Reporting further on the recent Bodog.com domain name seizure case based on gambling charges, Michael Geist writes: "In the Bodog.com case, U.S. officials targeted a site with limited connections to the country as the site had licensed out the bodog.com domain name in 2006 and stopped accepting U.S. bettors late last year. The legal issues surrounding its operations will be played out in court, but the manner in which the bodog.com name was seized could have a lasting impact on Internet governance." more
Number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. While most malware-generated traffic passing through most channels used for communicating with botnets (such as TCP, IRC, HTTP or Twitter feeds and Facebook walls) can be detected and blocked, it's not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow. more
During the Mobile World Congress 2012, Google's executive chairman Eric Schmidt, today warned against United Nations' treaty aimed at bringing more Internet regulation. "That would be a disaster... To some, the openness and interoperability is one of the greatest achievements of mankind in our lifetime. Do not give that up easily. You will regret it. You will hate it, because all of a sudden all that freedom, all that flexibility, you'll find it shipped away for one good reason after another." more
Brian Krebs reporting in Krebs on Security: "Millions of computers infected with the stealthy and tenacious DNSChanger Trojan may be spared a planned disconnection from the Internet early next month if a New York court approves a new request by the U.S. government. Meanwhile, six men accused of managing and profiting from the huge collection of hacked PCs are expected to soon be extradited from their native Estonia to face charges in the United States." more
McDowell, commissioner of the Federal Communications Commission, in an op-ed in the Wall Street Journal writes: "On Feb. 27, a diplomatic process will begin in Geneva that could result in a new treaty giving the United Nations unprecedented powers over the Internet. Dozens of countries, including Russia and China, are pushing hard to reach this goal by year's end. As Russian Prime Minister Vladimir Putin said last June, his goal and that of his allies is to establish "international control over the Internet" through the International Telecommunication Union (ITU), a treaty-based organization under U.N. auspices." more
Google reports that its "experimental" public DNS service launched in December of 2009 has now passed 70 billion requests a day and no longer considered experimental. From the announcement: "Google Public DNS has become particularly popular for our users internationally. Today, about 70 percent of its traffic comes from outside the U.S. We’ve maintained our strong presence in North America, South America and Europe, and beefed up our presence in Asia. We've also added entirely new access points to parts of the world where we previously didn't have Google Public DNS servers, including Australia, India, Japan and Nigeria." more
A Canadian law expected to be introduced next week could greatly assist law enforcement authorities in the country to access date revealing internet-user habits and personal information. Privacy watchdogs caution if the so-called Lawful Access law is passed, it would give police access to webbrowsing history and sensitive personal information, and would grant greater permission to track the cellular phones of suspects -- much of it without the requirement of a warrant. more
Iran's nuclear facilities are immune to cyber attack a senior Iranian military official has claimed today according to various reports. "Gholam Reza Jalali, who heads an Iranian military unit in charge of combatting sabotage, was quoted Monday by the official IRNA news agency as saying that Iran and its nuclear facilities possess the technology and knowledge to deal with malicious software." more
European Union antitrust regulators today approved Google's acquisition of the U.S. cellphone maker Motorola Mobility without conditions, but added a stern warning: Play fair in markets for smartphones and tablet computers, or face tough sanctions. The $12.5 billion deal represents Google's first foray into hardware. more
The Supreme Court of Canada has ruled that Internet providers are not broadcasters for the purposes of the Broadcasting Act when they simply transmit content to subscribers, reports Michael Geist. The court noted... more
A new study reveals close to 466,000 jobs have been created in the "App Economy" in United States -- up from zero in 2007. The total number of Apps Economy jobs includes jobs at 'pure' app firms such as Zynga as well as app-related jobs at large companies such as Electronic Arts, Amazon, and AT&T, as well as app 'infrastructure' jobs at core firms such as Google, Apple, and Facebook. In addition, the App Economy total includes employment spillovers to the rest of the economy. more
Global internet usage through mobile devices, has almost doubled to 8.5% in January 2012 from 4.3% last year according to a new report from web analytics StatCounter. While this stat excludes tablets, firm's research arm highlights the increasing use of mobile devices to access the internet with market share doubling year on year since 2009. Nokia leads worldwide, most probably driven by its dominance in India. Apple is second globally but leads the US and UK markets. In the UK RIM is second only to Apple. more
"Facebook reported in its SEC filing that it owns 'network equipment' valued at $1.016 billion at the close of 2011," reports Rich Miller of Data Center Knowledge. "The number reflects the expense of rapidly building a massive Internet infrastructure, including Facebook's shift from buying vendor gear and leasing data centers to building its own servers, racks and custom data centers." more
More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows," reports Brian Krebs. more
"Internet protocols simply aren't adequate for the changes in hardware and network use that will come up in a decade or so," says Professor Dave Farber who was recently interviewed by Andy Oram. "Dave predicts that computers will be equipped with optical connections instead of pins for networking, and the volume of data transmitted will overwhelm routers, which at best have mixed optical/electrical switching," writes Oram. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix