Cybercrime

This is JANET(UK)’s response to the All Party Internet Group's enquiry into the Computer Misuse Act 1990.
10 May 2012 at 9:17am
Yesterday at the State Opening of Parliament the Queen's Speech announced the Government's plan for legislation in the next year. A couple of the proposed Bills seem likely to affect network operators.
4 May 2012 at 9:48am
A bot is a program, maliciously installed on a computer, that allows that computer and thousands of others to be controlled by attackers. Bots are one of the major problems on the Internet, involved in many spam campaigns and distributed denial of service attacks, as well as allowing attackers to read private information from the computer’s disk and keyboard. Some bots even allow cameras and microphones to be monitored by the attacker. Detecting and removing bots is therefore in the interests of both individuals and internet providers.
4 May 2012 at 9:01am
The RAND Feasibility Study on a European Cybercrime Centre raises some interesting issues around reporting of cybercrime. Since even in the real-world the accuracy and meaning of crime statistics seem to be a matter of debate, it’s little wonder that cybercrime seems particularly hard to measure.
4 May 2012 at 8:55am
A feasibility study by RAND of the proposal for a European Cybercrime Centre (ECC) suggests that the result risks becoming a bit lopsided.
6 June 2012 at 11:51am
The  European Commission seems to be revisiting ground covered by the UK’s 2006 amendment to the Computer Misuse Act, attempting to criminalise certain acts relating to devices/tools used for committing offences against information systems. The problem is that many computer programs – for example for identifying vulnerable computers, monitoring wireless networks or testing password strength – can be at least as valuable to those trying to secure networks and computers as to those trying to compromise them.
11 December 2012 at 11:16am
Some interesting analysis was presented by Pat Cain at the FIRST conference on trends from APWG (Anti-Phishing Working Group) data including their six-monthly surveys of domain names used in phishing campaigns.
4 July 2012 at 4:51pm
The European Commission have recently published a more detailed action plan to support their draft Internal Security Strategy from earlier this year (that's "internal" as in "within the continent", by the way!).
Subscribe to Cybercrime