Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Monthly Archives: April 2024

FCC rule now requires internet service providers to display fees

“Broadband Labels are designed to provide clear, easy-to-understand, and accurate information about the cost and performance of high-speed internet services. The labels are modeled after the FDA nutrition labels and are intended to help consumers comparison shop for the internet service plan that will best meet their needs and budget. Internet service providers that offer… Continue Reading

Automated Large-Scale Analysis of Cookie Notice Compliance

USENIX Association Report (PDF) Analysing Cookie Notice Compliance – We show that 56.7% of cookie notices do not include an option to opt out of consent, that more than 65.4% of websites with an opt-out option collect users’ data despite explicit negative consent, and that 73.4% of websites do so even when users do not… Continue Reading

We were very wrong about birds

PopSci – A sticky piece of DNA is rewriting the story of avian evolution–and shaking up the family tree: “An enormous asteroid crashed into the Earth about 65 million years ago. While terrestrial dinosaurs like the famed Tyrannosaurus rex were wiped out, many avian animals really began to flourish. Considering that there are more than… Continue Reading

6 Ways to Identify Who an Unknown Caller Is

MakeUseOf: “Do you repeatedly receive unwanted calls from an unknown phone number? From vishing (voice phishing) attacks to random marketing calls, unexpected and unwanted calls are absolutely frustrating and a downright waste of time. However, if you receive multiple calls from the same unknown number, you may want to identify the caller so that you… Continue Reading

NIST Blames ‘Growing Backlog of Vulnerabilities’ Requiring Analysis on Lack of Support

Slashdot: “It’s the world’s most widely used vulnerability database, reports SC Magazine, offering standards-based data on CVSS severity scores, impacted software and platforms, contributing weaknesses, and links to patches and additional resources. But “there is a growing backlog of vulnerabilities” submitted to America’s National Vulnerability Database and “requiring analysis”, according to a new announcement from… Continue Reading