February 2010

[Security, at what cost? | Online reputation in a connected world | Online behavioral advertising "icon" study | How unique - and trackable - is your browser? | Privacy and the use of geospatial information | Cyberwar | Security threat report: 2010 | How online card security fails | Most consumers reuse banking passwords on other sites | De-anonimyzing social network users | Making privacy policies not suck | Social media and young adults | 17 golden rules for mobile social networks | Online copyright enforcement and data protection | Ensuring consent and revocation | Chip and PIN is broken | 2010 UK security breach investigations report | 2010 CWE/SANS Top 25 most dangerous programming errors | Botnets blamed for junk mail and malicious spam | The promotion and protection of human rights and fundamental freedoms while countering terrorism | Behavioural biometrics]

Cybercrime vooral door eigen medewerkers

More at... [10/02/28]

Jurisprudentie

More at... [10/02/27]

Jurisprudentie

More at... [10/02/26 (1)]

ACTA, bewaarplicht internetgegevens, etcetera

More at... [10/02/25 (1)]

Jurisprudentie

More at... [10/02/21 (1)]

Officier van Justitie vordert internetverkeer CulemborgseCourant.nl

More at... [10/02/20 (1)]

Meldplicht datalekken

More at... [10/02/17 (1)]

Jurisprudentie

More at... [10/02/16 (1)]

Social media update 2010

More at... [10/02/15 (1)]

Jurisprudentie

More at... [10/02/08]

Ontwikkeling website: kies per fase je onderzoek

More at... [10/02/02]



Creative Commons License

All original content on this website © 2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.