Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
From tomorrow on, UNDOC invited for an Open Ended Expert Group on Cybercrime in Vienna. I am really interested in seeing how these discussions will go. If – by any chance – you are there as well, please ping me and we will have a chat. Otherwise, I will see what I can blog about. But at ...
Posted 16 January 2011 by Roger Halbheer
0
comments
Cybercrime as a Service – Our Future?
It is not really surprising that criminals will leverage the economy of Cloud Computing for their illegal purposes. Especially activities that consume a lot of processor power will be moved to the Cloud – like any other business. Some way back, there were discussions on how to leverage GPUs t ...
Posted 12 January 2011 by Roger Halbheer
0
comments
Turkey signed Cybercrime Convention
We are huge supporter of the Convention on Cybercrime by the Council of Europe. The reason for this is that we are convinced that there is a need of a certain level of harmonization across the Globe regarding cybercrime laws. Today I learned that Turkey signed the convention yesterday. This is a gr ...
Posted 11 November 2010 by Roger Halbheer
0
comments
Russia to revise Cybercrime Legislation?
You know that I am propagating the adoption of cybercrime legislation, which is aligned across the Globe. Something, which is absolutely necessary if we want to fight Cybercrime. Basically we are asking governments to consider the Cybercrime Convention (also known as Budapest Convention) by the Coun ...
Posted 05 November 2010 by Roger Halbheer
0
comments
I recently came across a paper called Shadows in the Cloud, which is actually a follow-up report of Tracking GhostNet: Investigating a Cyber Espionage Network, an investigation of the attacks on the office of the Dalai Lama and some governmental bodies. The report is written by two bodies who had th ...
Posted 21 April 2010 by Roger Halbheer
0
comments
As you saw from previous posts, I am at the Octopus Conference on Cooperation against Cybercrime at the moment. We had yesterday the Deputy Secretary General of the Council of Europe and one of her key statements was that different bodies (like the Council of Europe, UN etc.) should not compete. The ...
Posted 24 March 2010 by Roger Halbheer
0
comments
A few years ago, the Budapest Convention on Cybercrime was signed within the Council of Europe. Since then it was ratified all across the globe by a lot of countries or at least used as the base for legislation. The Council of Europe is organising a conference on Cooperation against Cybercrime, call ...
Posted 23 March 2010 by Roger Halbheer
0
comments
Results of Operation b49 (Botnet Takedown)
On February 24th we announced the work we did on taking down Waledac – read Tim Cranton’s blog post called Cracking Down on Botnets. Now it is time to look back and try to understand what we learned so far. Sudosecure traces the Waledac infection and gives a good view of new infect ...
Posted 20 March 2010 by Roger Halbheer
2
comments
I just worked my way through the list SANS published. Looking at the list it is not surprising but scary to see which errors made it to the top of the list: Cross-site Scripting SQL Injection Classic Buffer Overflow Cross-Site Request Forgery Improper Access Control It ...
Posted 17 February 2010 by Roger Halbheer
0
comments
I read this article this morning: Safer Internet Day: How children can undermine corporate security and it actually reminds me of all the PCs I looked at in my private environment. When I see a heavily infected PC, the parents always keep telling me that the Peer-to-Peer network software on the PC w ...
Posted 10 February 2010 by Roger Halbheer
2
comments
When I travel through Africa, the high piracy rate is often something we address. Not necessarily from a commercial perspective but much more from a security angle. We know that pirated software is often infected with malware and therefore used for criminal activities. However, the discussion is a d ...
Posted 09 February 2010 by Roger Halbheer
1
comment
Targeted Attacks – the “Real” Problem
When I talk to customers, the different attacks are often something we discuss (obviously). I often mention that Virus and Worm attacks on a broad scale (like Conficker, etc.) are a serious problem, but at least they are ones we see, understand, and can fight (because we see and understand it). How ...
Posted 05 February 2010 by Roger Halbheer
0
comments
For a few years we have been working with the Council of Europe in a partnership to help to drive a Cybersecurity treaty. We realise that a problem a lot of law enforcement agencies have is inconsistent legislation, which makes it unbelievably hard to catch cybercriminals. The Co ...
Posted 05 November 2009 by Roger Halbheer
Showing 1 - 13 of 13 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×