Tag Archives: Spam; privacy

IP ADDRESSES AND PRIVACY-SENSITIVE DATA: A DIFFERENT POINT OF VIEW

This blog post is an article that was published in Virus Bulletin, August 2012 © Virus Bulletin/Wout de Natris For as long as I have been involved in spam enforcement and the sharing of data between entities, public and private, … Continue reading

Posted in Botnets, Cyber crime, Cyber crime reporting, Cyber security, Hacking, Privacy, spam | Tagged , , , , , , , , | Leave a comment

Cyber security and old(er) men

Recently at a meeting on cyber security I looked around and took a close look at who were sitting around me. Mostly middle aged men and older (including myself), hardly any ladies nor youth. Discussing this afterwards with perhaps the … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber education, Cyber security, Cyber warfare, International cooperation: cross border aspects, Internet governance, Mobile | Tagged , , , , , , , , , , , | Leave a comment

Another day, another hack

It’s sad but true, the 1967 Cuby + Blizzards hit has to be paraphrased in 2012. It’s all very impersonal a hack. It’s something that happens to someone else, till it happens to you or someone close to you. The … Continue reading

Posted in Cyber awareness, Cyber crime, Cyber security, Hacking, spam, Spam enforcement | Tagged , , , , , , , , , , | Leave a comment

The power of money: Fighting cross border crimes

Two news items draw my attention in the past few days. One was a message from the United Nations that the terrorist (or freedom fighters depending on your point of view of course) organisation Boko Haram could be funded by … Continue reading

Posted in Cyber crime, Cyber crime data or the absence of it, Cyber crime reporting, Cyber security, International cooperation: cross border aspects, Privacy | Tagged , , , , , , , , , , , | Leave a comment

Harmonizing privacy legislation, but what about enforcement?

In a presentation EU Commissioner Viviane Reding gave a preview of the new Privacy regulation her DG is preparing. As she states, privacy rules need to be brought up to date and harmonized. With all 27 member states having the … Continue reading

Posted in Botnets, Cyber crime, Cyber crime data or the absence of it, Cyber crime reporting, Cyber security, Direct marketing, International cooperation: cross border aspects, Malware enforcement, Privacy, Spam enforcement | Tagged , , , , , , , , , , , , , , , | Leave a comment

A question on Deep Packet Inspection

So KPN admitted it applies Deep Packet Inspection (DPI), a technique which makes it possible to look into the digital packets that as a whole make up an e-mail or data sent on the Internet. Old telephony vs. the new … Continue reading

Posted in Cyber crime, Cyber ethics, Cyber security, Internet governance, Mobile, Privacy, spam | Tagged , , , , , , | Leave a comment

The need to enforce spam. The need to train enforcers

Recently you can hear that spam (enforcement) is so 2004, that it’s all about malware and cyber war in 2011. Yes, both draw a lot of attention recently, but is it true that the world can ignore spam? You will … Continue reading

Posted in Botnets, Cyber crime, Cyber education, Cyber security, International cooperation: cross border aspects, Malware enforcement, Mobile, Privacy, spam, Spam enforcement | Tagged , , , , , , , , | Leave a comment