// archives

Archive for December, 2016

How Alibaba deployed Big Data to combat China IPR pirates and counterfeiters

To understand how big a problem counterfeit and pirated goods represent to business, remember the number $461 billion. That’s the dollar amount that the Organization for Economic Cooperation and Development estimated for last year’s global trade in fake goods. It’s also right around the level of Sweden’s gross domestic product. It’s not just the high […]

IoT boom ‘prompts surge of security threats’

Companies and governments eager to harness the internet of things’ (IoT) enormous growth potential have rapidly produced millions of new devices that can be hijacked in service of distributed denial-of-service (DDoS) attacks, security specialists said Friday. DDoS attacks launch a flood of incoming messages to a system, essentially forcing it to shut down and deny […]

Obama to ‘block’ Chinese takeover of technology firm Aixtron on national security grounds

US President Barack Obama is poised to block a Chinese company from buying Germany’s Aixtron, people familiar with the matter said, which would mark only the third time in more than a quarter of a century that the White House has rejected an investment by an overseas buyer as a national security risk. The president […]

Tech Giants Push Back Against China’s New Cyber Security Bill

Tech companies are pushing back against China’s controversial new cyber security bill that requires companies to share proprietary source code with Beijing. According to the Wall Street Journal, under the new regulations, China will require software companies, network-equipment manufacturers and other technology companies to disclose their source codes—the building blocks of computer programs—in order to […]

Microsoft, Intel, IBM Push Back on China Cybersecurity Rules

Tough new Chinese cybersecurity rules are providing a rare, behind-the-scenes look at a regulatory skirmish between U.S. technology companies and Beijing. China is moving to require software companies, network-equipment makers and other technology suppliers to disclose their proprietary source code, the core intellectual property running their software, to prove their products can’t be compromised by […]