The Internet, from The Economist

Syndicate content
RSS feed for topic: Internet
Updated: 16 hours 40 min ago

LinkedIn: Workers of the world, log in

14 August 2014 - 10:59am
UK Only Article:  standard article Issue:  Back to Iraq Fly Title:  LinkedIn Rubric:  The social network has already shaken up the way professionals are hired. Its ambitions go far beyond that Location:  MOUNTAIN VIEW, CALIFORNIA Main image:  20140816_WBD001_0.jpg A LOT of room in an office is a sign either of a blossoming company or a shrivelling one. Happily for Frank Han, the empty space at Kenandy, a cloud-computing company in Redwood City, a few miles south of San Francisco, indicates the former. As manager of “talent acquisition”, he is busy filling it. Since he joined Kenandy last October, Mr Han has recruited 32 of the nearly 80 staff. At some point when hiring half of them, he used LinkedIn. LinkedIn, based a bit farther south in Mountain View, had its origins in 2002 as a “network of people”, says Allen Blue, one of its founders. “We had in mind a tool for ourselves,” he explains, “and we were entrepreneurs.” People ...

Babbage: August 12th 2014: Probing questions

12 August 2014 - 2:28pm
THIS week our correspondents discuss the Rosetta space probe's triangular "orbit", and the reality of net neutrality Comment Expiry Date:  Wed, 2014-08-27

Daily chart: Comparing conflicts

12 August 2014 - 9:57am
The disparity of attention and casualties among global conflicts LARGE demonstrations in support of Gaza are taking place across Europe. Unease about the situation in Ukraine consumes people's minds. Though it has long been known that there is little correlation between the attention paid to conflicts and their level of casualties, the disparity is depressing. Since the start of the year, an estimated 30,000 people have died in Syria, about 20 times the number in Ukraine—though the latter gets far more attention in terms of Google searches. Likewise, the war in Iraq resulted in thousands of deaths so far this year. Yet it was largely out of mind until June, when the Islamic State offensive intensified, and again last week, as America announced air strikes. Searches for Gaza and Israel have waned over the past fortnight, as searches for Iraq and Syria picked up. And some conflicts get almost no attention at all. At least 2,500 have died in the Central African Republic this year, but Google searches for the African country (not shown) have been basically non-existent.   Comment Expiry Date:  Wed, 2014-08-27

The Economist explains: How a new type of "evercookie" tracks you online

6 August 2014 - 7:50pm
INTERNET firms want to gather as much information as possible about web users' browsing habits, so they can serve more accurately targeted (and hence more lucrative) advertisements. But consumers don't like being spied on. As a result, modern web browsers have built-in features to prevent some of the most common forms of tracking, in order to maintain users' privacy. That has not deterred marketers, who have come up with ever more inventive ways of keeping tabs on people's online behaviour. Their latest trick exploits web browsers' ability to draw elaborate graphics, and uses it to identify users. How does it work?The traditional approach to tracking involves sending a tracking code, stored in a small file called a "cookie", to a web browser when a website is first visited. (Economist.com, like many other sites, uses this approach.) On subsequent visits, the browser sends this code back to the website along with page requests. Modern browsers make it easy to disable such tracking, either by blocking the delivery of cookies altogether or erasing them when the browser window is closed. Marketers have therefore developed cleverer ways to store the tracking code using so-called "evercookies", which hide the code in various virtual nooks and crannies that exist in modern web browsers. If a user deletes a cookie, an evercookie script can then recreate it. The result is a ...

Commercial property: Stores of value

31 July 2014 - 11:00am
Issue:  Winning the battle, losing the war Fly Title:  Commercial property Rubric:  The rise of e-commerce has set off a boom in the market for warehouses Location:  NEW JERSEY Published:  20140802 Source:  The Economist Newspaper Version:  16 Historic ID:  VO4HQKA

