Category Archives: Mobile

Anti-virus scanners out-dated?

An article this morning stated that anti-virus scanners are passé. I remember that Marnix Dekker of ENISA stated this in a meeting in The Netherlands circa one year ago. To my surprise this provocative claim did not send much more … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Internet governance, Mobile, spam | Tagged , , , , , , , , | Leave a comment

Cyber security, BYOD and production in China

On one of my very first trips abroad as international liaison at OPTA I came back on the high-speed train from Paris after contributing for three days at the OECD on the anti-spam tool kit. Next to me was a … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber education, Cyber espionage, Cyber security, Mobile, Privacy | Tagged , , , , , , , , | Leave a comment

What would Google do?

Now that the first major botnet that runs on Android has been found by the Anti-virus vendor community, I wonder what would Google do? In October of 2011 the London Action Plan in cooperation with the Messaging Anti Abuse Working … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber crime reporting, Cyber education, Cyber ethics, Cyber security, International cooperation: cross border aspects, Internet governance, Malware enforcement, Mobile, Self regulation | Tagged , , , , , , , , , , , | 2 Comments

Cyber security and old(er) men

Recently at a meeting on cyber security I looked around and took a close look at who were sitting around me. Mostly middle aged men and older (including myself), hardly any ladies nor youth. Discussing this afterwards with perhaps the … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber education, Cyber security, Cyber warfare, International cooperation: cross border aspects, Internet governance, Mobile | Tagged , , , , , , , , , , , | Leave a comment

A question on Deep Packet Inspection

So KPN admitted it applies Deep Packet Inspection (DPI), a technique which makes it possible to look into the digital packets that as a whole make up an e-mail or data sent on the Internet. Old telephony vs. the new … Continue reading

Posted in Cyber crime, Cyber ethics, Cyber security, Internet governance, Mobile, Privacy, spam | Tagged , , , , , , | Leave a comment