/ Most Viewed

Steven Bellovin Takes Aim at Cybersecurity Myths in New Book

Cybersecurity pioneer Steven Bellovin's new book strips away jargon and outdated online-safety advice, offering ordinary users practical guidance on passwords, phishing, privacy and digital habits in an era of constant cyber threats and increasingly sophisticated scams. more

The Illusion of Digital Sovereignty (Part III) - Collision, Geopolitical, Compute Concentration, Future Governance

Geopolitical fragmentation is colliding with the internet's distributed architecture, exposing how sovereign cloud concentration and AI infrastructure can weaken resilience, amplify strategic vulnerabilities, and challenge whether governance can preserve interoperability while managing dependency under stress. more

Recent Advancements in the Rights to Public Knowledge: Technical Standards

Recent court rulings in Europe and America are reshaping access to technical standards, weakening paywalls and strengthening the principle that publicly mandated knowledge belongs to citizens, regulators and increasingly AI systems that depend on machine-readable information. more

Facilitation Without Responsibility: ICANN and the Missing Warning Question - Part 1 of 3

An ICANN-backed African internet-governance initiative exposed a deeper institutional problem: whether global coordinators must warn when regional policy processes drift into RIR governance, before facilitation, silence and funding harden into implied legitimacy for contested reforms. more

UDRP Domain Disputes Surge on Back of Mega-Cases

A surge in massive cybersquatting disputes pushed UDRP domain-name cases sharply higher in early 2026, with two complaints alone accounting for more than a quarter of all disputed domains, according to a new report released by GigaLaw. more

AI-Driven Cyber Threats Are Growing, Google Warns

Google says cybercriminals and state-backed hackers are rapidly adopting generative AI to automate attacks, disguise malware, exploit vulnerabilities and spread disinformation, marking a shift from experimental use to industrial-scale cyber operations across the global threat landscape. more

Running-Code Primacy - The Patch Needed to Preserve the Internet’s Original Design

This essay argues that Internet governance has drifted from technical coordination into unaccountable institutional power, and proposes "Running-Code Primacy" as a post-RIR framework grounded in distributed validation, interoperability, and voluntary adoption rather than registry authority. more

DNS Abuse Is Stealing India’s Youth: Fake Domains and the Job-Seeking Trap

Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market. more

We’re Drowning in Data - A New Kind of Memory Could Change That

As AI devours ever more information, the world faces a costly data-storage crisis. Researchers are betting etched silica glass could preserve vast archives for centuries while consuming far less energy than today's hard drives and magnetic tapes. more

Inside Iran’s Shift From Internet Shutdowns to Tiered Connectivity

Iran's wartime internet restrictions transformed online access into a costly, unequal system, according to researcher Imad Payande, with black markets, selective connectivity and institutional privilege reshaping how citizens reached the global web. more

Internet Censorship Grows More Sophisticated, Warns OONI Co-Founder

Maria Xynou warns that internet censorship is becoming more sophisticated and less transparent as governments deploy targeted blocks, throttling and encrypted traffic interference, while OONI's crowdsourced measurements help researchers and human-rights groups expose restrictions and defend online freedoms worldwide. more

Universal Acceptance Day and the Long Arc of Multilingualism

Universal Acceptance Day 2026 marks progress toward a multilingual internet, as UNESCO and ICANN deepen cooperation. Yet unresolved implementation failures and weak registry stewardship still hinder truly inclusive digital access worldwide. more

Africa’s Data Sovereignty Challenge: Who Really Controls the Continent’s Digital Future?

As Africa digitises rapidly, control over data is emerging as a strategic contest. Foreign infrastructure dominance exposes economic and cybersecurity vulnerabilities, pushing governments to prioritise digital capability, regional cooperation, and stronger sovereignty over the systems powering the continent's future. more