Google and cyber-security: Zeroing in

15 July 2014 - 10:33pm
IN OUR special report on cyber-security in this week’s issue of The Economist, we highlighted the threat posed by so-called “zero-day vulnerabilities” in software. Spooks and cyber-criminals love to get their hands on these flaws because they are not yet widely known and so no “patch”, or fix, is available for them. Nefarious types can exploit zero-days to spy on, or steal from, folk using the software in question until such flaws are discovered. Some firms even deliberately go looking for vulnerabilities and then sell this insight to intelligence agencies.Google is fed up with this state of affairs. The company claims to have seen zero-days used to target human-rights activists and conduct industrial espionage. It has also been targeted by intelligence agencies keen to snoop on everything from web searches to e-mails. So its eagerness to crack down on zero-days is hardly surprising. On July 15th Google announced that it was setting up Project Zero, a team of security researchers dedicated to hunting down zero-days in popular software and bringing their existence to light. The trickiness with unearthing zero-days is how to report their existence. If a flaw is revealed before a patch is available, then plenty of crooks and spooks alerted to its existence could try to exploit it. Project Zero’s team says it will send reports of ...

A special report on cyber-security: Defending the digital frontier

10 July 2014 - 11:40am
COMPANIES, markets and countries are increasingly under attack from cyber-criminals, hacktivists and spies. They need to get much better at protecting themselves Comment Expiry Date:  Fri, 2014-07-25

Business: Digital disease control

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  Business Rubric:  Basic security hygiene goes a long way Main image:  20140712_SRD003_0.jpg SAFEGUARDING CYBER-SECURITY is a bit like trying to keep an infectious disease at bay. Nasty software can spread swiftly to large populations, so it has to be identified quickly and information passed on immediately to ensure that others can protect themselves. Ideally, organisations should avoid catching an infection in the first place—but that requires them to get better at basic security hygiene. The story of the hackers who hit the bull’s eye at Target is revealing. They are thought to have broken into the computers of a heating, ventilation and air-conditioning firm that was a supplier to Target and had access to login details for the retailer’s systems. Once inside, the hackers were able to install malware on Target’s point-of-sale system that captured credit- and debit-card details at tills before the data were ...

The internet of things: Home, hacked home

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  The internet of things Rubric:  The perils of connected devices Main image:  20140712_SRD004_0.jpg ONE NIGHT IN April a couple in Ohio was woken by the sound of a man shouting, “Wake up, baby!” When the husband went to investigate, he found the noise was coming from a web-connected camera they had set up to monitor their young daughter while she slept. As he entered her bedroom, the camera rotated to face him and a string of obscenities poured forth. The webcam was made by a company called Foscam, and last year a family in Houston had a similar experience with one of their products. After that episode, Foscam urged users to upgrade the software on their devices and to make sure they had changed the factory-issued password. The couple in Ohio had not done so. The problem arose even though Foscam had taken all the right steps in response to the initial breach, which shows how hard it is to protect devices hooked up ...

Cybercrime: Hackers Inc

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  Cybercrime Rubric:  Cyber-attackers have multiplied and become far more professional AT 2PM ON March 20th 2013 the hard drives of tens of thousands of computers in South Korea were suddenly wiped clean in a massive cyber-attack. The main targets were banks and news agencies. At first the assault looked like a case of cyber-vandalism. But as they probed deeper, the computer sleuths investigating it came to a different conclusion. The operation, which they dubbed “Dark Seoul”, had been carefully planned. The hackers had found their way into the targets’ systems a couple of months earlier and inserted the software needed to wipe drives. Just before the attack they added the code needed to trigger it. Looking at the methods the intruders used, the investigators from McAfee, a cyber-security firm, thought that the attack might have been carried out by a group of hackers known for targeting South Korean military information. But they could not be sure. Tracing the exact source of an ...

Market failures: Not my problem

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  Market failures Rubric:  Providing incentives for good behaviour Main image:  20140712_SRD005_0.jpg HEATHER ADKINS, THE head of Google’s security-incidents team, has what she calls a “monthly patch day”, when she updates the software running on all of the electronic devices in her home. If everybody were like Ms Adkins, cyber-security would be much less of a problem. But even with the best of intentions, people forget to update software, install antivirus programs and so on. The problem is that by weakening their own defences, they do not just make themselves more vulnerable to being hacked; they may also cause harm to other web users by making it possible, say, for an intruder surreptitiously to take over their device and use it to attack other computers. The same holds true in the corporate world. Target spent a fortune each year on cyber-security, but was attacked via a heating and air-conditioning supplier ...

