Home » Archive by category Internet News (Page 1841)

Invisible Folder

Domain Flipper: It has not passed them that you share a computer with more people but they don't want that they have access to your private files, because then you show them an easy way make folders invisible so no one can see them and only have to re...
Continue reading

30% of CMOs will be canned in 2017; Robots and a ‘Jobless Future’ for Humans?

The Frager Factor The Frager Factor: Go Ahead and Date Your Digital Assistant; How to Close Sales in the Age of “Always Be Helping”; This 3-year-old startup has sold $100 million in Broadway tickets,; Alexa, Say What?! Voice-Enabled Speaker Usage to Grow Nearly 130% This Year; Six Reasons Why You’re Not Getting What You Want; Microsoft is bringing bots to Bing search results; 7 Ways Even the Least Social Media Savvy Entrepreneur

The post 30% of CMOs will be canned in 2017; Robots and a ‘Jobless Future’ for Humans? appeared first on iGoldRush Domain News and Resources.

Continue reading

The Criminals Behind WannaCry

CircleID CircleID: 359,000 computers infected, dozens of nations affected world-wide! A worm exploiting a Windows OS vulnerability that looks to the network for more computers to infect! This is the most pernicious, evil, dangerous attack, ever.

"The Big One” Wired pronounced.

"An unprecedented attack”, said the head of Europol.

Queue the gnashing of teeth and hand-wringing!

Wait, what? WannaCry isn't unprecedented! Why would any professional in the field think so? I'm talking about Code Red, and it happened in July, 2001.

Since then dozens, perhaps hundreds of Best Common Practice documents (several of which I've personally worked on) have been tireless written, published, and evangelized, apparently to no good effect. Hundreds of thousands, perhaps millions of viruses and worms have come and gone.

Our words 'update your systems, software, and anti-virus software' and 'back up your computer', ignored. The object lesson taught by Code Red, from almost sixteen years ago, forgotten.

Criminal charges should be considered: Anyone who administers a system that touches critical infrastructure, and whose computers under their care were made to Cry, if people suffered, or died, as is very much the possibility for the NHS patients in the UK, should be charged with negligence. Whatever ransom was paid should be taken from any termination funds they receive, and six weeks pay deducted, since they clearly were not doing their job for at least that long.

Harsh? Not really. The facts speak for themselves. A patch was available at least six weeks prior (and yesterday was even made available by Microsoft for 'unsupported' platforms such as Windows XP), as was the case with Code Red.

One representative from a medical association said guilelessly, in one of the many articles I've read since Friday 'we are very slow to update our computers'. This from someone with a medical degree. Yeah, thanks for the confirmation, pal.

The worm has been stopped from spreading. For now. iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com was registered by a security researcher, and sinkholed.

Sorry, forget it. I went for a coffee while writing this, and predictably WannaCry V2 has since been spotted in the wild, without the kill-switch domain left dangling.

What have we learned from all of this, all of this for a lousy $26,000?

If someone gets arrested and charged, and by someone, I mean systems administrators, 'CSOs' and anyone else in line to protect systems who abjectly failed this time, a lot. WannaCry infections to critical infrastructure are an inexcusable professional lapse. Or, we could just do all of this again, next time, and people may die.

Afterthought: My organization, CAUCE.org recently turned 20 years old. When it started, we didn't believe things could get this bad, but it wasn't too soon after that it became apparent. I issued dire warnings about botnets in 2001 to the DHS, I made public pronouncements to these ends in 2005 (greeted by rolled eyes from an RCMP staff sergeant). I may have been a little too prescient for my own good at the time, but can anyone really say, in this day and age, that lives are at stake, and we are counting on those responsible for data safety to at least do the bare minimum? I await your comments, below.
Written by Neil Schwartzman, Executive Director, The Coalition Against unsolicited Commercial Email - CAUCEFollow CircleID on TwitterMore under: Cybercrime, Malware, Security

The post The Criminals Behind WannaCry appeared first on iGoldRush Domain News and Resources.

