Remove story what-is-sinkholing
article thumbnail

Taking down Gooligan part 3 — monetization and clean-up

Elie

recounts the Gooligan origin story and offers an overview of how it works. This post provides an in-depth analysis of Gooligan monetization schemas and recounts how Google took it down with the help of external partners. first post. second one. second one. Here is a recording of the talk: You can also get the slides. but they are pretty bare.

Access 72
article thumbnail

Taking down Gooligan part 3 — monetization and clean-up

Elie

recounts the Gooligan origin story and offers an overview of how it works. This post provides an in-depth analysis of Gooligan monetization schemas and recounts how Google took it down with the help of external partners. first post. second one. second one. Here is a recording of the talk: You can also get the slides. but they are pretty bare.

Access 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data office success metrics: Inside Collibra’s data office

Collibra

In this forum, we’ve recently explored different aspects of achieving Data Intelligence: why forward-thinking companies need to create a Data Office , what kinds of ‘products’ might come out of that initiative, how data can play a critical role in guiding business decisions in uncertain times. . It’s the most recent twist on an old problem.

Analytics 105
article thumbnail

Weekly podcast: A recap of the top stories of 2017 and a look ahead to 2018

IT Governance

This week, we look back at the big news from last year, and consider what the next 12 months have in store. As it’s the first one, let’s have a brief recap of some of last year’s biggest stories, and then look ahead to what we can expect from the next 12 months. So, what can the average business learn from these stories?

article thumbnail

Router Vulnerability and the VPNFilter Botnet

Schneier on Security

The story behind this request is one of sophisticated malware and unsophisticated home-network security, and it's a harbinger of the sorts of pervasive threats ­ from nation-states, criminals and hackers ­ that we should expect in coming years. This is called "sinkholing," and serves to disrupt a critical part of this system.