Cybersecurity |
Sponsored by |
|
A recent study by researchers at the Cooperative Association for Internet Data Analysis (CAIDA) at the San Diego Super Computer Center (SDSC) revealed that a staggering 98% of the global Internet queries to one of the main root servers, at the heart of the Internet, were unnecessary. This analysis was conducted on data collected October 4, 2002 from the 'F' root server located in Palo Alto, California.
The findings of the study were originally presented to the North American Network Operators' Group (NANOG) on October 2002 and later discussed with Richard A. Clarke, chairman of the President's Critical Infrastructure Protection Board and Special Advisor to the U.S. President for Cyber Space Security. more
Recently, I entered my domain name in a "WHOIS" database query to test the results of the database by using WHOIS on a number of domain name registrar websites. WHOIS is a database service that allows Internet users to look up a number of matters associated with domain names, including the full name of the owner of a domain name, the name of the domain name hosting service, the Internet Protocol or I.P. number(s) corresponding to the domain name, as well as personally identifying information on those who have registered domain names. I was astonished to find... more
A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust. more
The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more
ICANN is examining the widespread use of parked domains and zero-click redirection, seeking to understand how automated traffic routing and advertising practices affect transparency, consumer protection and trust in the global domain-name system. more
Security researchers have uncovered Kadnap malware infecting more than 14,000 routers worldwide, forming a resilient peer-to-peer botnet that exploits outdated edge devices and could enable covert communications, proxy traffic, and future cyber attacks. more
Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more
Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more
Generative AI has turned brand impersonation from a nuisance into an industrial-scale threat, eroding trust. As ICANN's 2026 round approaches, DotBrand domains promise a structural fix to spoofing that strategies failed to deliver in 2012. more
At Munich's twin security gatherings, leaders warned that cyber conflict, transatlantic rifts and weaponised AI are pushing the rules-based order into a perilous transition, where deterrence falters, norms erode and digital sovereignty trumps multistakeholder ideals. more
After quelling nationwide protests, Iran has intensified its use of digital surveillance, deploying phone tracking, facial recognition and online monitoring to identify, intimidate and detain dissenters through a vast state-controlled communications infrastructure. more
A six year study of Global 2000 firms finds progress on email authentication but worrying gaps elsewhere. Despite rising DMARC adoption, falling DNS redundancy and uneven regional uptake leave companies exposed to domain based attacks. more
ICANN invites proposals for its DNSSEC and Security Workshop at the ICANN85 Community Forum in March 2026, offering a platform for global experts to share insights on DNS, routing security, and emerging threats. more
As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more
Despite deep geopolitical divides, the WSIS+20 outcome document was adopted by consensus, preserving a multistakeholder vision for the digital future while deferring controversial issues to a time more conducive to progress. more