-
Recent Posts
- HOW CAN GREATER SECURITY, SAFETY AND TRUST IN THE INTERNET BE CREATED?
- Testing, testing, testing for a more secure (internet) world
- Why are internet security standards badly deployed and what to do about it?
- Internet consolidation at EuroDIG 2019: Questions in need of an answer
- Chances and opportunities or the U.S., the E.U. and privacy regulation
Archives
- August 2020
- April 2020
- March 2020
- September 2019
- February 2018
- January 2018
- March 2017
- January 2017
- July 2016
- June 2016
- May 2016
- March 2016
- November 2014
- March 2014
- February 2014
- January 2014
- May 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
Categories
- Book review
- Botnets
- Court decision
- Cyber arrests
- Cyber awareness
- Cyber crime
- Cyber crime data or the absence of it
- Cyber crime reporting
- Cyber education
- Cyber espionage
- Cyber ethics
- Cyber security
- Cyber warfare
- Digital transition
- Direct marketing
- Hacking
- International cooperation: cross border aspects
- International cooperation: IP resources
- Internet consolidation;
- Internet governance
- Internet standards;
- Malware enforcement
- Mobile
- News flash
- Privacy
- Self regulation
- Skimming
- spam
- Spam enforcement
Meta
Monthly Archives: March 2011
Who makes spin-off money from cyber crime?
OPTA has a new task: Regulating mobile operators from disconnecting and/or charging their customers for unsolicited sms services/subscriptions. According to OPTA chair Chris Fonteijn most mobile operators have already made it known to comply to the new rules. Mobile phone … Continue reading
Posted in Botnets, Cyber crime, Cyber education, Cyber security, International cooperation: cross border aspects, International cooperation: IP resources, spam
Tagged Cross border aspects, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, Cyber education, cyber policy, Cyber security:, public private cooperation cyber crime;, Spam
Leave a comment
Neelie Kroes, the EU, cloud computing, regulation and Good Ears
In her blog EU Commissioner Neelie Kroes blogs on her stance on cloud computing. In short: this is a good development which the EU will embrace and advocate, but may need regulation in order to ensure a safe environment for … Continue reading
Posted in Cyber crime, International cooperation: cross border aspects, Self regulation, Spam enforcement
Tagged Cloud computing;, Cross border aspects, Cyber crime; enforcement; international cooperation, cyber policy, Cyber security:, public private cooperation cyber crime;, spam enforcement;
Leave a comment
Review: How to run the world. Parag Khanna
Khanna presents the world as if it is in a new Middle Ages with pockets of power or innovation in the world that are not necessarily in (close) contact or maybe not even aware of each other’s existence. Isolated knowledge … Continue reading
Tips on cyber protection from your employees
Just before the EU summit it became known that the EU Commission was under attack. This suggests a d-dos attack, but from this article in the Register it becomes clear that this is not a one off. So what seems … Continue reading
Direct marketers Germany step up self regulation
The German direct marketers association DDV has put in new self regulation that goes a few steps beyond what is standard in most countries: a double opt-in and the names of sponsors to an action have to be revealed. Let’s … Continue reading
Posted in Cyber crime, Direct marketing, Self regulation, spam, Spam enforcement
Tagged Direct marketing, Signal Spam, spam enforcement;, spam law;
Leave a comment