Monthly Archives: February 2012

US – NL cyber crime treaty signed

On Wednesday 22 February the United States and The Netherlands signed a “declaration of intent” on the cooperation on fighting cyber crime. Reading the news reports three things struck me. Advertisements

Posted in Cyber crime, Cyber crime reporting, Cyber security, Cyber warfare, International cooperation: cross border aspects | Tagged , , , , , , | 1 Comment

What do you think of Romanian cyber threats?

Friday, 17 February 2012 I had the honour to present at the 6th ICT CIP call information day organised by the European Commission, DG Information Society. After the session a gentleman from Romania approached me, because of my presentation. After … Continue reading

Posted in Cyber arrests, Cyber crime, International cooperation: cross border aspects, Skimming | Tagged , , , , | Leave a comment

Closing the gaps: a quest for a secure Internet

Over the last year the world has been virtually buried under news items describing hacks, insecure websites, servers and scada systems, etc. Each and every time people seem to be amazed and exclaim “How is this possible?” Politicians ask questions, … Continue reading

Posted in Cyber crime, Cyber espionage, Cyber security, Cyber warfare, Internet governance, Privacy, Self regulation, spam | Tagged , , , , , , , , , , , , , , | 3 Comments

Hacking and security: lessons to learn and save money too

Companies being hacked is hardly any news any more. It happens every day and most do not even make the newspapers. This is different when it happens to a digital security company like RSA or Internet certificate company Diginotar, the … Continue reading

Posted in Cyber crime, Cyber espionage, Cyber security, Cyber warfare, Hacking, Privacy, Skimming | Tagged , , , , , | Leave a comment

The power of money: Fighting cross border crimes

Two news items draw my attention in the past few days. One was a message from the United Nations that the terrorist (or freedom fighters depending on your point of view of course) organisation Boko Haram could be funded by … Continue reading

Posted in Cyber crime, Cyber crime data or the absence of it, Cyber crime reporting, Cyber security, International cooperation: cross border aspects, Privacy | Tagged , , , , , , , , , , , | Leave a comment