/ Most Commented

Industrial Plant Attack Generates Renewed Concerns Over Critical Infrastructure Hacking Threats

A recent malware attack on the control systems of an industrial plant has renewed concerns about the threat hacking poses to critical infrastructure. more

Some Hackers Earning Over 16 Times That of Full-Time Software Engineers in Their Home Country

A report from one of the largest documented surveys conducted on the ethical hacking community reveals some hackers are earning over 16 times that of full-time software engineers in their home country. more

China Cloud Providers Catching Up to American Firms, Plus China Has Home Market Advantage

"Chinese tech companies plan to steal American cloud firms' thunder," says The Economist. Alibaba has its goal set to match or surpass Amazon Web Services by 2019. more

Tips for Ecommerce to Survive and Thrive with GDPR

The regulatory environment for brands and retailers that do business online is getting stricter thanks to regulatory changes in Europe with the General Data Protection Regulation (GDPR), as well as existing regulations in the U.S. Companies that adapt quickly can turn these changes into a competitive advantage. As we grapple worldwide with the implications of the incredible amount of personal data generated every day, consumers are pressuring brands and legislators alike for more control over their information. more

China Stepping Up Cryptocurrency Crackdown

China is preparing for a new crackdown on cryptocurrency, planning to stamp out remaining trading in the country, according to state media. more

Preventing ‘Techlash’ in 2018: Regulatory Threats

U.S. Chamber of Commerce President Thomas J. Donohue on January 10, 2018, warned that "techlash" is a threat to prosperity in 2018. What was he getting at? A "backlash against major tech companies is gaining strength -- both at home and abroad, and among consumers and governments alike." "Techlash" is a shorthand reference to a variety of impulses by government and others to shape markets, services, and products; protect local interests; and step in early to prevent potential harm to competition or consumers. more

The Over-Optimization Meltdown

In simple terms, Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month's worth of payroll. There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. more

Recalling 2017: The Year in Domain Data

It is safe to say that 2017 was a turbulent year in more ways than one. There was the ongoing clash between WHOIS information and user privacy, the hope that top-level domains would finally take off and multiple hacks of large corporations that reignited talks about cybersecurity. While many of these topics are essential and will likely resurface again in the coming year, it is also important to look back at 2017 through unambiguous data. more

Using Gerrymandering Technology to Fight Gerrymandering

In 1991, eight high-level Soviet officials attempted a coup that failed after two days. During those two days, citizen journalists and activists used Usenet newsgroups to carry traffic into, out of and within Russia (70 cities). News spread and protests were organized in Russia. In the west, we saw images of Boris Yeltsin speaking to demonstrators while standing on top of a tank and the Russians saw that we were aware of and reporting on the coup. more

China Sends a Wake-Up Call to All Multinationals - Are You Awake?

If you visit Marriott's China website today, you're likely to see this (see screenshot). I dumped the text within this page into Google Translate and included below is what it loosely said. So what exactly happened here? Marriott sent a survey in Mandarin to its Chinese loyalty members that referred to Tibet, Macau, and Taiwan as "countries." As readers of this site might know quite well by now, in the eyes of Chinese authorities, this is no trivial oversight. more

New Harvard Study Recognizes Community-Owned Internet Service Providers as Value Leaders in America

Community-owned fiber networks provide least-expensive local "broadband," according to a recent study by Harvard's Berkman Klein Center. more

A Year in Review: 14,000 Routing Incidents In 2017

How was the state of the Internet's routing system in 2017? Let's take a look back using data from BGPStream. Some highlights: 13,935 total incidents (either outages or attacks like route leaks and hijacks); Over 10% of all Autonomous Systems on the Internet were affected; 3,106 Autonomous Systems were a victim of at least one routing incident; 1,546 networks caused at least one incident. more

Cuba’s Odd Emphasis on the National Intranet

In 2014, Cuba embarked on a program for the "informatization" of society and "advances in the informatization of society" was the theme of the short videos by ETECSA president Mayra Arevich Marín and Vice Minister of Communications Wilfredo González... I was struck by the emphasis on the Cuban national intranet, as opposed to the global Internet... This emphasis is reflected in the relatively low price of intranet access and the continued development of Cuban content and services. more

Kodak Announces a Blockchain Platform Initiative for Image Rights Management

Kodak today revealed the launch of a blockchain-based platform called KODAKOne which is aimed to empower photographers and agencies to take greater control of image rights management. more

Lawful Registrations of Domain Names

Doug Isenberg notes in a recent CircleID essay that two records in domain name disputes were broken in 2017, namely number of cybersquatting claims (3,036 in 2016, 3,073 in 2017) and number of domain names implicated (5354 in 2016, 6370 in 2017). Fairly consistently from year to year, approximately twenty percent of filings are terminated (withdrawn): whether by settlement or nolo contendere we don't know. (All of these statistics come from the World Intellectual Property Organization (WIPO). more