fbpx
  IN THE AGE of big data analytics, the proprietary algorithms web sites use to determine what data to display to visitors have the potential to illegally discriminate against users. This is particularly troublesome when it comes to employment and real estate sites, which could prevent users fr...
The future of the internet is at risk from multiple scenarios, and quick action is needed to protect it, says the Internet Governance Commission.The internet has reached a crossroads in its history, and concerted and immediate action is needed to preserve the openness, transparency, security and inc...
  Imagine a criminal breaks into your home but doesn't steal anything or cause any damage. Instead, they photograph your personal belongings and valuables and later that day hand-deliver a letter with those pictures and a message: "Pay me a large sum of cash now, and I will tell you how I got i...
  Darktrace, a U.K. cybersecurity firm that positions its software as the "human immune system" for networks, has raised $65 million in a funding round led by U.S. private equity giant KKR, the start-up said on Wednesday.Existing investor Summit Partners contributed while new investors TenEleve...
As the number of reported data breaches continues to blitz U.S. companies — over 6 million records exposed already this year, according to the Identity Theft Resource Center — IT budgets are ballooning to combat what corporations see as their greatest threat: faceless, sophisticated hackers from...
Finally ready to get off the grid? It's not quite as simple as it should be, but here are a few easy-to-follow steps that will at the very least point you in the right direction. If you're reading this, it's highly likely that your personal information is available to the public. And while you can n...
Islamic terrorists are arming themselves with the technical tools and expertise to attack the online systems underpinning Western companies and critical infrastructure, according to a new study from the Institute for Critical Infrastructure Technology. The goal of the report was to bring awareness t...
China’s powerful internet censorship body has further tightened its grip on online news reports by warning all news or social network websites against publishing news without proper verification, state media reports. The instruction, issued by the Cyberspace Administration of China, came only a fe...
Another day, another hack. At least, that's how it's starting to feel. People are getting hacked or becoming otherwise compromised in their digital lives at an alarmaing rate, and it seems as though that's not going to slow down any time soon. Just earlier this month, it was revealed that hackers ha...
Signs of improved intelligence communications   Most American counterterrorism, espionage and counterintelligence operations, from the Cold War to the Iraq War, are unknown to the public at large. But we know, implicitly, that the U.S. intelligence community, military and special operations for...
Last week, the world heard that the Singapore Government plans to restrict Internet access for all public servants from May next year. On the one hand, critics have argued that the policy will set Singapore back and that it contradicts our Smart Nation aspirations. On the other hand, cyber security ...
With its colossal acquisition of LinkedIn this morning, Microsoft gets an immediate, powerful asset for its software sales pitch: A social dataset of 400 million-plus users. That should fray nerves at Google, and raise pressure on it to respond with an acquisition of its own, one aimed at expanding ...
A major underground marketplace acting like an eBay for criminals is selling access to more than 70,000 compromised servers allowing buyers to carry out widespread cyberattacks around the world, security experts said on Wednesday. Researchers at Kaspersky Lab, a global computer security firm based i...
Under Europe's "Right to be Forgotten" law, citizens there can petition Internet search providers such as Google to remove search results linked to personal information that is negative or defamatory. In many cases, these links lead to information about accusations of criminal activity or financial ...
For the moment, at least, cyberterrorists have not harnessed the technology they would need to destroy Western civilization from a basement lab in some remote corner of the world.  
Although Director of National Intelligence James Clapper has said a “cyber-Armageddon” ...
Have you ever had your content stolen? If you have, I can relate. Several years ago during the early days of BKA Content, we had just finished up a comprehensive redesign of our company website. This effort took time, money, and the creative talents of several people who put their hearts and souls i...
It takes less than a minute to opt-out of Facebook's new ads system. Facebook member or not, the social networking giant will soon follow you across the web -- thanks to its new advertising strategy. From today, the billion-plus social network will serve its ads to account holders and non-users -- m...
  Most major PC makers are shipping their desktops and notebooks with pre-installed software, which researchers say is riddled with security vulnerabilities.   A highly-critical report by Duo Security released Tuesday said Acer, Asus, Dell, HP and Lenovo all ship with software that contain...
Is everyone’s website illegal? Your website consists of visible text and graphics, geared to the sighted reader. Its terms and conditions include legal disclaimers and limitations of liability, which, it explains, apply unless they are specifically prohibited by law. As a service to the public, yo...
INTERNET LAW Courts around the world are creating Internet law right now--a process that is both exciting and frightening to watch. Unlike other areas of commerce that can turn to historical traditions to help settle disputes and guide the development of the law, the law of the Internet has no histo...
The Internet serves not only as a breeding ground for extremism, but also offers myriad data streams which potentially hold great value to law enforcement. The report by the OII’s Ian Brown and Josh Cowls for the VOX-Pol project: Check the Web: Assessing the Ethics and Politics of Policing the Int...
Social media sites and privacy are somewhat inherently at odds. After all, the point of social media is to share your life with the world; the very opposite of maintaining your privacy. Still, there is a difference between sharing parts of your life and all of it. Thus, a number of legal lines have ...
Internet Law, or Cyberlaw as it is sometimes called, refers to the legal issues related to the use of the Internet. It is less a distinct field of law than a conglomeration of intellectual property law, contract law, privacy laws, and many other fields, and how they pertain to the use of the Interne...
A hacker handed over millions of stolen credentials for Google, Microsoft and Yahoo email accounts, as well as thousands for banking, manufacturing and retail, in exchange for researchers liking and voting up his social media page.   What’s the going rate for usernames and passwords of 272.3 ...
Website blocking has reduced online movie piracy and is playing a role increasing take-up of legitimate sources of content in the UK, according to new research unveiled in Sydney on Tuesday night. The new research revealed that court orders requiring the UK's largest ISPs to block 53 piracy sites, w...

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media