Posted by Charles Batikha.
Ransomware is similar to a Trojan horse. Imagine receiving an email from a non-familiar email address. The email claims to be the IRS claiming you are being sued for tax evasion and instructed to click on a link to a website. You are skeptical, but what is the worst thing that could happen if you click on the link. Malware was the virus used when ransomware was first introduced, but more recently website URL and deceptive pop-ups are being utilized. Home computers are not the only victims, business and even government systems have been breached as well.
Upon clicking on the link your browser becomes frozen, unable to use your computer a message pops onto the screen informing you of the encryption of your computer. This renders it useless and a fee is charged for the encryption key, which will cost anywhere from $200 to $5000. This is the newest “variant” called Crypto-Wall or Crypto-Wall 2.0. Interestingly enough, the scammers instruct victims to purchase bitcoins to be used for payment. Bitcoins have become much more popular among criminals because of the concealment of their identity.
Ransomware has also begun to hit smartphones, locking them as well. I personally have fallen victim to this type of ransomware. A message popped up stating that I must contact Apple to unfreeze my phone, but every time I closed the pop-up the notification would come up again not allowing me to use my internet. I called the phone number on the message, and I noticed that the phone line was a Google number, which made me a little suspicious. Immediately after someone answered the phone, they gave me a scripted explanation of how my system was locked and I need to give them my credit card number for a fee for them to unlock my phone. Fortunately enough, I did not pay the fee and hung up on the pleading receptionist.
A way I have found to refresh your phone from ransomware is to clear your website data in the setting of your phone. This has given me the use of my internet after being hit with ransomware. Updated anti-virus software on your computer is another preventative tactic. Using a pop-up blocker and not fumbling with unsolicited emails are other great tips as well.
Charles is a graduate accounting student with a certificate in forensic accounting at the Feliciano School of Business, Montclair State University.
Posted by Nadia Haddad.
Throughout the article, “Intellectual Property,” the author Darren Dahl talks about four different common fallacies that small business is unaware. The two most precious resources for any small business owner are time and money. Small business owners believe that it is not worth the time or effort to secure intellectual property rights. A patent can cost up to $25,000 to secure, in comparison to trademarks and Web addresses, which are cheap and can be obtained with the help of a lawyer.
In one case, Daniel Lubetzky, chief executive of New York City, Kind Snacks, heard that one of his competitors had copied the packaging, look, and feel of his bars. Lubetzky had secured components for his property like trademarks, trade dress, and Web addresses after founding his company. Mr. Lubetzky sent a competitor that was stealing his IP a cease-and-desist letter in order to stop the offender.
The above example stresses the erroneous belief that “once I get a trademark, my brand is safe.” In another case, Tracey Deschaine, who runs a restaurant called Dixie Picnic in Ocean City, N.J., secured trademarks, logo and name of her signature item, cupcakes. Even though she had trademarks for her business, someone else was monitoring the activity on the United States Patents and Trademark Office’s website and her spotted her application. They secured the Web address, or URL, before she could. This shows that, just because you have a trademark, it does not mean you are completely protected.
The third topic mentioned was about how “having a patent gives me the right to produce something.” What a patent does is gives you the right to prevent someone else from producing what your patent covers. Mr. Kocher of Cryptography Research says, “having a strong IP position helps ensure that other pay you for your innovation like they would on a toll on a road.” (Dahl).
Another fallacy mentioned is “If I have a patent or trademark in the United States, I don’t need to worry about the rest of the world.” In some countries, like Japan, it is expensive to acquire patents. The author suggested when deciding what your international IP strategy should be, consult a lawyer, and conduct some cost-benefit analysis to see if expanding your IP rights makes proper sense.
The last fallacy the article states “people who collect patents but don’t actually make anything are ‘patent trolls.’” In many cases, companies invent something, obtain a patent, and license it out for manufacturing by another. An example described was how a patent for wireless e-mail delivery held by NTP, a small holding company, something that R.I.M eventually would pay millions of dollars to license from them. The problem with this was NTP was trying to enforce its patent when it did notmake any products itself from the beginning.
Nadia is a business administration major with a minor in international business at Montclair State University, Class of 2016.