[b]Anti-malware expert and CEO, Eugene Kaspersky, offers theory for stopping cybercrime Short term and long term solutions [/b]http://msmvps.com/blogs/donna/archive/2009/07/19/anti-malware-expert-and-ceo-eugene-kaspersky-offers-theory-for-stopping-cybercrime.aspxThe short term solution is to get global cooperation with the police, because the police of different countries don’t know how to collaborate with one another. He believes the police want more successful investigations, not just to stop the criminals but to also own the list of successes. So nothing is getting done and each one is blaming the other for the problem. We have to start to work together, think globally, and create a global police force.
In addition, a personal ID will be required for internet access and for logging into financial websites, similar to a driver’s license or insurance card.“If you want to get connected or onto a website you will have to present an ID.” He explains.
I’m not sure but wouldn’t ones IP address serve as an ID. I mean that’s what its used for right?
An IP address isn’t unique to a user, as it is dynamically assigned by your ISP and could be legitimately used by more than one person.
Well some users can get some different ip so the hacker can find more easy way to enter on your pc and steal your informations and files.
It has nothing to do with a hacker gaining entry to your system but being able to ‘uniquely’ identify the user, as Confused Computer User quoted in his post (below).
In addition, [b]a personal ID[/b] will be required for internet access and for logging into financial websites, similar to a driver’s license or insurance card.“If you want to get connected or onto a website you will have to present an ID.” He explains.
Oh ok well sorry.
i see. thanks for the info… I’m a bit brighter now. ;D
You’re welcome.
most of cybercrime originate from countries where is low pressure to zero pressure to hunt cybercriminals …
also these criminal companies are using shady ‘virtual’ networks and leased from firms ‘reselling’ unused connectivity and IP ranges
hard to find, even harder to catch and nearly impossible to pick individuals behind