Many a teacher is trying to find out the best tool for communicating with pupils. Nowadays when most children are given a mobile phone in lower primary, the logical choice would be social networks and various messengers, be it Facebook, WhatsApp or Viber.
Vulnerability of SOHO routers becomes a topic of analyses by various security organizations almost every week. The 2017 Symantec report shows a year-on-year increase in the number of attacks on IoT devices by 600%. The most vulnerable are unsecured routers, which often make it possible to gain easy access to each connected device. The April’s alert from the official US-CERT also tells us of the growing number of these attacks and their severity.
Last year was not a good year for new generic domain names (new gTLDs). While a number of domain names became available for registration, the total number of new domain names decreased for the first time in its history. While there were 27,710,468 domain names registered at the beginning of the year 2018, only 23,823,948 saw the end of the year. Domain holders in the Czech Republic had a total of 23,245 new gTLDs registered, i.e. less than 0.1 %.
The time before the GDPR enters into force is relentlessly ticking away. Do not worry, in this post I am neither going to paint scary pictures of what companies will have to face, nor make a list of what you should forget about when this law is enacted; I will “just” focus on the processing of personal data of children, namely the Article 8 that regulates the conditions for granting consent with processing of the child’s personal data in connection with information society services.
Today’s children often learn to play a video on a tablet before they utter their first sentence, and game applications are often more popular among our little ones than toy blocks. When the parents find out that a cute hat for a virtual doll has deprived their account of an amount exceeding the price of some real fashion accessory, they start taking an interest in the security settings and in what their kids do on the computer.
Last week, thanks to the IETF (Internet Engineering Task Force) conference, Prague became the center of the Internet community. It was for the fourth time that the Czech Republic was given the honor to host this important meeting where RFC (Request for Comments) standards are created: Prague hosted it in March 2007 (68th IETF), 2011 (80th IETF) and July 2015 (93th IETF), with our Association having taken part in organizing the last three meetings.
In just a few days, all entrepreneurs in Slovakia will have active electronic mailboxes, which is the counterpart of our data boxes. Although the inspiration from the Czech system is obvious, there is at least one significant difference.
Last year’s success of our memory game (“pexeso”) during the education project in Ethiopia was repeated this year in another African country, São Tomé and Príncipe located directly on the equator in the middle of the Gulf of Guinea.
The end of September marked the ending of one of the so-called large-scale pilot projects of the European Commission – the STORK 2.0 (Secure idenTity acrOss boRders linKed 2.0) project, whose aim was to try out in practice the possibilities of cross-border recognition of electronic identities, which is something that should be compulsorily introduced since September 2018 in accordance with the eIDAS Regulation. For the Czech Republic, the realization of this project involved the Ministry of the Interior and CZ.NIC with its mojeID service, which has been chosen as the national identity (Czech only).
Last week Prague (and our Association together with the Brocade company) hosted the IETF 93 summit. You might have read about the functioning of this community at Root.cz, in the article (in Czech language only) by Ladislav Lhotka from our labs. The same server wrote (in Czech language only) also about Edward Snowden’s (virtual) participation in the summit.