Rina Steenkamp - Privacy en technologie

Weblog

2012

September

['ID-bewijzen slecht gecontroleerd' | Privacy en security in de cloud - Een verkenning van tools en technieken | LJN: BX7043, Rechtbank Amsterdam , 507119 / HA ZA 11-2896 | LJN: BX7293, Rechtbank Rotterdam , 381209 / HA ZA 11-1501 | Onderneemster [...] werd opgelicht door cybercriminelen - "Ik begrijp niet dat ik hier in kon trappen" | Juridische status van virtuele objecten in online games | Surveilleren en opsporen in een internetomgeving | Naming met of zonder shaming? Over de actieve openbaarmaking van het instellen van verscherpt toezicht door de [IGZ] | Toezichtsrapport inzake de rubricering van staatsgeheimen door de AIVD | Internet vormt inlichtingendienst - Online spioneren]

Reverse engineering informational privacy law

[Read more]

"Not all my friends need to know" - a qualitative study of teenage patients, privacy and social media

[Read more]

Malware report - January - June 2012

[Read more]

Public attitudes towards robots

[Read more]

Big data for all - privacy and user control in the age of analytics

[Read more]

Have I got Newsforyou - Analysis fo Flamer C&C server

[Read more]

The ZeroAccess Botnet - Mining and fraud for massive financial gain

[Read more]

Symantec intelligence report - August 2012

[Read more]

Study on impact assessment for legislation on mutual recognition and acceptance of e-Identification and e-Authentication across borders

[Read more]

Drones in domestic surveillance operations - Fourth Amendment implications and legislative responses

[Read more]

Chip and skim - cloning EMV cards with the pre-play attack

[Read more]

Baseline requirements for the issuance and management of publicly-trusted certificates, v.1.0

[Read more]

A technology-centered approach to quantitative privacy

[Read more]

Reference check - is your boss watching?

[Read more]

Copyright as property in the post-industrial economy - a research agenda

[Read more]

Marketing your mobile app - get it right from the start

[Read more]

McAfee threats report - Second quarter 2012

[Read more]

Privacy and data management on mobile devices

[Read more]

The 're-identification' of governor William Weld's medical information - a critical re-examination of healt data identification risks and privacy protections, then and now

[Read more]

Behavioral advertising - the offer you cannot refuse

[Read more]

Threat report - H1 2012

[Read more]

Transparency - A brief Future of Privacy Forum survey of mobile application best practices

[Read more]

Counting the cost of e-crime - Executive summary

[Read more]

Cracking story - How I cracked over 122 million SHA1 and MD5 hashed passwords

[Read more]

On the feasibility of side-channel attacks with brain-computer interfaces

[Read more]