-
Recent Posts
- HOW CAN GREATER SECURITY, SAFETY AND TRUST IN THE INTERNET BE CREATED?
- Testing, testing, testing for a more secure (internet) world
- Why are internet security standards badly deployed and what to do about it?
- Internet consolidation at EuroDIG 2019: Questions in need of an answer
- Chances and opportunities or the U.S., the E.U. and privacy regulation
Archives
- August 2020
- April 2020
- March 2020
- September 2019
- February 2018
- January 2018
- March 2017
- January 2017
- July 2016
- June 2016
- May 2016
- March 2016
- November 2014
- March 2014
- February 2014
- January 2014
- May 2013
- April 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
Categories
- Book review
- Botnets
- Court decision
- Cyber arrests
- Cyber awareness
- Cyber crime
- Cyber crime data or the absence of it
- Cyber crime reporting
- Cyber education
- Cyber espionage
- Cyber ethics
- Cyber security
- Cyber warfare
- Digital transition
- Direct marketing
- Hacking
- International cooperation: cross border aspects
- International cooperation: IP resources
- Internet consolidation;
- Internet governance
- Internet standards;
- Malware enforcement
- Mobile
- News flash
- Privacy
- Self regulation
- Skimming
- spam
- Spam enforcement
Meta
Category Archives: Cyber crime
Testing, testing, testing for a more secure (internet) world
If there’s one analogy between the Covid-19 crisis and cyber security, it is the lack of testing in many places across the globe. In both cases to truly know how safe and secure we are, testing needs to be stepped … Continue reading
Data retention is not working, or …?
Webwereld posted an article today on data retention stating that is does not work. (Click here for the article and here for the evaluation of data retention for the Dutch Second Chamber.) In the article it is written that data … Continue reading
Windows XP termination. Who should lead the final transition?
Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another … Continue reading
Mobile threats and Android: What does this tell us?
If it is true that mobile malware targets Android nearly exclusively, what does this tell the world? Here’s the link to the article I found based on the new Kasperski report. This report claims that 99,9% of mobile malware targets … Continue reading
Netherlands keeps spewing malware. A call for action!
On Webwereld an article was published (click here) following a new Kaspersky malware report (click here) Q1-2013. Nothing new was mentioned here. The Netherlands remains the number 3 as far as sending malware from Dutch servers is concerned. At the … Continue reading
Posted in Botnets, Cyber awareness, Cyber crime, Cyber security, International cooperation: cross border aspects, Internet governance, Malware enforcement, Self regulation, Spam enforcement
Tagged Botnets;, Cyber awareness;, Cyber crime; botnets; enforcement, Cyber crime; enforcement; international cooperation, Cyber security:, Internet governance;, Malware;, OPTA, Phishing;, public private cooperation cyber crime;, spam enforcement;
Leave a comment