology of another to invade the privacy of a network and carry out illegal activities in the form of either theft (consisting of copyright infringement, trade secret, and identity theft), or unauthorized access for a thrill or to cause damage.14 [More...]
break line
by Mike Redford, JD, LL.M, JSD

Primary Cybercrime Sources in the US (Part 8)

Primary Crime Sources in the US There are two primary Internet crime sources in the United States. They are hacking and identity theft. Many use both interchangeably, and they are arbitrarily used and most often classified as the same by prosecutors owing to a lack of better understanding [More...]
break line
by Mike Redford, JD, LL.M, JSD

Cybercrime Initiative (Part 7)

Cyber Legislation Protecting Students and Children Cyber legislation protecting students has yet to gain attention in Washington. The bill H.R.780 promotes the safe use of the Internet by students. There is not much legislation addressing academic environments that should preserve the ethics of the profession within the learning environment [More...]
break line
by Mike Redford JD, LL.M, JSD

Cybercrime Initiative(Part 6)

Communication laws use for cybercrime There are many adopted laws to operate in cyber world based on the linguistics in Table 3. The emerging cyber law to fight the modern day cybercrime must take a look at the technology first. [More...]
break line
by Mike Redford, JD, LL.M, JSD ,PhD

Privacy and Cybercrime (Part 5)

There are many of the cybercrime laws that have reached out to the common law, particularly frequent reliance on the case laws. The concern is that most of these cases had no precedents in cybercrime. [More...]
break line
by Mike Redford, JD, LL.M, JSD

Cybercrime Initiative (part 4)

Is United States Congress’s focus on domestic cybercrime solutions sufficient enough to address cybercrimes committed from outside the United States? Are US citizens aware of precepts of cyber law? Do they understand and have in-depth knowledge of facts surrounding cybercrimes [More...]
break line
by Mike Redford , JD, LL.M, JSD

Cybercrime Initiative (part 3 )

United States President Obama persuaded EU and other countries to stay active in fighting cybercrime. One of such global effort has yielded bill S.3155 International Cybercrime Reporting and Cooperation Act. This legislation requires the Office of the President to provide a global assessment of identity threats from abroad and work with other countries to crack down on their own cyber criminals [More...]
break line
by Mike Redford JD, LL.M, JSD

Cybercrime Initiative (part 2)

The United States Presidents have been proactive in participating in the fight against cybercrime. [More...]
break line
by Fernando Tomeo, Computer Law Attorney, professor of Law, University of Buenos Aires

Social Networks and Technology 2.0

Internet services or Internet Services Providers ( hereinafter referred to ISP ) have been defined by different authors. [More...]
other news
Source - BBC News

HMRC 'plans to share personal data'

Taxpayers' personal financial data could be shared with private firms and researchers, Revenue & Customs says, despite concerns over privacy and security.
line break
Source - BBC News

Virgin apologises for email glitch

Virgin Media apologises after some of its customers received hundreds of unwanted emails because of a distribution list error.
line break
Source - BBC News

Kim Dotcom wins back cars and cash

Kim Dotcom, the multimillionaire founder of closed file-sharing site Megaupload, has won back cars, cash and property seized in a January 2012 raid.
line break
Source - BBC News

Google shares fall on ad concerns

Shares in Google fall 5% despite reporting first-quarter profit of $3.45bn in response to worries over future income from advertising.
line break
Source - BBC News

First Heartbleed 'hacker' arrested

A 19-year-old Canadian citizen is charged with hacking into the Canada Revenue Agency's website, becoming the first arrest in relation to the Heartbleed security breach.
line break

For banks in cyber heist, how to get their money back?

Because the sums were large and such attacks are relatively new, the two Middle East banks hit in a
line break

OXFORD/IBLS: Global E-Business Law and Taxation

IBLS and its global legal network of experts bring you a representative masterpiece of global

Seminar in E-commerce Law

Customized, tailored made for your organization
Specifically designed to increase the skills and competence in areas concerning doing business online. The focus is on the best practices and practical skills in various aspects of Internet Law designed to enhance practical knowledge of e-commerce legal issues. The Program is carefully drafted acknowledging relevant topics and main issues concerning Internet and E-commerce regulations.
library
Insightful articles on Internet and reference to source material.
global network
A unique opportunity for your law firm to promote its expertise to the audience of millions!
ask the expert
Legal experts around the globe are online and ready to discuss you topics.
discuss icon
Internet Law FORUM
Advertise here!