Vulnerabilities: Zero-day game

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  Vulnerabilities Rubric:  Wielding a controversial cyber-weapon Main image:  20140712_SRD002_0.jpg “HOW DO YOU protect what you want to exploit?” asks Scott Charney, an executive at Microsoft. He highlights a dilemma. Intelligence agencies look for programming mistakes in software so they can use them to spy on terrorists and other targets. But if they leave open these security holes, known in tech jargon as “vulnerabilities”, they run the risk that hostile hackers will also find and exploit them. Academics, security researchers and teams from software firms unearth hundreds of vulnerabilities each year. One recent discovery was the Heartbleed bug, a flaw in a widely used encryption system. Software-makers encourage anyone who finds a flaw to let them know immediately so they can issue “patches” for their programs before hackers can take advantage of them. That is how most vulnerabilities are dealt with. Some firms ...

Remedies: Prevention is better than cure

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  Remedies Rubric:  More vigilance and better defences can make cyberspace a lot safer Main image:  20140712_SRD005_1.jpg CYBERSPACE WILL NEVER be completely secure. The threats posed by what Sir David Omand, an academic and former head of Britain’s GCHQ intelligence agency, calls “the cesspit of modernity”—online crime, espionage, sabotage and subversion—are not going to disappear. Nor is the temptation for governments to treat the internet as a new combat zone, alongside land, sea, air and space. In 1996 John Perry Barlow, a cyber-libertarian, issued a “Declaration of the Independence of Cyberspace” addressed to governments, insisting: “You have no moral right to rule us, nor do you possess any methods of enforcement we have true reason to fear.” He turned out to be wrong. Governments have shown in a variety of ways—from the theft of industrial secrets by Chinese spies to the mass surveillance conducted by Western ...

Logistics: The flow of things

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Don’t leave us this way Fly Title:  Logistics Rubric:  For an export superpower, China suffers from surprisingly inefficient logistics Location:  SHANGHAI AND SUZHOU Main image:  20140712_CNP002_0.jpg TWO examples of the infrastructure that has helped make China a mighty trading power can be found on the outskirts of Shanghai: Yangshan, the world’s busiest container port, and Pudong airport, the world’s third-biggest handler of air cargo. Radiating out across the country are more than 100,000km (62,000 miles) of expressways and a comparable length of railways. Given all this new infrastructure, you might expect China to have a world-class logistics industry, too. It does not.  Logistics covers transportation, warehousing and the management of goods. Its Chinese translation, wu liu, literally means “the flow of things”. But that flow within the country is costly and cumbersome. Much of ...

A special report on cyber-security: Defending the digital frontier

10 July 2014 - 10:59am
UK Only Article:  standard article Issue:  Prevention is better than cure Fly Title:  A special report on cyber-security Rubric:  Companies, markets and countries are increasingly under attack from cyber-criminals, hacktivists and spies. They need to get much better at protecting themselves, says Martin Giles Main image:  20140712_SRD001_0.jpg THE TERM “CYBERSPACE” was coined by William Gibson, a science-fiction writer. He first used it in a short story in 1982, and expanded on it a couple of years later in a novel, “Neuromancer”, whose main character, Henry Dorsett Case, is a troubled computer hacker and drug addict. In the book Mr Gibson describes cyberspace as “a consensual hallucination experienced daily by billions of legitimate operators” and “a graphic representation of data abstracted from the banks of every computer in the human system.” His literary creation turned out to be remarkably prescient. Cyberspace has become shorthand for the computing devices, networks, fibre-optic cables, wireless ...

Cyber-security and the NSA: Once more unto the breaches

10 July 2014 - 1:29am
AMERICA’s Congress has been struggling for years to come up with legislation to address cyber-security issues, without success. Now it is trying yet again. On July 8th a draft bill, known as the Cyber Information Sharing Act, or CISA, cleared the Senate’s intelligence committee and will now be debated by the full chamber. The proposed legislation is likely to face stiff opposition from privacy groups, who have already given warning about some of its provisions.We have been here before. In 2012 another cyber-security bill, the Cyber Information Sharing and Protection Act (CISPA), was heavily promoted by its supporters, but ended up being stymied because of concerns that it did not do enough to protect people’s privacy. Since then, Edward Snowden’s revelations about the mass surveillance activities of the National Security Agency (NSA) have made folk even warier of anything that could result in more information ending up in the hands of government.That is why CISA faces an uphill struggle. The bill has provisions that would, among other things, encourage the government to share more classified information about cyber-threats with private firms and give companies greater legal protection against potential lawsuits when sharing data about cyber-risks with government agencies.Swiftly circulating intelligence about hackers’ activities is a great way to make life harder for ...

