Canadian human-rights activists and computer security researchers have released a report on the extensive surveillance system in China that monitors and archives text conversations that include politically charged words. The research group, called Information Warfare Monitor, is a joint project of The SecDev Group, and the Citizen Lab, at the Munk Centre for International Studies, University of Toronto. The following are introductory excerpts from the study... more
Kieren McCarthy reporting in the Register: "The US government has posted a step-by-step guide to how it authorizes changes to the internet's root zone -- the heart of the world's domain-name system. The 16-page slide deck published by the Department of Commerce's National Telecommunications and Information Administration (NTIA) sheds light on what has been a contentious and largely secret process for the past 15 years." more
Two Sudanese nationals have been indicted for allegedly leading Anonymous Sudan, a cybercriminal group responsible for over 35,000 Distributed Denial of Service (DDoS) attacks targeting critical infrastructure worldwide. more
ICANN has announced that Paul Mockapetris, inventor of the Domain Name System (DNS), has agreed to serve as Senior Security Advisor to the Generic Domains Division and its President, Akram Atallah. more
In a potentially damaging cybersecurity revelation, researchers from the cybersecurity company Eclypsium have identified a hidden mechanism in the firmware of motherboards manufactured by Taiwanese company Gigabyte. more
US Federal Communications Commission is proposing privacy rules that wireless companies claim could hurt their ability to compete with the likes of Facebook and Google. more
EURid and Leuven Statistics Research Centre have released the results of a study investigating websites under most popular top-level domains. more
The United States, along with key global partners, has formally committed to principles guiding the development of 6G technology, as announced by the White House. This move comes amidst a strategic contest to shape the future of wireless communication standards, driven by concerns over authoritarian regimes exerting greater control over the internet within their borders. more
Joly MacFie writes: Last October the NYC Department of Information Technology & Telecommunications (DoITT) issued a request for proposals for "services to obtain, manage, administer, maintain and market the geographic Top Domain name .nyc.". At ICANN's recent 37th meeting in Nairobi, consensus was reached on the "overarching" issue of intellectual property protection. This leaves only the issue of the final (4th) draft of the Applicants Guidebook, expected before the 38th meeting in Brussels in June 2010... more
The Federal Trade Commission (FTC) and Federal Communications Commission (FCC) have announced plans to coordinate efforts for online consumer protection following the adoption of the proposed 'Restoring Internet Freedom Order'. more
Computer scientists, engineers and journalists gathered today on the CERN particle physics lab in the suburbs of Geneva, Switzerland, to pay homage to the a 1989 proposal by Tim Berners-Lee that would later come to be the blueprint for the World Wide Web. In March 1989, Tim Berners-Lee submitted a proposal for an information management system to his boss, Mike Sendall. 'Vague, but exciting', were the words that Sendall wrote on the proposal, allowing Berners-Lee to continue... more
Three weeks have passed since reports of Cameroon blocking the internet in English-speaking parts of the country and residents say services have yet to be restored. more
Iran has announced the launch of its first ever national data network. The inauguration ceremony was held on Saturday by country's communications and information technology minister, Mahmoud Vaezi. more
A team of researchers have released a report detailing a new type of threat in which adjacent IoT devices, such as Internet-connected light bulbs, will infect each other with a worm that will spread explosively over large areas in a kind of nuclear chain reaction. more
A recent study suggests Rustock and Xarvester malware provided the most efficient spambot code, enabling individual zombie computers to send 600,000 spam messages each over a 24 hour period. "Over the past few years, botnets have revolutionized the spam industry and pushed spam volumes to epidemic proportions despite the best efforts of law enforcement and the computer security industry. Our intention was to better understand the origins of spam, and the malware that drives it," said Phil Hay, senior threat analyst, TRACElabs (a research arm of security company Marshal8e6)... more
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byWhoisXML API