Category Archives: Mobile

Anti-virus scanners out-dated?

An article this morning stated that anti-virus scanners are passé. I remember that Marnix Dekker of ENISA stated this in a meeting in The Netherlands circa one year ago. To my surprise this provocative claim did not send much more … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Internet governance, Mobile, spam | Tagged , , , , , , , , | Leave a comment

Cyber security, BYOD and production in China

On one of my very first trips abroad as international liaison at OPTA I came back on the high-speed train from Paris after contributing for three days at the OECD on the anti-spam tool kit. Next to me was a … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber education, Cyber espionage, Cyber security, Mobile, Privacy | Tagged , , , , , , , , | Leave a comment

What would Google do?

Now that the first major botnet that runs on Android has been found by the Anti-virus vendor community, I wonder what would Google do? In October of 2011 the London Action Plan in cooperation with the Messaging Anti Abuse Working … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber crime reporting, Cyber education, Cyber ethics, Cyber security, International cooperation: cross border aspects, Internet governance, Malware enforcement, Mobile, Self regulation | Tagged , , , , , , , , , , , | 2 Comments

Cyber security and old(er) men

Recently at a meeting on cyber security I looked around and took a close look at who were sitting around me. Mostly middle aged men and older (including myself), hardly any ladies nor youth. Discussing this afterwards with perhaps the … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber education, Cyber security, Cyber warfare, International cooperation: cross border aspects, Internet governance, Mobile | Tagged , , , , , , , , , , , | Leave a comment

A question on Deep Packet Inspection

So KPN admitted it applies Deep Packet Inspection (DPI), a technique which makes it possible to look into the digital packets that as a whole make up an e-mail or data sent on the Internet. Old telephony vs. the new … Continue reading

Posted in Cyber crime, Cyber ethics, Cyber security, Internet governance, Mobile, Privacy, spam | Tagged , , , , , , | Leave a comment

The need to enforce spam. The need to train enforcers

Recently you can hear that spam (enforcement) is so 2004, that it’s all about malware and cyber war in 2011. Yes, both draw a lot of attention recently, but is it true that the world can ignore spam? You will … Continue reading

Posted in Botnets, Cyber crime, Cyber education, Cyber security, International cooperation: cross border aspects, Malware enforcement, Mobile, Privacy, spam, Spam enforcement | Tagged , , , , , , , , | Leave a comment

Cyber threats in the mobile environment and where it could be going

The ENISA botnet report presentation At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come … Continue reading

Posted in Botnets, Cyber crime, Cyber security, Mobile, Privacy, spam | Tagged , , , , , , | Leave a comment