

Understanding different License conditions as per Creative Commons:
Attribution
Means you can copy, distribute and display the images(or any other piece of work). Also you can create derivative of the image. You can alter and modify the image at your will.. All you need to do is provide proper credit to original owner (Like linking back to the profile of uploader or direct flickr image page).
Noncommercial
Means you can copy, display and distribute the work but only for non commercial purpose.
No Derivative Works
Means you can copy, display and distribute the work as it is. You can not modify the work in any form.
Share Alike
Means you can use the image or work and distribute or display it under the same license to this one.
Flickr and CC License:
Images on flickr are either strictly copyrighted or fall under six CC license. Images marked as copyrighted (All Rights Reserved) are not meant to be copied or used in any any form. You cannot display or use these images until and unless you have prior permission from original author. Rest, other images are uploaded under following sic license.
Attribution License
Images uploaded under this license are best to use for your blog or site. You can modify these images and use it in any form you like. All you need to do is provide a proper credit and linkback to original owner.
Click here to search Images under Attribution License
Attribution-NoDerivs License
You can use these images as long as you credit the photographer and do not modimy the image. Images under this license are also a fair good deal for your blog or site.
Click here to search Images under Attribution-NoDerivs License
Attribution-NonCommercial License
You are free to modify and use these images by providing proper credit to photographer (or uploader). These images cannot be used for any commercial purpose. So if your blog or site is monetized by any paid advertising like Google Adsense, better not to use these type of images.
Also while using these type of images, its necessary to look into future possibilities of monetizing your blog/site. Your site/blog may not be displaying any paid advertisements right now, but in future you may change your mind and start monetizing the ad spaces. So better avoid these type of images on your webpage.
Click here to search Images under Attribution-NonCommercial License
Attribution-NonCommercial-NoDerivs License
Same as above one. But you are restricted to modify the images in any form and use them as it is.
Click here to search Images under Attribution-NonCommercial-NoDerivs License
Attribution-ShareAlike License
You are free to use and modify the images until you credit the photographer release the work under same license.
Click here to search Images under Attribution-ShareAlike License
Attribution-NonCommercial-ShareAlike License
However, she recently discovered that a photo printing site had not only posted several of her works under a false name (Yahoo! Cache Version), but was selling prints of those photos in their store. A search through their Ebay store turned up approximately £2,500 (about $5,000) in sold prints, all with her work.
Seeking repayment, Guðleifsdóttir turned to a local attorney who sent the company a stern letter. The company removed the works from their site and then fell quiet. No future correspondence was returned and Guðleifsdóttir, a single mother and a college student, was left footing the bill for the lawyer.
Understandably upset at this outcome, Guðleifsdóttir vented her frustration in her Flickr account.
The story struck a chord with the Flickr community. It quickly reached the front page of Digg (earning over 4000 Diggs) and the entry generated well over 400 comments.
However, the original entry was to be short lived. Only hours after it hit the front page of Digg, Yahoo!, who owns Flickr, removed the post. According to Guðleifsdóttir, Yahoo! cited alleged terms of service violations.
That, in turn, has kicked off another storm of controversy with many criticizing Yahoo!’s move as censorship.
But in addition to being an interesting case of plagiarism gone awry, the story also serves to illustrate many of the challenges that arise when trying to protect your works on the Web.
for full article click hereA screenshot of one of the Malaysian sites attacked by a ring of Indonesian hackers.
Hotmail, Google and Yahoo! have joined a growing number of email service providers whose users have been duped by hackers into giving over their passwords in phishing attacks.
The British network said it has seen a list of some 20,000 hijacked e-mail accounts that included accounts from Gmail, Yahoo! Mail, AOL, Comcast and EarthLink. The latter two are major US Internet service providers.
The intrusions, which fool users into giving their details to a dummy website, come amid a sharp rise in the number of phishing attacks. According to the Anti-Phishing Working Group some 50,000 mass attacks took place in June 2009, almost double the number recorded in January.
Cyber criminals obtained the passwords by setting up fake websites identical to the main amail services and tricking users into giving their username and password information on the site.
It is widely feared that the stolen information will be used by to access email accounts and steal personal information.
What is Phishing?
Phishing is a criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
How can internet users avoid falling prey to Phishing scams?
a) A user should not have the same username and password for multiple accounts as once a cyber thief has access to one account, it will be easy for him to access the other accounts.
b) Avoid clicking on weird requests to click on URLs or download software links
c) Get an antivirus software installed for your PC and keep your operating system up-to-date
d) Be on the guard and look out for URLs that divert you to other websites
e) Never follow links in an email claiming to be from your bank. Ignore these types of emails.
f) Adjust you browser settings to tighten up security especially if you use web based email. (Inputs from Agencies)
source: http://in.news.yahoo.com/242/20091008/1360/ttc-phishing-attacks-no-one-is-safe.html