Category Archives: Abuse

Matvil Corp. Continues Its Fight Against Illegal Actions of the Legal System of Moldova

A case of intellectual rights dispute sheds light on the corrupt legal system of Moldova

TORONTO, Canada, 2020-May-15 — /EPR INTERNET NEWS/ — As one of the leading online ethnic TV providers, operating in North America, Matvil Corp. discovered, there is no reliable system in place that protects legal broadcasters from dishonest competition. In their attempts to enter the US and Canadian markets, Internet pirates commit fraud and manipulate data in order to influence the corrupt legal system of Eastern European countries and try to destabilize operations of successful companies, cause financial damage and hurt their reputation.

The case Radio Star Ltd. against Matvil Corp. is a vivid proof of such practices.

On June 8, 2018, Radio Star Ltd. filed a lawsuit against Matvil Corp. in the court of Chisinau, Moldova, stating that the latter illegally broadcasted a number of Russian and Ukrainian channels on the territory of Moldova.

It should be noted right away that in support of its demands, Radio Star (Moldova), knowingly and deliberately used various methods to circumvent technical protection measures undertaken by Matvil Corp., and subsequently presented them as evidence. Using ExpressVPN program, accomplices or employees of Radio Star (Moldova), (which in this case is a media “pirate”), physically located in the Republic of Moldova, created user accounts and, using American IP addresses, with location in New Jersey, USA, registered on the Matvil Corp website, thereby creating the illusion of receiving services offered by the company.

It should be clarified that ExpressVPN program is a virtual tunnel that virtually changes the physical location of a computer or other electronic device, assigning this device a virtual IP address, indicating a virtual location anywhere in the world (at the choice of the user of this program), while physically, the electronic device is located in its territorial space.

Matvil Corp is a respectable media provider that provides online TV broadcasting services in Canada and the United States. Subscription access to the service for users from the countries of former USSR and Russia is strictly prohibited and unavailable.

However, malicious desire for illegal enrichment pushes such adversaries as Radio Star (Moldova) to resort to illegal actions, falsification, fraud and the commission of crimes using IT technologies.

Moreover, as it became known already in the framework of the trial, Radio Star (Moldova) does not have exclusive rights at all to broadcast Russian and Ukrainian television channels in the territory of the Republic of Moldova. Radio Star (Moldova) is just an agent for the distribution and conclusion of contracts with the end consumer and with a limited duration of contractual agreements.

In addition, Matvil Corp did not receive any claims from the copyright holders, and Radio Star (Moldova) did not provide any evidence that authority was granted by the copyright holders to protect their interests.

Despite all of the above, on January 18, 2019, Chisinau Court of First Instance, Judge Oksana Parfeni, ruled in favor of Radio Star, accepting all their fabricated evidence as reliable, but denied Matvil Corp representatives the right to hear IT experts / specialists and also denied the right to hear those persons who allegedly gained access to the service.

If the court were objective and impartial, then these adversaries would be asked only one question: “For what reason and why did they use ExpressVPN program, used American IP addresses, with location in New Jersey, USA, and did not try to log in on Matvil Corp website under valid Moldovan IP addresses? ”

On February 2, 2019 lawyer Matvil Corp appealed the decision of the first instance, however, even here Matvil Corp had to face partiality.

On April 5, 2019, that is, after 2 months, Chisinau Appeal Chamber issued a Decision, which decided to return the appeal because it was filed by an unauthorized person. The reason for this decision was a banal and completely illegal motive: the power of attorney issued to the company’s lawyer was allegedly not legalized in the Ministry of Foreign Affairs of the Republic of Moldova.

It should be noted that this Decision was not sent to Matvil Corp lawyers until May 15, 2019 (apparently it was concealed in order to have the appeal dates expire). Only after applying with an official statement and demanding to indicate at what stage the filed appeal was, the court deigned to issue this Decision.

On the same day, May 15, 2019, the lawyer filed a protest against the Decision dated April 5, 2019, where it was decided to return the appeal, and on June 6, 2019, the Higher Trial Chamber of the Republic of Moldova ruled that the power of attorney was legal, and therefore obliged the Appeals Chamber to consider on its own merits the appeal about the decision of the first instance of the Court.

