Chuyển đến nội dung chính

Bài đăng

Hiển thị các bài đăng có nhãn cybercrime

New Cyber Report recognises legal actions

June 2015 I sketched foreseen legal actions impacting on cybercrime. I posted a diagram-infographic in Feb 2016 "LEGALLY SPEAKING – OBSERVATIONS CHART FOR JUDGES BARRISTERS AND SOLICIT0RS" - http://trewmte.blogspot.co.uk/2016/02/threatware-legally-speaking.html. I am pleased to see that ETSI (European Telecommunications Standards Institute) have also picked up on my themes in their 2017

Cyber-teaching: bite-size learning No:5

Advanced Threat Analytics (ATA) may sound quite off-putting if your organisation is a small-to-medium sized enterprise (SME). What does ATA do? Microsoft latest playbook (2017) creates a simulation learning environment where IT administrators for servers and computers can train and gain experience in searching for clues where attack (infiltration) to a network/s has occurred. Take it that it

Crime: Base Station Monitoring and Regular Stress Tests

Photo courtesy of the Macau Post Daily News feed: https://www.macaupostdaily.com/article2451.html There is no shortage of police investigations, articles and reports into cellular technology being used for some sort of illegal purposes, and that is beyond the normal seizure of mobile devices in criminal proceedings. The recent prosecution of a construction worker, reported (10-03-2017) in

C-t: Malware: bite-size learning No.4

http://thundercloud.net/infoave/new/wp-content/uploads/2013/07/emsisoft-antivirus.png If you have followed the Cyber-teaching (C-t) bite-size learning module hopefully you will have noticed several references on things that you can do to help yourself as single-person and small businesses  and other SME categories. Further proof that these types of business need to think on their feet and act

Cyber-teaching: bite-size learning No.3

https://www.peerlyst.com/posts/second-community-ebook-essentials-of-cybersecurity-limor-elbaz?trk=post_page_ebook_ad     In posting these Cyber-teaching: bite-size learning modules for single-person and small businesses and other SME categories the intention is to make explicit that which is implicit from running these types of business and that is limited finances. To bridge the financial 

Cyber-teaching: bite-size learning No.2

We are told there are many millions of PCs/Laptops bleeding information, leaking details (about devices, their operations and data) on to the world wide web (WWW). That being so, it must generate voluminous traffic (in addition to the payload it brings to the receiving party). This suggests to me that, today, in my view, it might justify the WWW being also titled the "information-spillage

Cyber-teaching: bite-size learning No.1

Cyber-teaching requires presenting practical demonstrations to help those who are not technical, technology-savvy, or over-whelmed by monitoring service promotions showing PC screens with multiple open panes with streaming data. Bite-size learning can be helpful. For instance, using a Graphical Network Monitor demonstrate where a program is connecting to where in the world and the destination

The Crime Survey for England and Wales 2016

For the first time in its annual report the Office for National Statistics (ONS) - https://www.ons.gov.uk/ - has included the offences of Fraud and *Computer Misuse (also see sub-label 'cybercrime')  in The Crime Survey for England and Wales 2016 ons.yearendingsept2016/pdf MTEB & IDF .\fcord adopted Chapter 18 as a focus group from the original Computer Misuse Act (CMA) 1990 Chapter 18 which

Admissibility of Computer Evidence in Criminal Proceedings

Admissibility of Computer Evidence in Criminal Proceedings https://www.dropbox.com/s/xiz257jktl0owu9/Admissibility%20of%20Computer%20Evidence%20in%20Criminal%20Proceedings%201998.pdf?dl=0 The article *‘Admissibility of Computer Evidence in Criminal Proceedings’ was originally produced back in 1998 and appeared in a publication produced Professor David Bainbridge, Aston University, relating to

Threatware - legally speaking

LEGALLY SPEAKING – OBSERVATIONS CHART FOR JUDGES BARRISTERS AND SOLICIT0RS The courts maybe faced with dealing with a wide range of mobile and computer criminal cases and civil disputes. These may include exploitation of the latter devices. Given the explosion of discontent in the world the use of "threatware" (a vernacular term adopted for this discussion) requires identification as to the

Investigation USIM EFs and Service Table

There has been so much going on over the past year and with research and testing I haven't posted as much as I would like. The growth areas in the variety of methods and tools for logical data and physical data extraction, harvesting and examination; impact that apps and malware might have on evidence; wireless options available on smartphones and tablets changing the way traditional cell site

ITU 150th Anniversary (1865-2015)

  The 150 ITU 1865 2015 logo is copyright to the International Telecommunications Union and reproduced with kind permission This May 2015 the International Telecommunications Union reaches its 150 Anniversary,   http://itu150.org/home/ . So what has happened in the world between 1865-2015? I thought I would highlight some events that usually go under the radar: - football clubs