/ Most Commented

The Cyberthreats and Trends Enterprises Should Watch in 2016

Every year, Verisign iDefense Security Intelligence Services produces its Cyberthreats and Trends Report, which provides an overview of the key cybersecurity trends of the previous year and insight into how Verisign believes those trends will evolve. This report is designed to assist in informing cybersecurity and business operations teams of the critical cyberthreats and trends impacting their enterprises, helping them to anticipate key developments and more effectively triage attacks and allocate their limited resources. more

Large Volume of DNSSEC Amplification DDoS Observed, Akamai Reports

A dramatic increase in DNS reflection/amplification DDoS attacks abusing Domain Name System Security Extension (DNSSEC) configured domains have been observed in the past few months, according to a security bulletin released by Akamai’s Security Intelligence Response Team (SIRT). more

Beyond ‘Neutrality’: How to Reconnect Policy to Reality?

I have some bad news: the published literature on 'net neutrality' fails to grasp the stochastic nature of broadband and its implications. This means that the relationship of traffic management to QoE is universally misunderstood and/or misrepresented. As a result the whole policy process is being placed into opposition with nature! Nature isn't changing to accommodate the policy process. So the policy process has to change. more

Internet Society Responds to FBI vs Apple Encryption Debate

The Internet Society today expressed concern over the recent order from the United States District Court for the Central District of California requiring Apple to bypass or disable the auto-erase function on a seized iPhone and to enable the FBI to more effectively conduct a brute force attack on the device. more

Google Expands Google Ideas, Now Called “Jigsaw”

Google has expanded Google Ideas, its think tank project, to a technology incubator called Jigsaw, the company announced today. Jigsaw is tasked to tackle geopolitical challenges, countering violent extremism, censorship, and other political challenges through the use of technology, says Alphabet executive chairman, Eric Schmidt in post on Medium. more

Over $1 Billion in Payments Made on Venmo in January 2016

I was fascinated to read today that over $1 billion (USD) in payments were made on Venmo in January 2016. What is Venmo, you might ask? Essentially it is a mobile app (on both iOS and Android) that provides an easy payment system, in many ways like a "digital wallet" where you can securely reach in and pull out some cash to give to someone... more

DNS MythBusters - Straightening Out Common Misconceptions

Over the last couple of years, the networking industry has grown aware of the various security issues that could potentially have a huge impact on their operations. One of the topics that has raised in appeal is DNS security. Considering that much of the publicity around DNS is made by vendors trying to differentiate their solutions, there are many misconceptions out there that guide people into making poor investment in their infrastructure. more

GNU C Library Found Vulnerable to Rogue DNS Server Attacks

Security experts from Google's Project Zero along with researchers from Red Hat, have identified and helped patch a security flaw in the GNU C Library (glibc) that could be exploited via rogue DNS servers, reports Catalin Cimpanu from Softpedia. more

India’s Net Neutrality Win: Lessons for Developing Countries

On 8th February, 2015, Internet users celebrated news that the Telecom Regulatory Authority of India had passed regulation prohibiting ISPs from discriminating access to data services based on content". This directive follows similar developments in the U.S, E.U, Chile et al, and is a huge milestone in the fight for Net Neutrality: the principle that ISPs should treat all Internet traffic the same way. Meanwhile, Net Neutrality issues are not unique to India. more

US Senate Gives Final OK to Ban Internet Taxes

The U.S. Senate today passed legislation placing a permanent ban on states' taxing Internet access, sending the measure to President Obama for signing into law. more

Obama Proposes $19 Billion for Cybersecurity in Final Budget Plan

President Obama is seeking a 35 percent increase in cybersecurity funding in his final budget to boost the capability of the federal government to defend itself against cyberattacks, reports Ellen Nakashima in the Washington Post. more

Is the DMCA an Effective Way to Take Down Infringing Content?

As promised at an end-of-the-year (2015) announcement, the U.S. Copyright Office has now launched a comment submission process about the "safe harbor provisions" of the Digital Millennium Copyright Act (DMCA). The DMCA is often used by copyright owners to get infringing content - images, text, videos, music, even software - removed from problematic websites. more

EURid Gets .?? (Cyrillic for .eu)

EURid, who run the .eu registry, have finally been delegated .?? (Cyrillic for .eu). Punycode xn--e1a4c. One of the things that EURid is chartered to do under its contract to the European Commission was to get the extension in scripts other than Latin. EURid used ICANN's IDN ccTLD "Fast Track" process, though whether the process is truly "fast" or not is debatable, as it is still quite a long process. more

ICANN Names Göran Marby as New President and CEO

The Internet Corporation for Assigned Names and Numbers (ICANN) today released the much anticipated news regarding its new President and CEO. Göran Marby, currently Director-General of the Swedish Post and Telecom Authority (PTS), has been named ICANN's next President and CEO. Marby will succeed current President and CEO Fadi Chehadé whose term finishes on March 15, 2016. more

How to Choose a Cyber Threat Intelligence Provider

Throughout the course of my career I've been blessed to work with some of the most talented folks in the security and cyber threat intelligence (CTI) mission space to create a variety of different capabilities in the public, private and commercial sectors. Before I came to lead the Verisign iDefense team about five years ago, I had to evaluate external cyber-intelligence vendors to complement and expand the enterprise capabilities of my former organization. more