Thus, the first ray of hope for the objectivity and honesty of the Moldovan Judicial System appeared.

November 14, 2019 – The Appeal Court acknowledged the fact that Radio Star (Moldova) does not have any exclusive rights to broadcast TV programs and does not have the authority to protect the interest of copyright holders and, as a result, reversed the decision of the first instance and dismissed adversaries’ lawsuit.

It seemed as though that justice has triumphed!!!

However, the miracles of the legal / judicial system of Moldova continued.

Just by accident and thanks to the vigilance of the lawyers, it became known that Radio Star submitted cassation appeal to the Supreme Court of Justice on January 14, 2020.

This information appeared on the court’s website, but until today, neither Matvil Corp nor the company’s lawyer have received a copy of this complaint and have not been officially informed of its existence.

Moreover, on March 18, 2020 this complaint has already passed the admissibility procedure, and the review itself is scheduled for May 20, 2020 and, what is noteworthy, without the participation of the parties!

This series of non-compliance with the requirements of the Law by the system itself, which was created to protect it, shows that it serves the interests of a certain group of people.

Using the Moldovan judicial system, unscrupulous competitors try to destabilize the business and cause serious financial and reputational damage to American and Canadian companies that do not conduct and did not intend on conducting business in Moldova.

Via EPR Network
More Internet & Online press releases

Study: Contemporary forms of racism and bigotry on social media platforms

SOUTHAMPTON, 20-Sep-2018 — /EPR Internet News/ — As social media has experienced considerable exponential growth-rate over the past decade, sadly the same has occurred with online hate speech. Clear evidence of this picture is the fact that different international organisations, including the United Nations Human Rights Council, the European Commission against Racism and Intolerance, and national governments across Europe; namely the UK, Germany, France and Italy, have demanded that the large corporations behind the major social media platforms do more to address this issue. In fact, recent sociological research reveals that, while more needs to be done at the corporate level, there is also other actions that could be taken by national governments and educational bodies towards changing this picture in the near future.

To this end, Dr Luiz Valerio P. Trindade, has undertaken a four-year qualitative study addressing the social impacts of hate speech, racism and bigotry on social media platforms. Based on that, he has developed key recommendations that could stem the practice and help to prevent this phenomenon taking place and laying the foundations for reducing their occurrence in the years to come. With research revealing that even individual Facebook posts with racist and hate content can continue to engage users for up to 3 years after the initial publication, far from being just one moment of instant communication, hateful posts have a life spam that surprisingly extends over a long period. Perhaps more worryingly, the research evidences that social media is held to be a ‘No Man’s Land’ by the proponents of hate and bigotry, suggesting that these people feel at ease to convey their ideologies believing that authorities cannot reach them.

Dr Trindade has developed clear public policy recommendations that could make a difference towards promoting change in users’ behaviour on social media, such as:

  • Discussing the consequences of online hate speech with secondary school pupils and helping them to develop a clear understanding of the real life’s impacts and consequences of this practice. This is critical because social media is widely used by the 13-17 years-old age group, with over 1.8 million users of this age in the UK alone and 172 million globally.
  • Educational campaigns at national level to highlight the fact that online life is not detached from offline and that, in fact, they are intertwined.
  • Working to ensure that the large corporations behind the major social media platforms have effective and faster processes to remove inappropriate content that’s been flagged up by their users or spotted by their powerful algorithms.
  • Calling for these corporations to clearly highlight to their users that their platforms are not a safe paradise for them to convey racist views or promote bigotry exempt of consequences. Instead, these corporations need to set out clearly that identification data could be disclosed to the authorities, who could then hold them to accountable for their online attitudes.

Dr Trindade, PhD in Sociology by the University of Southampton says, “The increasing trend of construction and dissemination of hate speech, bigotry, misogyny and racism are apparently becoming the ‘new normal’ in the digital landscape across several European countries and also in the UK. Moreover, rather than fading away soon after publication, derogatory posts oftentimes become powerful magnets attracting several new users for the same conversation for up to three years, what can potentially increase the initial harm caused to the victim of the verbal abuse”.

