David Cook - CyberSolicitor
  • Profile
  • Seminars & Media
  • Blog

Site update

Posted on 23 February 2017

Hi all.

Because of time pressures and publishing blogs and articles elsewhere, I won’t be updating this site for the time being.

kind regards

David

0 Comments

BitTorrent Bites Back – is BitTorrent Sync as good as the original?

Posted on 25 February 2014

BitTorrent

One of the most unusual spin offs from the scandal surrounding the electronic spying controversy involving the US National Security Agency and GCHQ is the re-emergence of a file-sharing protocol that has laboured under the stigma of piracy for many years.

 

It is suggested that BitTorrent is relaunching and rebranding itself as a bastion of secure electronic transference and storage of data for individuals, companies and major public entities.

0 Comments

+Read more

A short update

Posted on 16 February 2014

It has been a while since I last updated this blog properly. I have given it a slight overhaul and a new logo and I’ll start updating it more often with blogs and articles so please do keep checking back.

Thanks

David

0 Comments

Mr Dotcom announces new plans for file-sharing website to replace Megaupload

Posted on 20 December 2012

The notorious Megaupload.com was shut down by prosecutors in Virginia early in 2012 and the service’s founders were then charged with violating piracy laws, after it was alleged that the site had cost record labels and film studios more than $500 million in lost revenue (quite how these figures are quantified is never very clear).

0 Comments

+Read more

Man jailed for posting “despicable” comments about April Jones and Madeleine McCann

Posted on 18 December 2012

Man jailed for posting “despicable” comments about April Jones and Madeleine McCann
Matthew Woods, 19, from Chorley, Lancashire, posted “despicable” and derogatory comments about April Jones and Madeleine McCann on Facebook. He was arrested and charged under section 127 of the Communications Act 2003.

0 Comments

+Read more

The Regulation of Investigatory Powers Act 2000 and the implications on cyber crime

Posted on 13 December 2012

The Regulation of Investigatory Powers Act 2000 (RIPA) requires that when public authorities use covert techniques to obtain private information about someone, they must do so in a way that is necessary, proportionate, and compatible with human rights. The Act has in the past been regarded by some as harsh and overused, for example by local authorities to check on fly tippers.

However the recent case of R –v- Padellec 2012 [2012] EWCA Crim 1956 highlights just one of the wide ranging implications of the Act with regards to cyber crime and that the Act may in fact be prone to manipulation.

0 Comments

+Read more

Smart phones – We aren’t always so smart at preventing attacks on our mobile device

Posted on 11 December 2012

As the business of mobile malware evolves, cyber criminals are targeting mobile phones in an effort to steal cash from victims.

Mobile security firm Lookout has reported that within nine months, incidents of viruses stealing money have risen from 29% of mobile malware to 62%.

3 Comments

+Read more

Bank theft botnet uncovered

Posted on 23 October 2012

678,000 Windows PCs have been infected as a result of the Gameover ZeuS bank-theft botnet.  It has been attributed to cybercrime gangs in Eastern Europe and this particular botnet is thought to have complex defensive features which will make it very difficult for the authorities to completely defeat it.

0 Comments

+Read more

History of CyberWarfare

Posted on 17 October 2012

The term “cyberwarfare” refers to politically motivated hacking in order to conduct espionage and sabotage. It is well established that the use of computers to manipulate markets, organisations and governments has been occurring now for decades and evidence of cyberwarfare is apparent from as early as the 1970s in the form of “worm” attacks which have taken the form of extremely invasive viruses over time.

0 Comments

+Read more

Student sentenced for use of password-stealing software

Posted on 15 October 2012

Paul McLoughlin has been handed a suspended 12 month sentence under computer misuse legislation, as the result of what investigators say was an attempt to boost gamer status. The software, called “Istealer”, was injected into numerous programs, including the game Prototype, so that McLoughlin could then play those game without being charged.

0 Comments

+Read more

« Older entries   

Follow me on Twitter

My Tweets

Return to top

The content of this website reflects my personal opinion, which is not necessarily shared by my employer. Nothing contained on this website constitutes legal advice and certainly should not be relied upon as such.

Create a free website or blog at WordPress.com.

David Cook – CyberSolicitor
Blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • David Cook - CyberSolicitor
    • Already have a WordPress.com account? Log in now.
    • David Cook - CyberSolicitor
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...