-
Recent Posts
- HOW CAN GREATER SECURITY, SAFETY AND TRUST IN THE INTERNET BE CREATED?
- Testing, testing, testing for a more secure (internet) world
- Why are internet security standards badly deployed and what to do about it?
- Internet consolidation at EuroDIG 2019: Questions in need of an answer
- Chances and opportunities or the U.S., the E.U. and privacy regulation
Archives
- August 2020
- April 2020
- March 2020
- September 2019
- February 2018
- January 2018
- March 2017
- January 2017
- July 2016
- June 2016
- May 2016
- March 2016
- November 2014
- March 2014
- February 2014
- January 2014
- May 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
Categories
- Book review
- Botnets
- Court decision
- Cyber arrests
- Cyber awareness
- Cyber crime
- Cyber crime data or the absence of it
- Cyber crime reporting
- Cyber education
- Cyber espionage
- Cyber ethics
- Cyber security
- Cyber warfare
- Digital transition
- Direct marketing
- Hacking
- International cooperation: cross border aspects
- International cooperation: IP resources
- Internet consolidation;
- Internet governance
- Internet standards;
- Malware enforcement
- Mobile
- News flash
- Privacy
- Self regulation
- Skimming
- spam
- Spam enforcement
Meta
Category Archives: Botnets
Windows XP termination. Who should lead the final transition?
Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another … Continue reading
Mobile threats and Android: What does this tell us?
If it is true that mobile malware targets Android nearly exclusively, what does this tell the world? Here’s the link to the article I found based on the new Kasperski report. This report claims that 99,9% of mobile malware targets … Continue reading
Netherlands keeps spewing malware. A call for action!
On Webwereld an article was published (click here) following a new Kaspersky malware report (click here) Q1-2013. Nothing new was mentioned here. The Netherlands remains the number 3 as far as sending malware from Dutch servers is concerned. At the … Continue reading
Posted in Botnets, Cyber awareness, Cyber crime, Cyber security, International cooperation: cross border aspects, Internet governance, Malware enforcement, Self regulation, Spam enforcement
Tagged Botnets;, Cyber awareness;, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, Cyber security:, Internet governance;, Malware;, OPTA, Phishing;, public private cooperation cyber crime;, spam enforcement;
Leave a comment
Breaking down silos, or cooperation in all things cyber
“We need to break down silos”, is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but … Continue reading
Posted in Botnets, Cyber crime, Cyber security, Hacking, International cooperation: cross border aspects, Internet governance, Privacy, spam
Tagged Botnets;, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, cyber politics, Cyber Security Strategy:, Cyber security:, Cyber war;, Hacking;, Internet governance;, Malware;, public private cooperation cyber crime;, Spam
Leave a comment
How will banks ensure the safety of our money? Ddos attacks on NL banks
This week bank costumers of The Netherlands were shocked when they realised that online banking may not be as safe as they thought. Perhaps some were surprised to hear that what they think is money, is nothing but digits, something … Continue reading
Posted in Botnets, Cyber awareness, Cyber crime, Cyber education, Cyber espionage, Cyber security, Cyber warfare, Hacking, International cooperation: cross border aspects, International cooperation: IP resources, Internet governance, Self regulation, spam
Tagged Botnets;, Cross border aspects, Cyber awareness;, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, Cyber law;, cyber policy, Cyber Security Strategy:, Internet governance;, IP resources;, Malware;, public private cooperation cyber crime;, Spam
2 Comments