SOURCE: EuropaWire

Axiomatics offers fine-grained policy-based access control and dynamic data masking and filtering

CHICAGO, Oct-05-2017 — /EuropaWire/ — Axiomatics, the leader in fine-grained dynamic authorization, today announced that KuppingerCole has profiled its data-centric dynamic authorization suite in a recent analyst report titled, “Executive View – Axiomatics Data Security.” The report sheds light on two flagship products; Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control mechanism across different types of data stores, and centralizes policy-based authorization rules for access to the content within these data stores.

KuppingerCole’s Executive View describes the solutions in detail and offers advice to IT professionals looking for data-centric security. The Axiomatics Data Access Filter offers policy-based access control and dynamic data masking and filtering for relational databases. Implemented as a database proxy, the product intercepts all connections to the database from any user or application and analyzes every SQL statement for potential violations of applicable security policies. In accordance to the ABAC approach, the authorization service may query multiple attribute sources for additional context information needed for a fine-grained access decision.

SmartGuard™ for Big Data (the most recent addition to Axiomatics’ data security portfolio) extends ABAC-based dynamic authorization to Hadoop Big Data stores. There’s a growing need to ensure consistent fine-grained access control and maintain regulatory compliance for Hadoop. These infrastructures often comprise multiple loosely coupled components, and Big Data stores are used to store massive amounts of data from numerous sources with multiple applications accessing them simultaneously. Utilizing ABAC for transparent dynamic access control to a Big Data store for multiple analytics applications allows enterprises to combine all the benefits of a single data warehouse with the traditional siloed approach, where each application has access only to its own data silo.

“For years, we have been tracking the information security market. As data security threats rise, Axiomatics continues to lead by offering solutions that help companies with fine-grained policy-based access control and dynamic data masking and filtering. Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data are a natural expansion of the company’s comprehensive suite of dynamic authorization solutions,” said Alexei Balaganski, lead analyst for KuppingerCole and author of the report. “Whether deployed standalone or as a part of an enterprise-wide ABAC infrastructure, these products provide an additional dynamic security and access control layer around multiple data stores transparently and without any application changes.”

“Our relentless focus on solving the toughest problems in data-centric security, have made Axiomatics the choice for IT professionals and companies looking for data security solutions to complex big data environments,” said Gerry Gebel, vice president of business development at Axiomatics. “We are honored to have such a distinguished analyst like KuppingerCole continue to review our suite of products. Their reports further underscore its commitment to delivering cutting-edge information on data security in the era of digital transformation.”

For more information about Axiomatics, visit www.axiomatics.com. For more information on KuppingerCole, visit https://www.kuppingercole.com.

SOURCE: EuropaWire

SecBI’s software provides early and accurate detection of advanced cyber threats

Tel Aviv, Israel and Rome, Italy, 26-Sep-2017 — /EuropaWire/ — SecBI, a leading developer of advanced cybersecurity threat detection solutions, and Innovery, a leading ICT services provider and software developer, today announced a partnership for distributing SecBI products in Italy and Spain.

“Traditional security means are simply insufficient in dealing with advanced threats, leading to an average dwell time of 100 days before the attack is identified,” said Gilad Peleg, CEO of SecBI. “With SecBI, we can drastically reduce this time span to hours and provide the analyst with early and accurate detection with no false alerts. We are delighted to partner with Innovery, who have the expertise and reach to promote SecBI’s solution to the Italian and Spanish customers who need it.”

“In order to be always ahead of our competitors and offer the best possible services, Innovery invests a lot in new technologies,” said Mr. Gianvittorio Abate, CEO and co-founder, Innovery. “Hence our collaboration with SecBI, a company that we feel has the potential for a great future in the security arena.”

SecBI’s software provides early and accurate detection of advanced cyber threats, including those that are hidden from other systems. By providing full-scope analysis of threats — including all involved users, devices, domains, IPs, C&C servers, drop points and more — SecBI makes mitigation fast and accurate.