Continue reading

Domain Shane’s Daily List of Domains at Auction for Sunday May 14th

Domain Shane Domain Shane: Godaddy recently introduced it’s own valuation of their domains at auction.  They should have some incredible statistics of value based on a decade of expired domain sales and Afternic history to build an algorithm to price names.  But it still sucks.  Not that I expected it to be great.   I just didn’t expect it to be so off.
Half the names receivig the top bids are valued at zero dollars.  All numerics are worth zero.  All dot cc are worth zero. Most dot org are worth zero.   And so on.   In short, its half hearted attempt to give auction users a way to find names.  And to give some names perceived value.  There is one thing I love about it though.  It does a great job of hiding some great names in the chaos of valuation.   Lord knows we don’t want some stupid list bringing out gems we thought we were going to get for $12 (sarcasm)  Enjoy your Sunday and Happy Mother’s Day to all the great Mothers around the world. Here are today’s names.   Click for Current Price.  
Quote Of The Day  “When I die, I want to go peacefully like my grandfather did–in his sleep. Not yelling and screaming like the passengers in his car.   -Bob Monkhouse “ 
Domain Of The Day: BargainBuys.com    Everyone loves a bargain.  And you know you’ll find one because it says tin the name
Godaddy Domains That I Like With Multiple Bids
AmericanElectric.com  Easily a four figure name.  Power, especially solar is going to be competitive like phones are now in the near future
QuickConnections.com  21 years old.  Social or bridging two things
Highed.com   I don’t like these one off but all these bidders say I may be wrong
KaraokeClub.com  21 years old.  Karaoke is timeless.   And an international word.  And you get all the traffic from Karaoke.club and the upgrade money when they come to their senses and buy the dot com
388911.com388922.com,  388933.com   Three nice 6Ns that have crossed $100
QuikCat.com   I feel like I see quik spelled this way almost as much as with the C
AeroVentures.com    Already and LLC with the same name
YG.biz and FH.biz Two letter dot biz isn’t too bad of an asset to own
Domains That I Like With One or No Bids
SimFax.com This isn’t getting enough love IMO. Faxes are on their way out but some people still like to send them. Perfect name for a program that lets you receive faxes via email
SnappyFish.com No bidders. A memorable brand. Might be worth $12
SuperiorGems.com Not just ordinary gems, superior. No bidders at $12
SelectBattery.com Tesla is going to change the battery world
ZPayment.com Upgrade name for a few things
MeatBucket.com I think this was across from the Krusty Krab
IndigoStorm.com Sounds like a new body wash fragrance from Axe
80sGames.com From Pac-Man to Galaga. The 80s had some fantastic video games. No bids
KillerMoon.com Cool sounding brand. Easy logo. Black circle. No bids at $12
HolaBaby.com Everyone knows Hola. Even people that don’t speak Spanish
WeSellJunk.com At least they’re honest
RateMyWeed.com A weed rater site. And yes that’s a thing
PopJolly.com Another $12 that would make a memorable brand
CureSnoring.org Obviously the dot com is better but a lot of money in snoring. Ask Zyppah
Other Godaddy Domains With Bids
Namejet Auction
KeyToSucceed.com   Everyone is looking for the keys to success.  No bidders
LLCTaxes.com   You know you should form a LLC to protect your assets and for tax reasons.  Here’s a name to help you with your taxes once your form one
ScotlandVacations.com  One of the most beautiful places on earth.  Millions of visitors a year
WMUK.com  I like the name but there is a bidder for all this sellers reserve auctions with the bidder name of HKDN who’s bids are always right below reserve.  Not saying that its not legit but I stay away from situations like this when there are patterns.  Bidder may not even know the person so not accusations here, just saying take a look. That’s why Namejet put a “look at this seller’s other auctions”
TopStat.com   People love data.  Especially when it comes to sports
BellHouse.com Solid brand.  Could be used for a variety of things.
688786.com  You have some Godaddy names with this exact pattern today to compare it to
Dropping.io    As seen on DomainSherpa.  I didn’t like it.  Can’t remember what others said.  But I keep going on and off the dot io bandwagon.   I do like anything I can make money with
LandScan.com   Says what you do and rhymes.  I like rhyming names because people remember them.
GardenZone.com  It’s ok.  Trust me, I’m an expert
SitSki.com  Usually reserved for those with no legs or paralysis.  Still takes amazing talent
HealthSource.org  Works with the dot org.  Just wish there was no reserve
Have a name at auction and need more exposure? Send me an email. I Charge $10 per name per day. We may be able to help. If you have an auction you want to promote, email us for details.*All names chosen by me, Shane . (ie you click through and purchase a name you like) or an occasional paid listing. Everything I say is based on my own research or is opinion. Do your own due diligence. That means look it up yourself if you don’t think the stats or my opinion is correct. I hand choose my names but I am paid to make this list by the auction houses, individuals that are auctioning names, and Godaddy affiliate links. Keep that in mind and only buy names that YOU think are good
The post Domain Shane’s Daily List of Domains at Auction for Sunday May 14th appeared first on DSAD.

