Before we begin, its worth mentioning that yes, yesssssssssssssssssssss, I did not have enough protection around my Gmail account. I’ve used Google Authenticator before, for my personal account and for various work emails, but I stopped using it at a certain point out of convenience. —Cody Brow @Medium
This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies’ stock, with a focus on the results relative to the performance of the firms’ peer industries, as represented through selected indices rather than the market as a whole. financial performance is considered over a range of dates from 3 days post-breach through 6 months post-breach, in order to provide a longer-term perspective on the impact of the breach announcement. —Russell Lange & Eric W. Burger @Journal of Information Privacy and Security
If it were not for the insatiable bandwidth needs of the twenty major hyperscalers and cloud builders, it is safe to say that the innovation necessary to get Ethernet switching and routing up to 200 Gb/sec or 400 Gb/sec might not have been done at the fast pace that the industry as been able to pull off. —Timothy Prickett Morgan @The Next Platform
A report from one of the largest documented surveys conducted on the ethical hacking community reveals some hackers are earning over 16 times that of full-time software engineers in their home country. The study had 1,698 respondents and conducted by HackerOne, a global hacker community platform, which has seen a 10-fold increase in its registered users in the past two years. —CircleID
This week, cybersecurity firm Check Point published its regular Global Threat Index. It shows that Coinhive, a piece of software that uses processing power on someone’s device in order to mine cryptocurrency, has become the most prevalent form of malware on the Internet. Another piece of cryptojacking malware, called Cryptoloot, is now the third most prevalent. —Jamie Condliffe @Technology Review
In cryptocurrency circles, calling something “centralized” is an insult. The epithet stems from Bitcoin creator Satoshi Nakamoto’s revelation: a monetary system doesn’t need a central authority, like a government, to work. That’s such a potent idea that it’s morphed into a battle among crypto-enthusiasts between good—that is, “decentralized”— currencies and evil ones, or anything with a whiff of “centralization,” that are assumed to threaten the utopian view of cryptocurrencies as the vehicle for a new financial world order. —Mike Orcutt @Technology Review
Alphabet Inc., the parent company of Google, said today it is in the process of rolling out a new service designed to help companies more quickly make sense of and act on the mountains of threat data produced each day by cybersecurity tools. —Krebs on Security
Big Tech is hiding in plain sight. Twenty years ago, no one had heard of either Facebook or Google, neither of which existed yet. For that matter, no one knew much about social media or search engines in general. Cell phones were still simply mobile, small, and expensive telephones. There was no concept of a phone as a handheld computer. Today, five companies — Amazon, Apple, Facebook, Microsoft, and Alphabet (Google’s parent company) — have a collective worth of more than $3 trillion. Yet such transnational companies remain mostly exempt from the sort of regulations and accountability faced by most other industries. —Victor David Hanson
At first glance, it seems incredible that the U.S. Supreme Court would have to take a case that hinges, in part, on whether Ireland is part of the United States. But it has, with argument to be held next month, and the outcome of United States v. Microsoft has important implications for today’s digital world, in which data crosses borders at the speed of light and cloud computing is an everyday tool of American business. —Ilya Shapiro @The Federalist
Black’s Law Dictionary defines it as “the extraterritorial operation of laws; that is, their operation upon persons, rights or jural relations, existing beyond the limits of the enacting state, but still amenable to its laws. The term is used to indicate jurisdiction exercised by a nation in other countries, by treaty…” Extraterritoriality is also the most significant emerging development today in the law shaping virtual network architectures and services that includes OTT and NFV-SDN. —Anthony Rutkowski @CircleID
Related