-
Recent Posts
- HOW CAN GREATER SECURITY, SAFETY AND TRUST IN THE INTERNET BE CREATED?
- Testing, testing, testing for a more secure (internet) world
- Why are internet security standards badly deployed and what to do about it?
- Internet consolidation at EuroDIG 2019: Questions in need of an answer
- Chances and opportunities or the U.S., the E.U. and privacy regulation
Archives
- August 2020
- April 2020
- March 2020
- September 2019
- February 2018
- January 2018
- March 2017
- January 2017
- July 2016
- June 2016
- May 2016
- March 2016
- November 2014
- March 2014
- February 2014
- January 2014
- May 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
Categories
- Book review
- Botnets
- Court decision
- Cyber arrests
- Cyber awareness
- Cyber crime
- Cyber crime data or the absence of it
- Cyber crime reporting
- Cyber education
- Cyber espionage
- Cyber ethics
- Cyber security
- Cyber warfare
- Digital transition
- Direct marketing
- Hacking
- International cooperation: cross border aspects
- International cooperation: IP resources
- Internet consolidation;
- Internet governance
- Internet standards;
- Malware enforcement
- Mobile
- News flash
- Privacy
- Self regulation
- Skimming
- spam
- Spam enforcement
Meta
Monthly Archives: May 2011
Skimmers in Leiderdorp apprehended
Why am I a bit angry because of this news: Skimmers arrested in Leiderdorp? Skimming Skimming is nothing new. It’s been there for most of this century. What happened in my howe town recently, is that someone alerted the police … Continue reading
Posted in Cyber arrests, Cyber crime, Cyber warfare, News flash, Skimming
Tagged Cyber arrests;, Cyber crime, Cyber security:, Skimming;
Leave a comment
At the start of NL IGF
At the annual Dutch “delegation” dinner at the Internet Governance Forum (IGF) in Vilnius, Lithuania, I voiced that it may be a good idea to start a Dutch IGF. This followed a discussion in which we discussed the possibilities of … Continue reading
Posted in Cyber crime, Cyber espionage, Cyber ethics, Cyber security, International cooperation: cross border aspects, Internet governance, Self regulation
Tagged Cyber crime; enforcement; international cooperation, Cyber ethics, cyber policy, cyber politics, Internet governance;, public private cooperation cyber crime;
Leave a comment
Cyber assault teams on the loose?
For those who did not see the beginning of the movie Die hard 4, it starts with a high tech assault team invading the home, better, room of what looks like a student running some computers. Bullets fly, normally everyone … Continue reading
Posted in Botnets, Cyber crime, Cyber espionage, Cyber security, Cyber warfare, spam
Tagged Cyber crime, cyber espionage, cyber policy, Cyber security:, Cyber war;, Malware;
Leave a comment
The need to enforce spam. The need to train enforcers
Recently you can hear that spam (enforcement) is so 2004, that it’s all about malware and cyber war in 2011. Yes, both draw a lot of attention recently, but is it true that the world can ignore spam? You will … Continue reading
Posted in Botnets, Cyber crime, Cyber education, Cyber security, International cooperation: cross border aspects, Malware enforcement, Mobile, Privacy, spam, Spam enforcement
Tagged anti spam traing;, Cross border aspects, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, Cyber education, Malware;, spam enforcement;, spam law;, Spam; privacy
Leave a comment
Cyber threats in the mobile environment and where it could be going
The ENISA botnet report presentation At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come … Continue reading