The post Domain Shane’s Daily List of Domains at Auction for Sunday May 14th appeared first on iGoldRush Domain News and Resources.

Continue reading

Odd GoDaddy auction activity, might be tied to new appraisal valuations

TheDomains TheDomains: So GoDaddy revamped their appraisal tool and now when someone is bidding at GoDaddy auctions they see where GoDaddy is valuing the name. Elliot Silver wrote a couple articles on the topic. On Twitter and as a sidenote in the Daily Sales Recap on TLDinvestors.com I expressed my doubts about this. @DInvesting @godaddyauctions I think […]
The post Odd GoDaddy auction activity, might be tied to new appraisal valuations appeared first on TheDomains.com.

The post Odd GoDaddy auction activity, might be tied to new appraisal valuations appeared first on iGoldRush Domain News and Resources.

Continue reading

Recent Domain Sales That Have Been Developed (pics): JobNinja.com, FeedRoom.com, Oreya.com, More

Domain Shane Domain Shane: The screenshots below are examples of buyers of domains from the past year that have either developed their sites, or purchased an upgrade domain and have redirected their acquisition to an existing website.
JobNinja.com sold for $10,500 at Sedo, a German language job site based in Munich, Germany is under development on the English language domain. Per Google Translate, “Whether you’re looking for a junior job, a student job, or a small job, JobNinja is the perfect job exchange for you.” Interestingly, there is a LinkedIn profile for a company that was previously developed on the domain, but the company must not have survived.

FeelActive.com sold for $8,000 at Sedo, and the owner of French language FeelActiv.com picked up the domain which added an “e” at the end. “Feelactiv helps you to find the most appropriate tools and professionals in your active wellness process.“


FeedRoom.com sold for $2,750 at NameJet, and a video editing product is in the works. “The FeedRoom’s 4K video software suite is scheduled for beta release sometime in Q3 2017.”

JuniperHouse.com sold for $2,600 at Sedo, and a new outdoor home furnishings brand is in the works, based in Palm Springs, California. “Frustrated by the tedious and impossible task of finding all the finest outdoor products amongst the endless expanse of the internet, founders Bob Allred & Tessa Carpenter were inspired to create Juniper House, the go-to source for the best the world has to offer for your outdoor. “

Biofutura.com sold for $2,120 at Sedo, and the domain redirects to Bioeinwegartikel.de, where they have a line of “biofutura” products promoted. The company already controlled and had sites developed on Biofutura.nl and Biofutura.fr. Per Google Translate, “Bio Futura is an importer, wholesaler and webshop in durable disposables and packaging. As a company, we believe in sustainable business and the power of biodegradable packaging.“

The post Recent Domain Sales That Have Been Developed (pics): JobNinja.com, FeedRoom.com, Oreya.com, More appeared first on DSAD.

The post Recent Domain Sales That Have Been Developed (pics): JobNinja.com, FeedRoom.com, Oreya.com, More appeared first on iGoldRush Domain News and Resources.

Continue reading

Why Not Connect Cuba’s Gaspar Social Streetnet to the Internet?

CircleID CircleID: I've been covering Cuban streetnets (local area networks with independent users that are not connected to the Internet) for some time. Reader Doug Madory told me about Gaspar Social, a new streetnet in Gaspar, a small town in central Cuba. Gaspar Social opened to the public last October and has grown quickly — about 500 of Gaspar's 7,500 residents are now users.

Streetnets are illegal in Cuba and the government has ignored some and cracked down on others, but they seem to be tolerating them now as long as they remain apolitical and avoid pornography and other controversial material. Last month, Communist Party officials noticed Gaspar Social but did not shut it down. Yoandi Alvarez, one of the network creators, said "they made it clear our network was illegal but they wouldn't be taking our antennas down" and they were given instructions for applying for a permit.

So, residents of Gaspar can play games, download software, share files, socialize, etc., but they can not access the global Internet. Why not connect Gaspar Social to the Internet?

Gaspar is in the province of Ciego de Ávila and the capital city is Ciego de Ávila. ETECSA has six WiFi hotspots and three navigation rooms in Ciego de Ávila and, as a provincial capital, the city must have many government, medical and educational users. In other words, there must be relatively fast backhaul to the Internet in Ciego de Ávila.