Innovera and SecBI will present SecBI’s solution at Cybertech Europe 2017, taking place on September 26-27 at Roma Convention Center – La Nuvola.

SOURCE: EuropaWire

Nothing’s Safe In Cyberspace Says Leo Impact Security

What do the NSA, the Army and Sony Corporation have in common with US embassies around the world? All of them, along with over 2,500 other entities, have been compromised by hackers like Wikileaks and Antisec. The cost of these cyber-crimes has mounted to over $3 billion a year. And “the little guy” isn’t safe, either. Everyone who uses the internet is at risk, despite the increasing use of antivirus software, IDS/IDP and firewalls in the current security models.

Today Leo Impact Security is exposing top secret methods used by cyber criminal’s also defending preventive methods because today all corporate, personal, and government computers are vulnerable to remote cyber attacks.

How do cyber criminals bypass current security model?

1. Antivirus bypass using crypters and protectors with random encryption methods
(ex: cypherx, Themida).
2. Firewall bypass using known ports in malware like port 80 and 8080.
3. IDS/IPS avoid using SSL encryption+ DNS tunneling-based malware (BOTS, RAT).
4. Remote access to any computer using Zero day exploits (.doc, .PPT, and .PDF individual files), Java silent driveway, browser packs, Router DNS MITM, and pen testing tools – Core impact, immunity canvas, Metasploit Pro etc.

For Proof of concepts/Live demos, check our site: http://www.leoimpact.com

How to defend against advanced cyber attacks?

Use m2 security model developed by cyber security expert Manish Kumar, chief research officer at Leo Impact. All of the following services are nonprofit as per our Corporate Social Responsibility (CSR).

1. World’s first free antivirus scanning online engine which protects your PC from viruses, trojans, spyware, rootkits, and other malicious programs (zero day exploits) and attachments by using 32+ antivirus on cloud. Visit: www.balajiplus.com

2. To protect against unknown malware (rootlets, trojans, BOTS-Zesus, spyeye, Ghostrat, etc.) and zero day exploits attacks using Neutron+ Protection system software in PC.

3. To protect against remote-based attacks like DDOS, Sql Injections, XSS, and buffer overflow, use cloudflare.com on servers and Free VPN providers ( www.usaip.euwww.vpnreactor.comwww.torproject.orgwww.hotspotshield.com )

4. To protect against data & information leakage and other attacks, use our two-way authentication and free security analysis and consultancy.

Via EPR Network
More Internet & Online press releases

Review Website Now Available That Is Out To Help The Consumer

People have been dealing with work from home, weight loss & fitness scams for years. With the internet the “Scam” industry multiplied by ten. You rarely ever see honesty when it comes to internet purchases.

Risk Easy Reviews has been one of the few sites that are out there for the consumer. They claim to have success with some of the products they have tested. But they also have some negative claims & put that “do not buy” tag ON some as well.

Bringing honesty to the industry. Risk Easy Reviews has reviewed many products from work from home, forex, health, fitness, weight loss, Warcraft, internet TV and more. They also have made it a point to only try products that come with a great money back guarantee. There are many review sites on the net that have another agenda. And although everybody has got to make a living, Risk Easy Reviews seems to really care what people are reading and knows that their credibility is at stake with each review. It’s good to see that some people can still take the initiative to help people. Helping people better their lives which in turn enhances the world we live in.

Via EPR Network
More Internet & Online press releases

Fasthosts Warns Businesses Not To Copy Others Website Material

Fasthosts Internet Ltd, has warned UK businesses not to be tempted to copy material from other companies’ websites.

This warning comes off the back of findings by the web hosting provider which showed that there was an 89% increase in the number of content disputes reported to its in-house Abuse Department from April 2008 to April 2009. The problem varies from the occasional image being used, right through to entire website designs being replicated. The practice can lead to consumers becoming confused, or even being misled into purchasing from the wrong company.

In many of the cases Fasthosts investigated, the offending businesses stated that they did not realise that copying items of online material could land them in trouble.

