Worth Reading: Anatomy of a Long-Con Phish

Phishing is one of the oldest fraud techniques online. Phishers often utilize a spray-and-pray method to hit as many potential victims as possible. The aim of such an attack is quick profit via the harvesting of user login or banking credentials. Once the victim surrenders his/her valuable information, the phisher moves on, either to the next victim or a different campaign altogether —Chenxi Wang

Worth Reading: Google’s AMP, the Canonical Web, and the Importance of Web Standards

Have you ever clicked on a link after googling something, only to find that Google didn’t take you to the actual webpage but to some weird Google-fied version of it? Instead of the web address being the source of the article, it still says “google” in the address bar on your phone? —Alexis Hancock

Worth Reading: The New General and New Purpose in Computing

The term “general purpose” in regards to compute is an evolving one. What looked like general purpose in the past looks like a limited ASIC by today’s standards, and this is as true for GPUs and FPGAs as it is for CPUs. —Timothy Prickett Morgan

Worth Reading: Network Monitoring as a Service (NMaaS)

Monitoring networks and services is crucial to ensure their quality and security. As this can be a time consuming and monotonous process, there is a growing tendency and need to automate this. —Raquel Rugani Lage

Worth Reading: Netflix Studio Engineering Overview

Netflix is revolutionizing the way a modern studio operates. Our mission in Studio Engineering is to build a unified, global, and digital studio that powers the effective production of amazing content.

Worth Reading: Domain structure for SaaS products

While being involved in a couple of side-projects in the last months, all of the SaaS products, I had to discuss and choose the domain architecture.

Worth Reading: Data center chip startup Ampere to release more powerful processor

Ampere, the data center chip startup led by former Intel Corp executives and backed by Oracle Corp, on Tuesday announced a more powerful processor in its efforts to court cloud computing customers. —Stephen Nellis

Worth Reading: Wirediff

Surprisingly, debuggers haven’t been that useful for me as they are impractical to use most of the time. If you are debugging your client or server using breakpoints you end up making the debugged process unresponsive, which means timeouts on the other end of the connection. —Aurélien Aptel

Worth Reading: A DNS View of Lockdown

At NANOG 79 earlier this month Craig Labowitz from Nokia Deepfield presented on the impact on the COVID-19 pandemic on Internet use. —Geoff Huston

Worth Reading: From password to the network

Also known as ATP33, StoneDrill and Elfin, this group is widely linked to Iran, and has been performing espionage and destructive attacks targeting aerospace, defence, chemical, mining, and petrochemical companies for a number of years now. —Steve Ranger