Connecting Gaspar to Ciego de Ávila seems like it would be cheap and easy. As you see below, they are only 28.2 kilometers apart on the road (25 kilometers as the crow flies) and the terrain is flat. (Gaspar's elevation is 5.1 meters and Ciego de Ávila's 49 meters).

They could be connected with a high-speed wireless link or fiber. The flat terrain favors a wireless link and the road could provide a right-of-way for fiber. Installing 28 kilometers of fiber would be expensive in the US, but Cuba is not the US. One can imagine a community project using International Telecommunication Union (ITU) L.1700 cable. (For an example of a community fiber project, in Bhutan, click here).

ETECSA is the elephant in this hypothetical room. The ITU tracks regulatory evolution and, as of 2013, Cuba was one of the few remaining first-generation (regulated public monopoly) nations.

I suggested earlier that ETECSA consider streetnets as complementary collaborators rather than competitors or outlaws and last year they allowed a small streetnet to connect to a WiFi hotspot.

Cuba has a well-deserved reputation for improvisation and appropriate-technology innovation. I am not suggesting that they jump suddenly to fourth-generation regulation (regulation led by economic and social policy goals), but that they run a pilot test, connecting Gaspar Social to the Internet.

Here is a short video (1:56) on Gaspar Social:

And here is a longer video (13:48) with interviews of the network creators:

Written by Larry Press, Professor of Information Systems at California State UniversityFollow CircleID on TwitterMore under: Access Providers, Internet Governance, Policy & Regulation

The post Why Not Connect Cuba’s Gaspar Social Streetnet to the Internet? appeared first on iGoldRush Domain News and Resources.

Continue reading

8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable

CircleID CircleID: In modern society, there is one fact that is unquestionable: The hyper-connectivity of the digital economy is inescapable. A financial institution without an online presence or omni-channel strategy will cease to be competitive. Universities (for-profit or non-profit) must develop and continuously evolve their online learning capabilities if they are to stay relevant. Online retailers are quickly outpacing and rendering their 'brick-and-mortar' counterparts irrelevant. Travel agents have been largely relegated to dinosaur status in this era of online travel search aggregators and booking portals. A payments ecosystem mostly dominated by major card networks and processors now includes closed loop systems such as Apple Pay, Google Wallet and others. When we add the Internet of Things (IoT), robotics and artificial intelligence (AI) to the mix, the networked society has become a monolith that we simply cannot ignore.

What is most concerning about the ubiquity of technology is the multitude of cyber threats which organizations and individuals have to contend with. While the risks to individuals are relatively high as it relates to invasion of privacy, identity theft and financial loss, cyber-attacks can have a particularly critical impact on businesses. Depending on market and jurisdictional realities, the consequences can include heavy regulatory penalties, plummeting stock prices, lawsuits or mass layoffs — The effect on a company's bottom line can be catastrophic.

But how are corporations responding to this ever-evolving threat landscape? The resulting strategies fall mostly into the following categories. There are the large organizations which employ the '3 lines of defense' approach where an IT department owns and manages cyber risks, the operational risk and/or compliance departments specialize in risk management (including cyber), and the internal audit function provides independent assurance that cyber risks are being effectively managed. This approach is resource intensive and demands highly specialized (and costly) personnel. There are the generally under-staffed companies that limp along from day-to-day reacting to cyber-attack after cyber-attack, many of them not even aware that their systems and networks have been compromised. And finally, there are the SMEs that basically stick their heads in the sand and pretend that their operation is too small or insignificant to be the target of cyber criminals.

More often than not, business leaders across the board fail to recognize that cybersecurity is no longer the domain of the IT organization. Cybersecurity strategy is now business strategy, and the response to cyber threats is the responsibility of every individual that works for or runs a company. And here are 8 key reasons why this is undeniably the case:

1) Corporate governance – A 2016 survey by Goldsmiths that included responses from 1,530 non-executive directors and C-level executives in the United States, United Kingdom, Germany, Japan and Nordic countries showed that 90% of respondents admitted to not being able to read a cybersecurity report and were not prepared to respond to a major attack. Even more worrisome was the fact that over 40% of executives did not feel that cybersecurity or protection of customer data was their responsibility. Let that sink in for a moment. This is why ensuring that cybersecurity is a running topic at executive and board level meetings is imperative for organizations. Even more, greater ownership should be ascribed to all levels of personnel for cyber risks. Cybersecurity culture is a collective effort that starts at the top and works its way down through the organization.

