Articles by date
19 June 2018
Video Game Addiction Tries to Move From Basement to Doctor's Office (New York Times)
Video games work hard to hook players. Designers use predictive algorithms and principles of behavioral economics to keep fans engaged. When new games are reviewed, the most flattering accolade might be “I can’t put it down.”
18 June 2018
It’s taken 2 people 5 Board meetings, a period that could be anything from 5 to 8 months, from submitting their application to join auDA to acceptance, sources have told Domain Pulse. But now we have 955 member applications approved in one Board meeting held today. News of the approvals had begun to circulate ahead of today’s Board meeting as auDA gains a reputation of being a leaky boat.
Fears mount over WhatsApp's role in spreading fake news (The Observer)
Abijeet Nath and Nilotpal Das were driving back from a visit to a waterfall in the Indian province of Assam earlier this month when they stopped in a village to ask for directions. The two men were pulled out of their car and beaten to death by a mob who accused them of stealing children.
Protecting Google from defamation is worth seriously considering (The Conversation)
It has been a huge week for defamation law. Last Thursday, the NSW Government announced a push to reform Australia’s uniform defamation laws. It is calling for a “cyber-age reboot”. That proposal was backed by a “statutory review” of the NSW Defamation Act. At a meeting of the Council of Attorneys-General, the states and territories agreed to reconvene a working party to consider reform of equivalent statutes around Australia.
Why Hackers Aren't Afraid of Us (New York Times)
Ask finance ministers and central bankers around the world about their worst nightmare and the answer is almost always the same: Sometime soon the North Koreans or the Russians will improve on the two huge cyberattacks they pulled off last year. One temporarily crippled the British health care system and the other devastated Ukraine before rippling across the world, disrupting shipping and shutting factories — a billion-dollar cyberattack the White House called “the most destructive and costly in history.”
The voice-activated gadget in the corner of your bedroom suddenly laughs maniacally, and sends a recording of your pillow talk to a colleague. The clip of Peppa Pig your toddler is watching on YouTube unexpectedly descends into bloodletting and death. The social network you use to keep in touch with old school friends turns out to be influencing elections and fomenting coups.
15 June 2018
The growth in domain names was once upon a time not so many years ago on a sharp upward trajectory. But over the last couple of years that growth has slowed dramatically, with registrations growing 1.0% in the year to the end of the first quarter in 2018, or 3.2 million, to approximately 333.8 million domain name registrations across all top level domains, according to the latest Domain Name Industry Brief from Verisign for the first quarter of 2018. For the quarter, registrations grew approximately 1.4 million, or 0.4%, compared to the fourth quarter of 2017.
The Federal Court of Australia has ordered 2 companies to pay a combined fine of A$1.95 million (US$1.46m) for trying to lure Australian businesses into a fraudulent domain name renewal scheme. The court ordered Domain Corp Pty Ltd and Domain Name Agency Pty Ltd (also trading as Domain Name Register) pay the combined penalties for breaching the Australian Consumer Law.
An attempt to forcibly steal a domain name has led to an Iowa man being sentenced to 20 years in prison.
NZ’s Domain Name Commission and CERT To Share Domain Registration Information to Enhance Cyber Security
New Zealand’s Domain Name Commission and CERT NZ announced this week an agreement to share some domain registration information to help enhance cyber security in the land of the long white cloud.
14 June 2018
Allegations of branchstacking have surfaced ahead of the upcoming auDA Special General Meeting with supply class members rumoured to be encouraging staff to join along with what appears to be family members of the Chair Chris Leptos.
Google, Facebook Inc. and its apps WhatsApp and Instagram risk European Union privacy probes after being targeted among 19 cross-border complaints filed with regulators since tough new rules kicked in at the end of May.
13 June 2018
Three in 5 .men domain names are classified as “bad” according to the latest Spamhaus analysis of the world’s most abused TLDs, but only slightly worse than .loan, who have a "Badness Index" of 6.43 and 6.35 respectively.
12 June 2018
How Net Neutrality Actually Ended Long Before This Week (New York Times)
I remember the first time I ever heard about net neutrality. It was around 2004 or 2005, and when the full idea was explained to me — hey, let’s prevent phone and cable companies from influencing the content we see online — I was surprised there was even a fight about the idea.
11 June 2018
Goodbye to net neutrality. Hello to an even-bigger AT&T? (Washington Post)
Two pivotal developments this week could dramatically expand the power and footprint of major telecom companies, altering how Americans access everything from political news to “Game of Thrones” on the Internet.
In the bad old days of the cold war, western political and journalistic institutions practised an arcane pseudoscience called Kremlinology. Its goal was to try to infer what was going on in the collective mind of the Soviet Politburo. Its method was obsessively to note everything that could be publicly observed of the activities of this secretive cabal – who was sitting next to whom at the podium; which foreign visitors were granted an audience with which high official; who was in the receiving line for a visiting head of state; what editorials in Pravda (the official Communist party newspaper) might mean; and so on.
A decline in youth crime in New South Wales could be down to the popularity of social media and video streaming services, according to research from the Australian National University.
Underpaid and exhausted: the human cost of your Kindle (The Observer)
Five o’clock in the morning and the young woman’s eyelids are drooping. All night she has been removing spots of dust from Amazon smartspeakers with a toothbrush. Time seems to crawl. Now she is overwhelmed with exhaustion.
07 June 2018
Internet use by Americans increased in 2017, fueled by a rise among people with lower incomes, a government report viewed on Wednesday by Reuters found.
Almost every day, Kenneth Scalir takes a trip to the library or a cafe near his home in Sherman Oaks, California, to spend about an hour on his favourite site: Myspace.
5G: What is it good for? (Washington Post)
5G, or 5th generation mobile, is the next big leap in wireless communications. You’ve probably heard about it in commercials or seen it in headlines. But much of the discussion about the new technology has been focused on its engineering features, infrastructure requirements and public policy considerations. With technical buzzwords like “network slicing,” “beamforming,” and “multi-access edge computing,” it may be hard to really understand what 5G is all about and why we should care.
Technology companies such as Facebook and Google would be forced to give Australian security agencies access to encrypted data under legislation to be introduced by the Turnbull government.
05 June 2018
Facebook endured a new wave of criticism from lawmakers and regulators in the United States and Europe on Monday after disclosures that the social media giant had allowed dozens of hardware manufacturers access to its trove of personal user data.
04 June 2018
Trolls, fanboys and lurkers: improving online commenting culture (The Conversation)
... While they may seem benign compared with the sort of violent and vulgar comments that are synonymous with cyberbullying, they are examples of the uncivil and antisocial behaviour that plagues the internet.
Facebook Gave Device Makers Deep Access to Data on Users and Friends (New York Times)
As Facebook sought to become the world’s dominant social media service, it struck agreements allowing phone and other device makers access to vast amounts of its users’ personal information.