Home » Archive by category Internet News (Page 1798)

Google to Distrust Symantec-Issued Certificates Amid Misuse

CircleID CircleID: "Google to sanction Symantec for misissuing security certificates" – Zeljka Zorz reporting in Help Net Security: "In a post on a developers’ forum [link], software engineer on the Google Chrome team Ryan Sleevi has announced Google’s plan to start gradually distrust all existing Symantec-issued certificates, and push for their replacement with new, fully revalidated certificates that will be compliant to the current baseline requirements. ... Sleevi says that the Google Chrome team has been investigating Symantec Corporation’s failures to properly validate certificates for the last two months, and they concluded that at least 30,000 certificates have been misissued by them."
Follow CircleID on TwitterMore under: Security

The post Google to Distrust Symantec-Issued Certificates Amid Misuse appeared first on iGoldRush Domain News and Resources.

Continue reading

From the fake news department with a domain name angle

Domain Name Wire Domain Name Wire: Story claimed Trump sent a cease & desist letter about a domain name, but the domain wasn’t even registered. Earlier this week, Observer.com published an article about the poor fate of a teenager who registered the domain name TrumpScratch.com. The article said that Donald Trump’s team of lawyers sent the girl a cease & desist […]
The post From the fake news department with a domain name angle appeared first on Domain Name Wire | Domain Name News & Views.

The post From the fake news department with a domain name angle appeared first on iGoldRush Domain News and Resources.

Continue reading

The Future of Fully Automated and Robot-Driven Transportation and Supply Chain Management

CircleID CircleID: Today, we are in a way naturally connected to automation and robotics. In the industrial revolution, people realized that many tasks could be performed better and more efficiently by a machine. The rise of our dependence on technology has greatly risen since then, and thanks to scientific and technological advancements, we are on the breach of a new era. Experts are working on creating robot-driven and full automated transportation for enhancing supply chain management and public transportation. Let's see what kind of future awaits us.

Public Transportation and IoT

What is the Internet of Things (IoT)? To put it simply, it is a huge network of connected 'things', including things-things, people-things, and people-people relationships. The concept revolves around the possibility of connecting any device — smartphones, computers, headphones, washing machines, coffee makers, and other - to the Internet. People are today connected to the Internet more often than ever before.

However, public transportation (trains, buses, and cars) still represents a notable dead spot in this concept. The Internet of Things is looking to change things such as lapses in coverage on the subway or through underground tunnels. The IoT is there to ensure constant connectivity to the Internet.

This will also make transportation much more efficient. The main players in this 'game' are Greyhound, Amtrak, JetBlue, and Delta, who've understood the importance of IoT connectivity. For example, maintenance workers in airplanes can make sure that the plane complies with FAA guidelines and secure the aircraft more easily thanks to sensors built inside the planes. Also, many bus, train, and plane companies have started equipping their vehicles with Wi-Fi connection, with the aim of enhancing the customer experience. Thanks to the IoT, many smart cars and connected cars have gained in popularity.

Dangers of Cyberattacks to Transport System

Due to the increased risk of cyber attacks, GCC governments are urging for improvement in the security of critical national infrastructures. IBM has predicted 30 billion autonomously connected 'things' by the year 2020, regarding the field of operational technology.

However, what is also on the rise is the sophistication, scale, and the number of cyber attacks aimed at IoT systems. Cyber criminals can, for example, shut down automated transportation systems, direct construction teams to damage utilities intentionally, create false emergencies, and even shut down street lights by sending fake data to sensors. Omnix International, a company dedicated to finding software solutions to public and private organizations across the energy, hospitality, AEC, and government sectors, are developing new cybersecurity solutions because of the growing organizational demand.

Supply Chain meets AI, IoT and Robotics

We learn things by doing them, tending to improve the processes. But when it comes to building a supply chain system, every time we begin from the ground up — repeating up to 40% of the same activities and going through same calculation steps each time. The future of mainstream supply chain activities sees the embedment of Artificial Intelligence coming its way. The problem is that we can't access algorithms that learn and retain experience and knowledge of the past.

