-
Recent Posts
- HOW CAN GREATER SECURITY, SAFETY AND TRUST IN THE INTERNET BE CREATED?
- Testing, testing, testing for a more secure (internet) world
- Why are internet security standards badly deployed and what to do about it?
- Internet consolidation at EuroDIG 2019: Questions in need of an answer
- Chances and opportunities or the U.S., the E.U. and privacy regulation
Archives
- August 2020
- April 2020
- March 2020
- September 2019
- February 2018
- January 2018
- March 2017
- January 2017
- July 2016
- June 2016
- May 2016
- March 2016
- November 2014
- March 2014
- February 2014
- January 2014
- May 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
Categories
- Book review
- Botnets
- Court decision
- Cyber arrests
- Cyber awareness
- Cyber crime
- Cyber crime data or the absence of it
- Cyber crime reporting
- Cyber education
- Cyber espionage
- Cyber ethics
- Cyber security
- Cyber warfare
- Digital transition
- Direct marketing
- Hacking
- International cooperation: cross border aspects
- International cooperation: IP resources
- Internet consolidation;
- Internet governance
- Internet standards;
- Malware enforcement
- Mobile
- News flash
- Privacy
- Self regulation
- Skimming
- spam
- Spam enforcement
Meta
Monthly Archives: April 2011
iPhone and Android phone home
Over the past days there was some consternation over the fact that first iPhone and then Google’s Android actually locate the whereabouts of the cell phone’s owner and store this data. This lead to some discussion on and off-line.
Commissioner Kroes congratulates OPTA, but how can the EU step up anti-spam efforts?
In a tweet, EU commissioner for the Information Society Neelie Kroes congratulates OPTA on the spam fine for the golf ball printing company Backsound. Since 2004 the Dutch OPTA is the number one spam and malware fighter of the EU … Continue reading
Posted in Botnets, Cyber crime, Cyber education, Cyber security, International cooperation: cross border aspects, International cooperation: IP resources, Malware enforcement, spam, Spam enforcement
Tagged Cross border aspects, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, cyber espionage, cyber policy, Cyber security:, Malware;, public private cooperation cyber crime;, Spam, spam enforcement;, spam law;
Leave a comment
URL shortening sites connected to cyber crime
Symantec published a report linking URL shortening websites to cyber crime. People are invited to click on a link that takes them to a website advertising URL shortening, but they become vulnerable to phishing and malware attacks instead.
Tips on cyber protection from your own employees, part 2
Only two weeks ago I wrote on cyber protection from human curiosity (or naïveté), see link. Since then we had a security breach at authorisation token vendor RSA and the breach at mass-mailer Epsilon.
Posted in Cyber crime, Cyber education, Cyber espionage, Cyber ethics, Cyber security, Self regulation, spam
Tagged Cyber crime; botnets; enforcement, Cyber education, cyber espionage, Cyber ethics, cyber policy, Cyber security:, Phishing;, public private cooperation cyber crime;, Spam, Spam; privacy
Leave a comment
RIPE NCC Roundtable: four messages for governments
At RIPE NCC organised Roundtable of 4 April 2011 at the Sheraton Hotel at Schiphol, the RIPE community, governments, LEAs and RIPE NCC met for a program of presentations on RIPE policies that are of interest to governments and law … Continue reading
Posted in Cyber crime, Cyber education, International cooperation: cross border aspects, International cooperation: IP resources, Spam enforcement
Tagged Cross border aspects, Cyber crime; enforcement; international cooperation, cyber policy, fraud, public private cooperation cyber crime;, spam enforcement;
Leave a comment