News Briefs

Latest

Defense Science Board Urges Obama to Take Immediate Cybersecurity Measures

According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders... Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek." more

Consumers Worldwide Getting Better Deals on Broadband Access, Says New Study

According to a report released today by market research company Point Topic, consumers worldwide are getting better deals on broadband. Out of the three main broadband technologies, DSL, Cable, and Fiber, DSL has seen the largest worldwide fall in average price for a subscription which dropped from $66.75 in first quarter of this year to $53.32 in third quarter. That is a 20% drop in the first 3 quarters of the year. In comparison average subscription prices for cable are down just over 12% and for different versions of fiber (often called FTTx) down by 6.5%. more

FCC Approves White Space for Broadband in Unanimous Vote

The Federal Communications Commission (FCC) today approved, in a 5-0 unanimous vote, the plan to open up unused, unlicensed portions of TV white space spectrum for wireless applications and devices. However, to prevent interference, FCC has also placed some "rigorous certification process" which device offered by a technology company for use on the white spaces will have to go through. more

Sinowal Trojan May Be One of the Worst Crimeware Ever Created

A sophisticated cybercrime group that has maintained an especially devious Trojan horse for nearly three years has stolen login credentials of close to 300,000 online bank accounts and almost as many credit cards during that time, according to reports released today by RSA FraudAction Research Lab. The spyware is called Sinowal Trojan, also known as Torpig and Mebroot. RSA reports that their findings are based on data collected on this Trojan over the course of almost three years -- including information regarding its design and its infrastructure. Findings indicate that this may be one of the most pervasive and advanced pieces of crimeware ever created by fraudsters, say RSA experts. more

ICANN Terminates EstDomains, Seeks Bulk Transfer of Customers

In follow up to reports on ICANN's termination of notorious domain name registrar, EstDomains due to fraudulent activities, the Internet oversight agency is now preparing to transfer domain names of its customers to other registrars... However the question asked by experts is whether any other registrar would have an interest in inheriting EstDomains questionable domain names. more

Open Root Server Network to Close

Alternate DNS root server, the Open Root Server Network (ORSN) is shutting down. The project which began almost six years ago, is set to close at midnight on the last day of 2008. The following is part of the official statement released for the closure: Since start of operation in 2002 ORSN was a political alternative to ICANN/IANA operated root server network. It was also well known for technical innovation by providing IPv6 support before it was introduced in the ICANN/IANA operated root servers..." more

ICANN Released Its Draft for New Top-Level Domains, 45 Day Comment Period Now Open

In follow up to its earlier announcement this year regarding the relaxation of rules for the introduction of new Top-Level Domains, the Internet Corporation for Assigned Names and Numbers (ICANN) yesterday released a draft version of the Applicant Guidebook for those interested in applying for a new generic Top-Level Domain (gTLD). Although application comes with a hefty entry fee of close to $200,000, the development of new gTLD introductions will be of particular interest to trademark owners as well as any other company involved with domain names. Among various issues, the guidebook aims at addressing concerns such as who would qualify for '.apple' or '.amazon' gTLDs. more

Photos of Google’s Latest $600 Million Data Center

Earlier this month, Google officially opened its new data center in South Carolina which was first reported during April of 2007 when the company announced its plans to invest $600 million in the project. This data center is one of the four new data center projects announced by Google last year with other locations being Lenoir, North Carolina; Council Bluffs, Iowa and Pryor, Oklahoma. more

Energy Industry Number One Target by Cyber Criminals, According to New Study

Web security company, ScanSafe reports that, in the past quarter, companies in the Energy industry faced the greatest risk of Web-based malware exposure, at a 196% heightened risk compared to other verticals. The Pharmaceutical and Chemicals industry faced the second highest risk of exposure at 192% followed by the Construction & Engineering industry at 150%. The Media and Publishing industry were also among those at highest risk, with a 129% heightened risk compared to other verticals. more

IT Security Guide: “Financial Impact of Cyber Risk” Released by ANSI and ISA

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) released today a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack. In 2004, the Congressional Research Service estimated the annual economic impact of cyber attacks on businesses -- which can come from internal networks, the Internet or other private or public systems -- to be more than $226 billion. In 2008, U.S. Department of Homeland Security Secretary Michael Chertoff named cyber risks one of the nation's top four priority security issues. more

$300 Million Annual Loss Due to Non-Cooperation in Fight Against Phishing

During a presentation today at the eCrime Researchers Summit in Atlanta, Georgia, security researchers revealed that average lifetime of malicious websites are often longer than they should be due to lack of communication and cooperation between security vendors. According to results, website lifetimes are extended by about 5 days when "take-down" companies -- often hired by Banks -- are unaware of the site. "On other occasions, the company learns about the site some time after it is first detected by someone else; and this extends the lifetimes by an average of 2 days," says Richard Clayton. more

Cyber Security Forecast for 2009: Data and Mobility Key Part of Emerging Threats

Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more

First Broad Internet Census Since 1982 Reveals Surprising Number of Unused IPv4 Addresses

In the upcoming Internet Measurement Conference being held next week in Vouliagmeni, Greece, a team of six researchers will be presenting a paper called "Census and Survey of the Visible Internet," based on a comprehensive census of more 2.8 billion allocated IP addresses on the Internet. The research is claimed to be the first comprehensive census of its kind in more than two decades. more

My Name is Vint Cerf, I’m a Scientist and I am Voting for Barack Obama

Vint Cerf, Google’s Chief Internet Evangelist who is also credited as the co-founder of the Internet, has endorsed U.S. presidential candidate Barack Obama in a YouTube video submitted to AVoteForScience channel. In the video, Cerf discusses the importance of Net Neutrality (NN) and the fact that Obama is the candidate that supports NN. The following excerpt is a portion of what Cerf says in the video... more

Largest Spam Gang Operation in the World Shutdown by U.S. and New Zealand Authorities

U.S. authorities announced today that they have shut down one of the largest spam operations in the world, an extensive network with ties to Australia, New Zealand, India, China and the United States. The group, dubbed 'HerbalKing' by spam fighting organizations, had been active as far back as 2005 and became notorious as the number one worst spam gang on the Internet for much of 2007 and 2008 according to Spamhaus, a non-profit anti-spam research group. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days