How can AI then be implemented and used in supply chain management? Well, robotics and machine vision are already in use, mostly in warehouses and in facial recognitions systems used by law enforcement. Machine/computer vision systems can be used, for example, by designers who use peripherals such as mice, keyboards, and drawing boards for interacting with 3D models. By employing gesture recognition apparatus, these systems can bypass all inefficient mechanisms.

AI can aid in the development of predictive technologies that can make operating the supply chain more efficient. Also, creating fully-autonomous vehicles can improve not only road but warehouse transportation as well.

The Internet of Things technologies are already being used in fleet management, and these tools can assist with everything from vehicle maintenance, tracking driver behavior, and fuel monitoring to ecommerce logistics — the applications are limitless.

As for robotics, companies have already started automating certain warehouse systems to reduce headcount and human labor costs, with reducing mistakes and improving efficiency. For example, Amazon has spent about $775 million for purchasing and implementing Kiva systems across their warehouses. The system includes robots moving individual boxes or stacks without the need for human control.

From cranes on large construction sites to helicopters that can fly over urban areas, these projects are at risk of being canceled or damaged if there were to be accidents within the initial period of their implementation. However, the possibilities of autonomous, inexpensive, and quick deliveries still remain as a question experts and tech developers seek to find an answer to. Companies large like Amazon could benefit from the opportunity of getting anything under 5 pounds delivered to the end user's front door in a matter of minutes.

Advanced technologies and systems, such as robotics, Artificial Intelligence, and the Internet of things will clearly have a huge impact on supply chains and transportation across the next decade. However, profits they create and public perception will impact the process of their adoption, but if their core purpose (improved efficiency and safety, as well as a decrease in human errors) is actualized, they might get into mainstream use sooner than we think.
Written by Nate Vickery, ConsultantFollow CircleID on TwitterMore under: Internet of Things

The post The Future of Fully Automated and Robot-Driven Transportation and Supply Chain Management appeared first on iGoldRush Domain News and Resources.

Continue reading

Use STIX to Block Robocalls

CircleID CircleID: It is one of those oddities that occurs around Washington from time to time. During the same hour today, the Federal Communications Commission (FCC) was meeting at its downtown headquarters trying to stop robocalls, while a large gathering of government and industry cybersecurity experts were meeting a few miles away at Johns Hopkins Applied Physics Lab advancing the principal means for threat information sharing known as STIX. It turns out that STIX may be a perfect match for meeting FCC robocall mitigation objectives.

Structured Threat Information Sharing (STIX) emerged from industry collaboration with the DHS US-CERT as a best-of-breed platform for observing cyber threats, packaging the sighting information, and distributing the bundle in trusted ways to users to stop the threats. The platform was initially perfected by MITRE working closely with the several industry groups — especially the financial industry. It captured such a significant cross-section of security communities in the U.S. and internationally that the entire platform was turned over to the standards body OASIS where it resides today under the aegis of the Cyber Threat Intelligence (CTI) Technical Committee. STIX is now envisioned as the principle platform for implementing both the U.S. Cybersecurity Act as well as the EU Network Information Security Directive.

As many of the cyber security experts noted, unwanted calls — often with spoofed caller IDs or disguised origins — are a well-known threat faced constantly in dealing with network traffic. It makes effectively no difference if the traffic is a voice call, text SPAM, malware, or a DDoS attack. They all represent threats to users and network operators.

Indeed, during the course of the years of Federal agency proceedings and workshops, industry innovators (as opposed to legacy incumbents) have urged reliance on the capture and exchange of robocall threat patterns among providers and end users rather than heavy-handed, complicated governance models. Indeed today, the dichotomy in approaches is posed as "deterministic" (i.e., governance schemes, registrations, certificates, and registry database lookups) versus "probabilistic" (i.e., capturing and exchanging threat signatures).