Babbage: July 9th 2014: Jerks

9 July 2014 - 1:33pm
THIS week our correspondents discuss cyber security and “jerk tech”  Comment Expiry Date:  Thu, 2014-07-24

University of California and sharing businesses: Steer clear of peer-to-peer

30 June 2014 - 11:21am
THE e-mail was clear enough. Last Monday, Belinda Borden, the director of travel services for the enormous University of California (UC) system, wrote to faculty members warning them not to use new "sharing businesses" such as taxi services Uber and Lyft and the room-rental service Airbnb:Dear Colleagues,UCOP’s Office of General Counsel has determined that third party lodging and transportation services, commonly referred to as peer-to-peer or sharing businesses, should not be used because of concerns that these services are not fully regulated and do not protect users to the same extent as a commercially regulated business. As the market matures and these businesses evolve, the University may reconsider whether reimbursement of travel costs provided by peer-to-peer or sharing businesses will be allowed. Therefore, until further notice, please do not use services such as Uber, Lyft, Air B&B or any other similar business while traveling on or engaging in UC business.Predictably enough, Ms Borden's e-mail sparked a controversy. Airbnb and Uber publicly criticised the university's decision, and Gavin Newsom, California's lieutenant governor, penned a letter to UC chief Janet Napolitano complaining about the change. Now UC is backtracking—sort of. Ms Borden's e-mail "regrettably went out before the office of the UC president had completed its review of ...

Schumpeter: Hit me baby one more time

26 June 2014 - 10:58am
UK Only Article:  standard article Issue:  Creative destruction Fly Title:  Schumpeter Rubric:  Napster’s founders demonstrate the challenges of entrepreneurial second acts Main image:  20140628_WBD000_0.jpg SOON after Napster’s launch 15 years ago, in June 1999, the music-sharing service became America’s most talked-about firm, and one of the fastest-growing companies yet seen. Its teenage founders, Shawn Fanning and Sean Parker, were commissaries of cool. But Napster’s glory was short-lived. Record labels pummelled it with lawsuits, saying that its peer-to-peer file-sharing technology, which made it easy for people to pirate music, was as dangerous and illegal as a punk rocker’s drug habit. In 2001 a court ruled that Napster helped facilitate copyright infringement. The firm later filed for bankruptcy and its brand was sold. Having become the music industry’s Antichrists, Messrs Fanning and Parker have spent the past 15 years trying to rebrand themselves and launch new ventures, with decidedly ...

Digital remembrance: The colour purple

23 June 2014 - 10:05am
REBECCA MEYER was taken too soon, on her sixth birthday. Having survived rounds of treatment for cancer, the girl, one of Kathryn and Eric Meyer's three children, finally succumbed. She will be remembered through the colourful lifeblood of the web.The death of a child is always a tragedy, and people of good will try to make sense of it through whatever means they have. Her father, Mr Meyer, is beloved among web design and development circles both for his expertise with the arcana of Cascading Style Sheets (CSS) used for webpage layout and formatting and for the generosity, clarity and goodwill with which he shares what he knows. He has also been a force for common standards, working to keep CSS characteristics in sync across browsers made by different firms, which makes the job of designers and programmers much easier. (Mr Meyer is a friend of your correspondent's as well.)Mr Meyer has an engaged online presence. He was the one, for instance, to raise a hue and cry when a fellow web standards guru abruptly erased his presence across all websites. (Said person was fine, just tired of living in public.) Rebecca's diagnosis, treatment, struggle and passing played out through social media as Mr Meyer turned to his broader community for moral support for him and his family.Many of the Meyers' friends, acquaintances, colleagues and well-wishers struggled to find any ...