In June of 2016, the United Kingdom held an historic referendum and public vote that would change the course of the country’s future forever. With a simple 51.89% to 48.11% majority, the UK public voted to leave the European Union and thus Britain’s ...exit, now commonly referred to as “Brexit,” began.
Since that fateful decision, there have been some notable developments, including “Brexit remorse” (where exit supporters experience regret for their decision), and, in December, the European Court of Justice ruled that Britain had the power to revoke Article 50 and cancel Brexit in its entirety. At present, the UK is...Read More
In a welcome patch of good news for the cybersecurity community, on December 25, 2018, the Chinese Supreme People’s Court (“SPC”) highlighted five cybersecurity cases in its most recent release of Guiding Cases – the 20th such iteration of case law p...ublication from the Chinese government, including a landmark case on DNS hijacking.
Since November of 2010, the Chinese government has issued about 100 Guiding Cases, which calls attention to a carefully curated selection of legal opinions on important recent cases. In China, Guiding Cases serve dual purposes of establishing a controlling precedent for future cases in lower courts, as well...Read More
According to the latest report issued by the China Internet Network Information Center (CNNIC), China’s internet usage has passed a major milestone, with an online population exceeding 800 million.
That number represents more than the combined popula...tions of Japan, Russia, Mexico and the U.S. With 42% of global ecommerce now happening in China (compare that with 24% in the U.S.), brands servicing this market have a huge opportunity for growth.
That opportunity, however, doesn’t come free from online threats. A recent Harvard Business Review report indicated that 86% of the world’s counterfeit goods originate from China and Hong Kong, with many...Read More
This interview is part of an ongoing series created to help you get acquainted with the MarkMonitor team. Hailing from around the globe, our employees bring a diverse spectrum of industry skillsets to accomodate your online protection needs. We look ...forward to sharing more of these profiles with you throughout the year.
How long have you worked at MarkMonitor, and what positions have you held?
I have worked at MarkMonitor for 11 years and was a Sr. Domain Client Services Manager/Training Specialist before I came to my current position as a Domain Services Manager, specializing in domain brokering.
What’s a typical...Read More
From cryptocurrency schemes to counterfeit ploys, there’s no slowdown in sight for cybercrime.
Asia-based threats continue to surge. Counterfeit goods from China and Hong Kong combine to make up an estimated 86 percent of the world’s counterfeits, th...e value of which totals nearly $400 billion. A 2018 Internet Security Threat Report (ISTR), released by Symantec, indicates that IoT attacks saw a 600 percent increase in 2017, while coin-mining activity spiked 34,000 percent.
Watch these trends in the year ahead, and we’ll keep you up to speed as 2019 unfolds with whitepapers, webinars and events.
Keep your eye on the crypto-sphere