So the FCC Robocall NOI/NPRM released today will doubtlessly unleash many thousands of irate complaints about the robocall/spoofed call problem. However, the FCC would be best served by eschewing onerous, deterministic platforms like STIR and SHAKEN with their certificate governance schemes, and relying instead on the more lightweight and already proven probabilistic solutions of the cyber security community and agencies like STIX. Robo/spoofed calls for STIX are simply another threat exchange profile. The latter approach is also more scalable, global, pro-competitive, encourages greater innovation, and leverages the enormous work within the cyber security community. It also comports with the minimalist approaches favored by policy makers today.
Written by Anthony Rutkowski, Principal, Netmagic Associates LLCFollow CircleID on TwitterMore under: Policy & Regulation, Security

The post Use STIX to Block Robocalls appeared first on iGoldRush Domain News and Resources.

Continue reading

Domain Movers: Bands.com, AutoDraw.com + More

dotWeekly dotWeekly: Welcome! This is Domain Movers, we track corporate domain name transactions and report the early findings to you. The following domain names often relate to new brands, new products, new advertising campaigns, new services and much more.
Some big names in today’s list and this is only a small sample of activity over the past 24 hours:
Bands.com a true premium generic domain name has been acquired by Ash Avildsen, CEO of Sumerian Records. Sumerian is a record label and … Read the rest
Domain Movers: Bands.com, AutoDraw.com + MoreJamie Zoch

The post Domain Movers: Bands.com, AutoDraw.com + More appeared first on iGoldRush Domain News and Resources.

Continue reading

Two Tucows execs are leaving

Domain Name Wire Domain Name Wire: CFO and CIO announced their resignations this month. Two Tucows executives have recently notified the company that they are leaving. Last week, Chief Financial Officer Michael Cooperman announced that he was retiring after 18 years with the company. He will remain an advisor to the company when he leaves April 1. Dave Singh, current Vice […]
The post Two Tucows execs are leaving appeared first on Domain Name Wire | Domain Name News & Views.

The post Two Tucows execs are leaving appeared first on iGoldRush Domain News and Resources.

Continue reading

Let’s Talk About “Blockbuster” Sales

DomainingTips.com DomainingTips.com: First and foremost, I want to make it clear that this post is written by someone who has been domaining for quite a few years but never had a “blockbuster” sale that tops the charts.
Realistically speaking, most of those who are reading this won’t have a blockbuster sale either but let me ask you: so [...]

The post Let’s Talk About “Blockbuster” Sales appeared first on iGoldRush Domain News and Resources.

Continue reading

New gTLD registries want a $17 million ICANN rebate

DomainIncite DomainIncite: Many gTLDs are performing more poorly than expected and their registries want some money back from ICANN to compensate. The Registries Stakeholder Group this week asked ICANN for a 75% credit on their quarterly fees, which they estimate would cost $16.875 million per year. The money would come from leftover new gTLD application fee money, […]

Related posts:ICANN has spent $120 million on new gTLDs
ICANN to pay $2 million to keep Trademark Clearinghouse “free” for registrars
ICANN seeks more power over new gTLD registries

The post New gTLD registries want a $17 million ICANN rebate appeared first on iGoldRush Domain News and Resources.

Continue reading

Hacker hostage crisis at ICANN secret key ceremony! (on TV)

DomainIncite DomainIncite: One of ICANN’s Seven Secret Key-Holders To The Internet got taken out as part of an elaborate heist or something on American TV this week. In tense scenes, a couple of secret agents or something with guns were forced to break into one of ICANN’s quarterly root zone key signing ceremonies to prevent a hacker […]

Related posts:ICANN creates DNSSEC root keys
ICANN to stream DNSSEC ceremony live
ICANN to flip the secret key to the internet

The post Hacker hostage crisis at ICANN secret key ceremony! (on TV) appeared first on iGoldRush Domain News and Resources.

Continue reading