2) Regulatory and legal compliance – Certain industries like banking, healthcare and energy are subjected to heavy regulatory burdens. And many of these regulations include requirements pertaining to privacy, data protection, and network security. In the US there are HIPAA, Gramm-Leach-Bliley, and FISMA. The EU has the NIS Directive and the GDPR. To address cross-border data flows between the EU and the US, there is Privacy Shield. To comply with this multitude of regulations, deep cyber and risk management capabilities must be embedded across organizations. Failure to do so can affect a company's ability to stay in business. Period.

3) Competitive advantage – Developing robust and effective internal controls to safeguard against cyber-attacks can equate to market leadership, brand strengthening, and product / service differentiation. For example, as more businesses look to AI, IoT and robotics to streamline processes and improve business performance, ensuring that these technologies are secure can increase revenues and drive bottom-line performance. In this respect, shareholders must not only expect cyber excellence, they should demand it.

4) Financial management – There is clearly a direct correlation between cyber-related risk events (e.g. reputation damage, business disruption, fines, etc.) and financial loss. The severity and impact of such risks can be mitigated by integrating business strategy with cybersecurity strategy. The importance here is even more pronounced given the global economic downturn and depressed profits being experienced by several businesses.

5) Public safety – An increasing number of companies are delivering products/services in the areas of smart grids, smart cities, automated public transit, power installations, autonomous vehicles, etc. Possessing core expertise in the alignment of cybersecurity and business operations will set these organizations apart in their respective market environments in terms of public safety. There are also distinct national security implications when we think of these technologies in the context of potential threats to human life.

6) Business development – In 2004, the global cybersecurity market was valued at $3.5 billion. In 2017, it is now estimated to be worth $120 billion. But this value is primarily based on the number of products and services delivered. And while there is huge growth potential within the existing paradigm, there is a massive economic opportunity in fostering a commercial ecosystem built on online trust. Take for example the growing popularity of global trust audit and scoring offerings. Increasingly, more and more organizations are developing solutions to combat the proliferation of fake news. As it relates to IoT, consortiums are being formed to fill the security gaps in product design (i.e. Existing markets can be strengthened through collaboration and coordination). And these are just a few examples of the emergent market for Trust-as-a-Service (TaaS).

7) Corporate social responsibility – There are numerous benefits to CSR programs, ranging from enhancing brand loyalty to securing and retaining investors to attracting/retaining engaged and productive employees. So along that vein, social responsibility investment in cyber-related areas such as child online protection, secure coding for women, hackathons and cybersecurity research is a savvy approach to cementing market position. As a result, companies can promote good security as a selling point for their products and services, create a pipeline for the best cybersecurity talent, and leverage their cyber-specific supply chains to build consumer trust.

8) Mergers & acquisitions – Businesses must recognize the importance of cybersecurity due diligence in the M&A process. Due to a low standard for due diligence, several corporations find out about major cyber incidents only after an acquisition deal has gone through. In actuality, serious cybersecurity issues around compliance, data breaches, poor security architecture or the absence of incident response processes should be uncovered before finalizing a transaction. In the case of Verizon's acquisition of Yahoo!, the final offer was cut by almost $400 million due to revelations about cybersecurity incidents. A 2016 survey by the NYSE indicated that over 50% of respondents regarded major security vulnerabilities as a 'show stopper' for a merger or acquisition.

Considering that end users are generally regarded as the weakest points in cyber defenses, logic dictates that cybersecurity should begin with the individual. Every single employee must be engaged and involved in defending the organization from online threats. It is they who most often access enterprise applications, networks and devices, and will undoubtedly serve as the first line of protection against hackers. Executives and board members are targeted due to their access to key digital assets; and because of the traditional fortification of the network perimeter, line workers are the focus of threat agents seeking to gain entry into the network or escalate their privileges to access sensitive information. Indeed, both executives and employees represent vectors to the same ultimate objective — the compromise of internal systems and access to critical data. Hence, development of an effective cybersecurity strategy must involve tight coupling of security practices with business operations to bolster an organization's overall security posture. The most damaging misstep organizations can make — and often do — is relegating this function to an understaffed and underfunded IT department.
Written by Niel HarperFollow CircleID on TwitterMore under: Cybercrime, Internet of Things, Security

The post 8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable appeared first on iGoldRush Domain News and Resources.

Continue reading