Hiển thị các bài đăng có nhãn cybercrime. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn cybercrime. Hiển thị tất cả bài đăng

Chủ Nhật, 29 tháng 10, 2017

New Cyber Report recognises legal actions

June 2015 I sketched foreseen legal actions impacting on cybercrime. I posted a diagram-infographic in Feb 2016 "LEGALLY SPEAKING – OBSERVATIONS CHART FOR JUDGES BARRISTERS AND SOLICIT0RS" - http://trewmte.blogspot.co.uk/2016/02/threatware-legally-speaking.html.

I am pleased to see that ETSI (European Telecommunications Standards Institute) have also picked up on my themes in their 2017

Thứ Sáu, 14 tháng 4, 2017

Cyber-teaching: bite-size learning No:5





Advanced Threat Analytics (ATA) may sound quite off-putting if your organisation is a small-to-medium sized enterprise (SME). What does ATA do? Microsoft latest playbook (2017) creates a simulation learning environment where IT administrators for servers and computers can train and gain experience in searching for clues where attack (infiltration) to a network/s has occurred. Take it that it

Chủ Nhật, 2 tháng 4, 2017

Crime: Base Station Monitoring and Regular Stress Tests




Photo courtesy of the Macau Post Daily

News feed: https://www.macaupostdaily.com/article2451.html

There is no shortage of police investigations, articles and reports into cellular technology being used for some sort of illegal purposes, and that is beyond the normal seizure of mobile devices in criminal proceedings. The recent prosecution of a construction worker, reported (10-03-2017) in

Thứ Tư, 29 tháng 3, 2017

C-t: Malware: bite-size learning No.4




http://thundercloud.net/infoave/new/wp-content/uploads/2013/07/emsisoft-antivirus.png

If you have followed the Cyber-teaching (C-t) bite-size learning module hopefully you will have noticed several references on things that you can do to help yourself as single-person and small businesses  and other SME categories. Further proof that these types of business need to think on their feet and act

Cyber-teaching: bite-size learning No.3




https://www.peerlyst.com/posts/second-community-ebook-essentials-of-cybersecurity-limor-elbaz?trk=post_page_ebook_ad

 

 
In posting these Cyber-teaching: bite-size learning modules for single-person and small businesses and other SME categories the intention is to make explicit that which is implicit from running these types of business and that is limited finances. To bridge the financial 

Cyber-teaching: bite-size learning No.2

We are told there are many millions of PCs/Laptops bleeding information, leaking details (about devices, their operations and data) on to the world wide web (WWW). That being so, it must generate voluminous traffic (in addition to the payload it brings to the receiving party). This suggests to me that, today, in my view, it might justify the WWW being also titled the "information-spillage

Cyber-teaching: bite-size learning No.1

Cyber-teaching requires presenting practical demonstrations to help those who are not technical, technology-savvy, or over-whelmed by monitoring service promotions showing PC screens with multiple open panes with streaming data.



Bite-size learning can be helpful. For instance, using a Graphical Network Monitor demonstrate where a program is connecting to where in the world and the destination

Thứ Năm, 19 tháng 1, 2017

The Crime Survey for England and Wales 2016

For the first time in its annual report the Office for National Statistics (ONS) - https://www.ons.gov.uk/ - has included the offences of Fraud and *Computer Misuse (also see sub-label 'cybercrime')  in The Crime Survey for England and Wales 2016 ons.yearendingsept2016/pdf

MTEB & IDF .\fcord adopted Chapter 18 as a focus group from the original Computer Misuse Act (CMA) 1990 Chapter 18 which

Thứ Bảy, 13 tháng 8, 2016

Admissibility of Computer Evidence in Criminal Proceedings



Admissibility of Computer Evidence in Criminal Proceedings

https://www.dropbox.com/s/xiz257jktl0owu9/Admissibility%20of%20Computer%20Evidence%20in%20Criminal%20Proceedings%201998.pdf?dl=0

The
article *‘Admissibility of Computer Evidence in Criminal Proceedings’ was
originally produced back in 1998 and appeared in a publication produced Professor
David Bainbridge, Aston University, relating to

Chủ Nhật, 7 tháng 2, 2016

Threatware - legally speaking



LEGALLY SPEAKING – OBSERVATIONS CHART
FOR JUDGES BARRISTERS AND SOLICIT0RS



The courts maybe faced with dealing with a wide range of mobile and computer criminal cases and civil disputes. These may include exploitation of the latter devices. Given the explosion of discontent in the world the use of "threatware" (a vernacular term adopted for this discussion) requires identification as to the

Chủ Nhật, 31 tháng 1, 2016

Investigation USIM EFs and Service Table

There has been so much going on over the past year and with research and testing I haven't posted as much as I would like. The growth areas in the variety of methods and tools for logical data and physical data extraction, harvesting and examination; impact that apps and malware might have on evidence; wireless options available on smartphones and tablets changing the way traditional cell site

Chủ Nhật, 22 tháng 3, 2015

ITU 150th Anniversary (1865-2015)


 



The 150 ITU 1865 2015 logo is copyright to the International Telecommunications Union

and reproduced with kind permission

This May 2015 the International Telecommunications Union reaches its 150 Anniversary,   http://itu150.org/home/ .

So what has happened in the world between 1865-2015? I thought I would highlight some events that usually go under the radar:

- football clubs

Popular Posts

Được tạo bởi Blogger.

Featured Post

Portland Man Pleads Guilty to Cyberstalking and Anonymous Telephone Harassment

PORTLAND, Ore.—On June 24, 2019, Bob Ibenne Ugwa, 50, of Portland, pleaded guilty to cyberstalking and anonymous telecommunications harassme...

Nhãn