Topic: cybercrime

Tweets on this topic


asteris (Asteris Masouras)

RT @mayurporwal: Find solutions which improve security without comprising privacy - Bill Smith, PayPal #cybercrime #cybersecurity #igf11

2 years 28 weeks ago

mayurporwal (Mayur Porwal)

Privacy can not exist without security. #igf11 #cybercrime #cybersecurity

2 years 28 weeks ago

mayurporwal (Mayur Porwal)

Find solutions which improve security without comprising privacy - Bill Smith, PayPal #cybercrime #cybersecurity #igf11

2 years 28 weeks ago

egreenng (MindtheGap Programme)

@nnenna @gbengasesan #igf11 what is the uodate on our #Cybercrime bill signing

2 years 28 weeks ago

Associated blog posts

Blog post included here have used #cybercrime in their title

In 2012 I wrote a blog on CircleID called State hacking: Do's and don'ts, pros and cons. In this post I give some thoughts to the concept of a government "hacking back" at criminals. The reason for this was an announcement by the Dutch government that it contemplated law along these lines. The...

49 weeks 18 hours ago View original post.

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so...

51 weeks 18 hours ago View original post.

China and the United States will set up a working group on cybersecurity, U.S. Secretary of State John Kerry said on Saturday, as the two sides moved to ease months of tensions and mutual accusations of hacking and Internet theft. Speaking to reporters in Beijing during a visit to China, Kerry said the United States and China had agreed on the need to speed up action on cyber security, an...

1 year 1 day ago View original post.

"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause..."

—Fourth Amendment to the United States Constitution

There are two Bills that are floating through the corridors of power on the Hill that could...

1 year 11 weeks ago View original post.

Yesterday, in my post on three new threats in one day (click here), I posed the question whether it was necessary to develop regulations that would set a minimum standard on cyber security for devices that connect to the Internet. I'm having second thoughts here, which I'll explain below, but...

1 year 17 weeks ago View original post.

Another contentious issue at the World Conference on International Telecommunications (WCIT) in Dubai is 'security'. There has been a dramatic increase in nervousness regarding a whole range of security issues, especially in relation to the internet. They include: SPAM, denial-of-service-attacks, identity theft, cybercrime, cyberwarfare, and privacy issues on social media.

From...

1 year 18 weeks ago View original post.

At the Internet Governance Forum in Baku, I made an intervention on behalf of NL IGF, reporting on the recommendations given by the participants of Workshop 87. Participants...

1 year 20 weeks ago View original post.

One of the most important debates in the realm of Internet governance pertains to when, how and how much voluntary action registrars can and should take to prevent the use of their registration platforms in furtherance of criminal activity.

In the Internet pharmacy world, the trend over the past four years has been unmistakable: A growing number of registrars worldwide, large and...

1 year 22 weeks ago View original post.

Over the past days a lot has been said and written on counter hacking by enforcement agencies. The cause is a letter Dutch Minister I. Opstelten, Security & Justice, sent to parliament. Pros and cons were debated and exchanged. Despite the fact that I...

1 year 25 weeks ago View original post.

ICANN is clearly changing with the new CEO making immediate changes to the organizational structure and Compliance announcing a number more effective tools and procedures at Sunday's At-Large...

1 year 26 weeks ago View original post.

New gTLD Program & Security

The new gTLD program will have a profound impact on the private sector's increasing dominance over Internet information resources and ownership of critical registry technical infrastructure assets. It is already anticipated that only the private sector will take full advantage of the commercial possibilities offered by the...

1 year 26 weeks ago View original post.

In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should...

1 year 27 weeks ago View original post.

The Microsoft action against 3322.org, a Chinese company, started with the news that computers were infected during the production phase. Stepping away from the controversy surrounding the approach (read e.g. Suresh's in-depth article here), there are important lessons that cyber...

1 year 29 weeks ago View original post.

Today I released a report on 'National cyber crime and online threats reporting centres. A study into national and international cooperation'. Mitigating online threats and the subsequent enforcing of violations of laws often involves many different organisations and countries. Many countries are presently engaged in erecting national centres aimed at...

1 year 30 weeks ago View original post.

I will first begin this post by emphasizing that this article is entirely my personal viewpoint and not to be considered as endorsed by or a viewpoint of my employer or any other organization that I am affiliated with. Neither is this to be considered an indictment of the sterling work (which I personally value very highly) that several people in Microsoft are doing against cybercrime....

1 year 30 weeks ago View original post.

Australians may lose their right to privacy online if the attorney-general has her way.

Nicola Roxon's discussion paper is before a parliamentary inquiry. Proposals include storing the social media and other online and telecommunications data...

1 year 32 weeks ago View original post.

While Congress and the White House deliberate possible actions on FISMA reform and increased oversight of critical infrastructure, relatively little attention is being given to the government-wide cybersecurity regulation already in place, the Data Quality Act (DQA).

Unlike FISMA, which primarily governs the government's...

1 year 34 weeks ago View original post.

Cybersecurity is a top-of-mind issue with calls for individual vigilance, national legislation, and international treaties to address gaps that are exploited causing significant harm and financial loss on a daily basis. The vast majority of these calls are well-intentioned though even among the best-intentioned, some are poorly directed.

Such is the case with all of the proposals...

1 year 34 weeks ago View original post.

Forbes just published this article that's being shared all over my facebook friends feed.

I left a comment on the article that I've copied and pasted here, as it is just about long enough to qualify as a CircleID post by itself.