A recent Fasthosts’ commissioned survey of 152 UK businesses also found that ‘web envy’ can be a real temptation for time-stretched business owners, with 39% admitting they are presently envious of the website of a closely competing business. Additionally the survey showed that 1 in 4 companies are actually considering reducing their use of external website design services in order to cut costs despite the average company only rating their own website at just 6 out of 10 for effectiveness, yet aiming to treble its online revenue in 2009. At a time when there is a huge amount of pressure on small business owners’ to maximise their use of the web, the temptation to take shortcuts by duplicating material from other companies’ websites can sometimes prove overwhelming.

Steve Holford, CMO Fasthosts Internet, said: “Particularly in a challenging economic climate, business owners may be tempted by the quick-fix of copying another firm’s work. Replicating material for commercial use often breaches copyright. Always obtain permission before using anybody’s website material.”

Significantly, the Fasthosts survey also found that 10% of participants had at least one item of their own company website copied by a third party between March 2008 and March 2009. The issue actually proved to be twice as common as cyber-squatting or other online security breaches. As a result Fasthosts is advising all affected users to contact the offending website hosting provider who should then intervene on their behalf.

Holford added, “Website envy is not new, but the tough economy appears to have led more companies to act unfairly upon it. Businesses will gain a better foothold on the Web and earn most value through a regular output of their own compelling material, and applying time to their website in small manageable steps”.

About Fasthosts
Fasthosts is the UK’s number one web hosting company. Based in the UK and operating 24×7 from their dedicated UK data centres, Fasthosts keeps over 1 million domains running smoothly and ensures over 6 million emails are delivered safely each day. All Fasthosts services can be self-managed through the award winning Fasthosts web-based control panel that provides customers with unparalleled online control, enabling them to manage hosted services including domain name registrations, shared web hosting, business-class email, dedicated servers, software-as-a-service, internet merchant accounts, reseller web hosting and unlimited broadband. Fasthosts’ highly successful reseller channel has recently been rated Number 1 for reseller hosting by industry portal Web Host Directory.

Via EPR Network
More Internet & Online press releases

Tracesmart Aim To Make IOD Fraud A Thing Of The Past

Making a concerted effort to stamp out Impersonation of the Deceased (IOD) fraud, Tracesmart, leading suppliers of identity verification tools, have this week launched Existence – a new suite of services with the potential to eliminate IOD fraud.

IOD is a form of identity fraud – it is estimated by the Home Office Identity Fraud Steering Committee, that identity fraud costs the UK economy £1.7 billion annually. Whilst IOD fraud has historically been hard to tackle due to the lack of death records being made available, recent changes in legislation have allowed the UK General Register Offices (GRO) to release death registration information (DRI) to commercial bodies with the aim of preventing fraud. It is this move that has enabled Tracesmart to develop their suite of services which will tackle IOD fraud head on.

Combining in-depth mortality screening and residency verification, the service allows users to ascertain whether an individual is alive and if they reside at their given address. Paul Weathersby, Technical Director at Tracesmart, commented on the data which drives these checks.

“The mortality screening element of our Existence services draws upon the GRO’s DRI data and the residency verifier calls upon a variety of consumer datasets including historic Electoral Rolls, leading gone away files and BT OSIS amongst others. The combination of these checks allows us to confidently identify deceased individuals and gone aways.”

The Existence suite comprises three services with which clients can conduct existence checks. Existence Search is an online facility which can be used to conduct single ad-hoc checks; Existence Batch is a batch screening service where multiple persons can be verified and the third, and possibly most significant service, is Existence Alert – an early warning system that notifies users of mortalities at the earliest possible opportunity.

Tracesmart has long provided tools for conducting identity checks and has a strong history in the field of fraud prevention. The combination of this experience and access to DRI will enable the Existence services to effectively help put an end to IOD fraud. Mike Trezise, Managing Director at Tracesmart, has already seen a high volume of interest in the product.

“Prior to launch we approached several key clients in the pension and financial sectors to gauge market interest in the product. As we suspected, the demand is most certainly there and we already have prominent pensions administrators and large schemes utilising the system to replace certificate of existence exercises, and many in the financial sector are employing it as part of their know your customer checks. Preventing IOD fraud will save businesses considerable amounts of money and protect consumers from both fiscal and emotional harm.”

