Cybercrime

Cybercrime / Recently Commented

Good Internet Hygiene During the COVID-19 Pandemic

We are all aware of the steps for mitigating the spread of the novel coronavirus (COVID-19): Wash your hands; Practice social distancing; Report exposure.But these are not the only activities to practice right now. Cyber-criminals are taking advantage of this health crisis and the emotional upheaval it creates to perpetrate their crimes. Therefore, we also need to exercise good internet hygiene. In a time of crisis or tragedy, bad actors don't slow down; their efforts amplify. more

ICANN67 Round-Up

This past meeting of the Internet Corporation for Assigned Names and Numbers (ICANN), ICANN67, was intended to be held in person in Cancun, Mexico, but was actually the first meeting to be held entirely online and virtually. It was a well-managed affair with fewer sessions than the in-person meetings and less opportunity for the community to convene and meet as individuals. The last-minute change from an in-person to a virtual meeting impacted ICANN's ability to provide translation services for the full set of UN-supported languages, Arabic, Chinese, English, French, Russian, and Spanish. more

Will 5G Implementation Lead to an Increase in Ransomware Attacks?

5G has arrived and is poised to supercharge our lives with ultra-fast download speeds and better than ever connectivity. It may not be ready to replace WiFi just yet, but AT&T has already deployed 5G networks in various cities across the US. 5G tech was the hottest commodity at CES 2019. According to some estimates, 5G will bring $12 trillion into the global economy by 2035, connecting everything from our toasters to our pet's collars and a range of other IoT devices. more

When Proxy Services Enable Abuse

People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more

Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan Amid COVID-19

The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP). During the last epidemic in 2003, the SARS outbreak lasted for nine months – and with an infection rate that is increasing rapidly, this new coronavirus has the potential to cause prolonged periods of commercial disruption, and heavy reliance on BCPs. more

Predicting the Cost of Cryptocurrency Hacks in 2020

The last few years have proven to be a crucial moment for cryptocurrency security. The more cryptocurrency has risen in popularity, the more high profile security breaches have occurred, and the more key institutions have been targeted. The young cryptocurrency industry has always been brimming with opportunity, but with this comes risk, especially when there are lapses in security. more

Cyberspace Security in Africa – Where Do We Stand?

Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem, and moreover, it is home to the largest free trade area in the world, which is predicted to create an entirely new development path harnessing the potential of its resources and people. more

Why Domain Name Security Matters Most?

In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity journalist, reiterated the criticality of domain name security because the domain name "e-hawk.net" was stolen from the rightful owner using social engineering tactics targeting its domain name registrar. more

Doing More to Address Child Sexual Abuse Materials Online

For all of us at Public Interest Registry, working to remove child sexual abuse content from the Internet isn't just a part of our work; it's our moral duty. As stewards of the .ORG community, addressing the problem head on is the only option compatible with our values. Talking about Child Sexual Abuse Materials (CSAM) is challenging and uncomfortable. It's also far too important, and prevalent, of a problem to ignore. While it's impossible to know exact numbers, online CSAM is a major, rapidly growing crisis. more

The Digital Decade – A Look Ahead

As 2019 wrapped up, we took some time to reflect on some of the most impactful digital developments of the past decade and how they helped change our digital lives, including: the rise of mobile and tablet usage; the importance of mobile apps; the explosion of social media and online gaming; cloud computing; domain names, brand protection and the impact of GDP. Now that we've passed the New Year, it's time to look forward. more

The Digital Decade – A Look Back

With 2019 coming to a close, we're not just saying goodbye to the past 365 days, we're also saying goodbye to an entire decade. As we bid farewell to the 2010s, we're taking this opportunity to look back and reflect on the digital decade as well as consider what the future might have in store for us all. The past ten years were a whirlwind of change, with new advances in technology exploding onto the market at a faster pace than ever before. more

Microsoft Takes Legal Action Against North Korean Cybercrime Group, Takes Down 50 Domains

Microsoft has taken control of 50 domains used by a North Korean cybercrime group dubbed "Thallium" to steal information from users, including government employees, think tanks, university staff members, and those working on nuclear proliferation issues. more

U.N. Approves Resolution to Combat Cybercrime Despite Opposition From E.U., the U.S. and Others

The U.N. General Assembly has approved a resolution to start the process of drafting a new international treaty against cybercrime despite objections from the European Union, the United States and other countries. The Russian-drafted resolution received approval from a 193-member world body with a vote of 79-60 and 33 abstentions. more

Internet Reporting Hotlines Are Censoring Art as Child Sexual Abuse

This week United States Attorney-General William Barr cited the need to address child exploitation as one of the factors motivating a mooted review of law called CDA 230, which provides that Internet companies aren't responsible for what their users say or do online. There are many dimensions to the problem of child exploitation, ranging from inappropriate comments on Instagram photos to child grooming on Fortnite... more

Internet Governance and the Universal Declaration of Human Rights, Part 1: Foundations

One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more