...
1 year 35 weeks ago View original post.

I'm sitting in the Popov Room of the ITU Tower in Geneva, the room is quiet, the atmosphere placid, chairs are empty. The final meeting of the CWG WCIT prep WG has just concluded its work and the chair will be reporting to the Council the results of our work. I find myself strangely calm and looking forward to my next week, to be spent in Prague.

The bulk of the work of this WG...

1 year 41 weeks ago View original post.

We have posted our support of the WHOIS Policy Review Team Report with two important comments. First, on page 79 of the report it is confirmed...

1 year 43 weeks ago View original post.

Crime, fraud, scams etc., they're all very bad things. They're also not going to go away anytime soon.

As a domain name registrar and hosting provider we're constantly "at risk", as we sell a lot of services that are both cost-effective and also give criminals the tools they need to attack 3rd parties.

Again, this isn't exactly news.

We've always taken a very...

1 year 46 weeks ago View original post.

Eugene Kaspersky has warned global leaders that the world needs international agreements about cyber-weapons in the same way as it needs agreements about nuclear or biological weaponry. The chairman and chief executive officer of Kaspersky Lab, warned delegates at CeBIT Australia that cyber-warfare and terrorism was the number one internet threat facing the world today. He said the...

1 year 46 weeks ago View original post.

Microsoft took down a Zeus botnet recently. Within days it was publicly accosted by Fox-IT's director Ronald Prins for obstructing ongoing investigations and having used Fox-IT's data. This was followed by the...

1 year 49 weeks ago View original post.

The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that...

1 year 51 weeks ago View original post.

Don't worry about the bad guys turning out the lights. Worry about everything they're stealing while the lights are still on.

The theft of intellectual property ranging from Hollywood films to defense secrets is underway by cyber-criminals of various stripes. Maintaining control over intellectual property may be the single most important challenge to American economic security...

2 years 3 weeks ago View original post.

In Ian Flemming's Thunderball M sends 007 to the Bahamas on a hunch that SPECTRE is hiding something there. Well, it's been our hunch for a while that the Bahamas "office" for the Registrar Internet.BS does not exist. Now we have confirmation of such. It has been...

2 years 4 weeks ago View original post.

This may or may not come as a shock to some of you, but ICANN's contract with the Domain Name Registrars, in terms of WHOIS inaccuracy is not enforceable. Bear with me. The ability of ICANN to enforce against a Registrar who fails to correct or delete a domain with false WHOIS does not exist.

There are two clauses to...

2 years 5 weeks ago View original post.

Brian Krebs reporting in Krebs on Security: "Half of all 'rogue' online pharmacies — sites that sell prescription drugs without requiring a prescription — got their Web site names from just two domain name registrars, a study released today found. The findings illustrate the...

2 years 5 weeks ago View original post.

Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. Whereas we in the security field usually talk about spam, malware and cyber crime, he talked about three meta-trends that all have the potential to be more dangerous than the cybercriminals (he talks a bit about it...

2 years 6 weeks ago View original post.

On Wednesday 22 February the United States and The Netherlands signed a "declaration of intent" on the cooperation on fighting cybercrime. This event was reported by the press as a treaty. At least that is what all Dutch postings I read wrote, with exception of the official website of the Dutch government. So what was actually signed? Reading the news reports some thoughts struck me....

2 years 7 weeks ago View original post.

As the WHOIS debate rages and the Top-Level Domain (TLD) space prepares to scale up the problem of rogue domain registration persists. These are set to be topics of discussion in Costa Rica. While the ICANN...

2 years 8 weeks ago View original post.

Over the last year the world has been virtually buried under news items describing hacks, insecure websites, servers and scada systems, etc. Each and every time people seem to be amazed and exclaim "How is this possible?" Politicians ask questions, there is a short lived uproar and soon after the world continues its business as usual. Till the next incident.

In this blog post I...

2 years 8 weeks ago View original post.

Wout de Natris writes: At a speech during the Security and Defense Agenda meeting on 30 January Vice-President of the European Commission, Neelie Kroes, showed how the Commission envisions public-private cooperation on cyber security.

Remarks by Kroes:

"The Internet does not belong to any one group, but attacks on it...

2 years 10 weeks ago View original post.

Recently ICANN (Internet Corporation for Assigned Names and Numbers) published a report on inaccurate registration data in her own databases. Now the question is presented to the world how can we mitigate this problem? There seems to be a very easy solution.

Why register...

2 years 10 weeks ago View original post.

Realizing the Dream of a Knowledge Economy

2011 has been a significant year for the technology sector globally. Information technology is touching more people in more ways than ever before.

Developed markets will be considering a 2012 in which business innovation, competitiveness, and service differentiation are built on ubiquitous broadband,...

2 years 16 weeks ago View original post.

Here is the provisional list of the main Internet governance developments in 2011 and we need your help to compile a final list. Please let us know your views by:

Making comments and adding any other development you think should be on this list.

Joining us for the...

2 years 17 weeks ago View original post.

The United States White House Office of Science and Technology Policy (OSTP) has released a new report titled, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, specifying an agenda for "...

2 years 18 weeks ago View original post.

In a seemingly never-ending row of news on hacks of websites now this one in which 2.3 million individual cases of privacy sensitive data were accessible through a leak in the websites of most public broadcasting stations in the Netherlands. To make the news more cheerful, the accessible...

2 years 20 weeks ago View original post.

Associated Link

What links have been shared using this tag? Note: These links have been automatically gathered. We have not checked the destination of these links.