Via EPR Network
More Internet & Online press releases

Netmasterclass Choose Locklizard DRM To Secure Their Online Training Courses, Preventing Intellectual Property Theft

“In recent years, education and training have increasingly been delivered by electronic means,” said Dr Trevor Mathews, Chairman of LockLizard. “What started 20 years ago with television courses and VCR services has become much more sophisticated and much more packaged today. Distance learning courses are now so advanced that in some cases a live instructor is no longer needed, and examinations to follow training can also be taken electronically.”

NetMasterClass, a leading Cisco Certified Learning Partner, has protected its Cisco training courses using the LockLizard DRM service in order to make them readily accessible and deliverable over the Internet, whilst remaining secure against intellectual property theft. “We had previously had the unfortunate experience of seeing our training materials posted on public web sites, effectively giving away the work and expertise that we had used to create new and novel training techniques, and you cannot operate a training business in that kind of environment,” commented NetMasterClass.

Now we are able to deliver on-demand, 24×7 training to customers globally when and where they want it. And without having the underlying worries about what will happen to our proprietary materials.”

Whilst DRM has been seen as a negative addition in the music and video industries, DRM in the online training industry has been welcomed with open arms by many users. The reasoning behind this is that when you are paying upwards of $1000 for a course, you do not want to see others bidding $5 for it on auction sites.

Using Lizard Safeguard or Lizard Protector, publishers of electronic training materials can protect their intellectual property published in the PDF or HTML formats. Courses can be made available for a specific length of time or number of uses, and the number of prints can be limited or prevented altogether. Publishers can now price their courses according to the functionality enabled or limitations imposed, offering more attractive options to customers. Better still, updates can be delivered instantly over the web without fear of them getting into the wrong hands.

“Looking forwards,” said Dr Mathews, “We can see that there will be a rapid and significant move towards complete electronic delivery of training, course materials, lectures and notes, without a physical instructor ever needing to be present. The pressures that the current recession is bringing on the need to increase manpower effectiveness and reduce overall costs are going to accelerate the use of computer based training and education systems, always provided that the content can be adequately secured so that only those who have actually paid for the courses are those who benefit from them.

All of our publishers have noticed a significant increase in their bottom line and many have been amazed at the new revenue streams that have opened up, whilst at the same time benefitting from reduced costs in terms of overheads and distribution. A win-win situation if ever I saw one.”

About LockLizard
LockLizard is a DRM vendor that produces document security, pdf security, elearning security, ebook security, copy protection, and web content encryption products that use DRM technology to protect information from intellectual property theft. Our DRM software prevents copying, printing, screen grabbing, and sharing of information without the use of insecure passwords. http://www.locklizard.com

Via EPR Network
More Internet & Online press releases

Welcome to EPR Internet News

EPR Internet News is a new blog, part of EPR Network, that is going to be focused on and will be covering the Internet news and stories from press releases published on EPR Network.

EPR Network (EPR stands for express press release) is one of the nation’s largest press release distribution networks on Web. The EPR’s nationwide network includes 12 State based PR sites, one major PR forum and a number of industry specific PR blogs and what started as a hobby on Internet years ago turned out to be a rapidly growing business today. EPR Network is also known as one of the most trusted (human optimized, published, edited and monitored, spam/scam/low quality PR content free) PR sites on the web with more than 10,000 company and individual press releases distributed per month. EPR Network is putting your press releases on top of all major search engines’ results and is reaching thousands of individuals, companies, PR specialists, media professionals, bloggers and journalists every day.

EPR Network has thousands of clients around the world including global 500 corporations like Hilton Hotels, Barclays Bank, AXA Insurance, Tesco UK, eBay/Skype, Emirates, just to name a few. The network’s PR web sites are currently reaching from 150,000 to sometimes 500,000 unique visitors per month while our viral reach could possibly go to as much as 1M people per month through our presence across various social media sites. EPR Network was established in 2004 and as of May 2008 it had more than 800,000 press releases (pages) published on its network.

If you have a press release to be distributed, you can do it over here: press release distribution