• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Bad Sites   »   EU ISP Talks: Let’s Make the Most of It!

EU ISP Talks: Let’s Make the Most of It!

  • Posted on:February 16, 2016 at 8:09 am
  • Posted in:Bad Sites, Botnets, Malware, Spam
  • Author:Raimund Genes (Chief Technology Officer)
1

The Internet has no borders, countries do. And that’s what makes it so difficult for law enforcement to chase cybercriminals. Trend Micro works with these bodies for years and we see how painful and long these processes are, once the cybercriminal is somewhere else. We not only work close with local police but also with Europol and INTERPOL, which helps when it comes to international crime. They do a great job, but the bad guys clearly have an advantage as their flexibility and speed makes it easy for them to jump around in cyberspace and build up systems everywhere. And pretty often, they go to countries where cybercrime is not a crime or chasing them is low priority.

Non-Europeans might believe that in united Europe it should be easier, but they might not realize that in terms of IT and Internet policies, Europe isn’t that united. So I’m excited to learn that officials from the European Commission will now start a dialogue with Internet service providers on how to get more information about cyber attacks and how to make it easier for police in one country to get electronic evidence from another.

Experts from 28 European countries will meet in March to discuss details. I really hope that the discussion will be fruitful and there will be a common agreement on how to share data and evidence about cybercrime—of course after a proper subpoena process. But is this good enough? Sure, it will help identify and process cybercrime in Europe faster, but what about if the cybercriminal is outside of Europe? And what if they just find better ways to hide their traces? That’s why I hope that something else will be discussed in March: how to work with the ISPs so they deliver clean water out of their Internet pipes.

I’ve been using this analogy for over 10 years now: no matter where in Europe I am, I drink tap water in the hotel rooms—and I never caught a stomach bug. That’s because they provide clean water. In cybercrime, while it is not that easy to clean it all, why do we still see so many spam emails? Why do simple malware still make it to the end-user? At least with this common stuff, you should be able to filter out, like how you process water before it becomes drinkable tap water. Baseline filters should be a standard and implemented at every European ISP. And when every ISP agrees on standards to share the logs about spam and malware, when every ISP warns others about new and wide-spreading malware and automatically generates an Open Standard Indicator of Compromise ruleset, which is then shared with everyone else, then we are moving ahead! And then Europe would be less attractive for the average cybercriminal.

So while I welcome these upcoming debates, I believe that more should be discussed. As a European, I expect that I have easy access to clean water, electricity, public transportation, and all other infrastructural benefits First World countries deliver. Am I demanding too much if I also want to have a basic filter to filter out the well-known malware, malicious URLs and spam?

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.