Monthly Archives: May 2011

Skimmers in Leiderdorp apprehended

Why am I a bit angry because of this news: Skimmers arrested in Leiderdorp? Skimming Skimming is nothing new. It’s been there for most of this century. What happened in my howe town recently, is that someone alerted the police … Continue reading

Posted in Cyber arrests, Cyber crime, Cyber warfare, News flash, Skimming | Tagged , , , | Leave a comment

At the start of NL IGF

At the annual Dutch “delegation” dinner at the Internet Governance Forum (IGF) in Vilnius, Lithuania, I voiced that it may be a good idea to start a Dutch IGF. This followed a discussion in which we discussed the possibilities of … Continue reading

Posted in Cyber crime, Cyber espionage, Cyber ethics, Cyber security, International cooperation: cross border aspects, Internet governance, Self regulation | Tagged , , , , , | Leave a comment

Cyber assault teams on the loose?

For those who did not see the beginning of the movie Die hard 4, it starts with a high tech assault team invading the home, better, room of what looks like a student running some computers. Bullets fly, normally everyone … Continue reading

Posted in Botnets, Cyber crime, Cyber espionage, Cyber security, Cyber warfare, spam | Tagged , , , , , | Leave a comment

The need to enforce spam. The need to train enforcers

Recently you can hear that spam (enforcement) is so 2004, that it’s all about malware and cyber war in 2011. Yes, both draw a lot of attention recently, but is it true that the world can ignore spam? You will … Continue reading

Posted in Botnets, Cyber crime, Cyber education, Cyber security, International cooperation: cross border aspects, Malware enforcement, Mobile, Privacy, spam, Spam enforcement | Tagged , , , , , , , , | Leave a comment

Cyber threats in the mobile environment and where it could be going

The ENISA botnet report presentation At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come … Continue reading

Posted in Botnets, Cyber crime, Cyber security, Mobile, Privacy, spam | Tagged , , , , , , | Leave a comment