Tag Archives: Cyber security:

How the West was won or protecting data

The Internet world shook once again this week with the revelation of military, strategic information leaked by a sports app. By running around the compound soldiers gave away their position to the app, that dutifully offered this information to the … Continue reading

Posted in Cyber awareness, Cyber education, Cyber espionage, Cyber security, Cyber warfare, Privacy | Tagged , , , | Leave a comment

Dat geldt toch niet voor mij? Digitale veiligheid in het MKB

Op donderdag 30 oktober 2014 organiseerde MKB Cyber Advies Nederland in samenwerking met Rabobank een bijeenkomst in het kader van de campagne Alert Online onder de titel: ‘Digitale weerbaarheid. Randvoorwaarde voor ondernemend Nederland’. Dit blog is een bewerking van het … Continue reading

Posted in International cooperation: IP resources | Tagged , , , | Leave a comment

Windows XP termination. Who should lead the final transition?

Not long after the message that Microsoft will stop updating Windows XP from 8 April onwards, after extending it beyond the regular life cycle for over a year already, came the soothing message that malware will be monitored for another … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber ethics, Cyber security, Hacking, Internet governance | Tagged , , , , , | Leave a comment

Mobile threats and Android: What does this tell us?

If it is true that mobile malware targets Android nearly exclusively, what does this tell the world? Here’s the link to the article I found based on the new Kasperski report. This report claims that 99,9% of mobile malware targets … Continue reading

Posted in Botnets, Cyber crime, Cyber security, Self regulation | Tagged , , , , , | Leave a comment

Netherlands keeps spewing malware. A call for action!

On Webwereld an article was published (click here) following a new Kaspersky malware report (click here) Q1-2013. Nothing new was mentioned here. The Netherlands remains the number 3 as far as sending malware from Dutch servers is concerned. At the … Continue reading

Posted in Botnets, Cyber awareness, Cyber crime, Cyber security, International cooperation: cross border aspects, Internet governance, Malware enforcement, Self regulation, Spam enforcement | Tagged , , , , , , , , , , | Leave a comment

ICANN and the GAC: a new role is needed

Syracuse University professor Milton Mueller published a blog under the title “Will the GAC go away if the Board doesn’t follow its advice?” (click here). Having been to a, very limited, number of ICANN meetings on behalf of law enforcement … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber security, International cooperation: cross border aspects, International cooperation: IP resources, Internet governance | Tagged , , , , , , , | Leave a comment

Breaking down silos, or cooperation in all things cyber

“We need to break down silos”, is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but … Continue reading

Posted in Botnets, Cyber crime, Cyber security, Hacking, International cooperation: cross border aspects, Internet governance, Privacy, spam | Tagged , , , , , , , , , , , | Leave a comment