/ Most Viewed

How to Turn a Closed Generic gTLD Into a Restricted One

As the New gTLD Program has rolled out over the course of the past few years, the Internet Corporation for Assigned Names and Numbers (ICANN) has made a number of program changes along the way. One of these changes disallows closed, generic gTLD applications, such as Amazon's application for .BOOK. Now, applicants for closed generics must decide how to proceed: whether to open their generic strings to the public, limit registrations to a defined portion of the public, withdraw the application, or sell it. more

Audio Recording from the “Power, Privacy, and the Internet” Conference

On October 30 – 31, 2013, The New York Review of Books held a conference called "Power, Privacy, and the Internet," taking a look at the role of the Internet both as a vehicle of political and cultural dissent and, in the hands of the state, as a weapon of repression and control. The recordings from the event have recently been released where listeners can stream or download the audio. more

Collaboration: A Means to Boost Enterprise Network Protection

In an age where cyber threats and attacks have reached a point of ubiquity, managing your organization's network security single-handedly may no longer be sufficient. The increasing volume and sophistication of threats, not to mention the continuous advancement in attack tools and their perpetrators' skills and know-how, has led to concerns on whether potential targets can keep up. more

CFR Report: Reversing IANA Transition by Trump Administration Would Be a Grave Mistake

Council on Foreign Relations has released a brief today authored by Megan Stifel, former director for international cyber policy at the U.S. National Security Council in the Obama administration, urging Trump administration to not back away from the IANA transition and to instead invest in the multistakeholder process. more

Free the Fiber Now

In a previous blog post I mentioned that the FCC had taken away restrictions to allow broadband supplied by E-Rate funding to be used to provide free WiFi for the public. That's a good idea that will provide some relief for areas with little or no other broadband. But the announcement raises a more fundamental question - why was such a restriction in place to begin with? more

Cybercriminals Continuing to Exploit Human Nature, Increasing Reliance on Ransomware, Study Finds

Cybercriminals are continuing to exploit human nature and relying on familiar attack patterns such as phishing, and increase their reliance on ransomware, where data is encrypted and a ransom is demanded, according to Verizon 2016 Data Breach Investigations Report released today. more

IGF Call for Public Comments on the Definition of Multistakeholder Participation Mechanisms

Over the past weeks, communities gathering experts from government, business, Civil Society, and the academic and technical communities, have been working through open mailing lists and online virtual meetings on IGF Best Practices. The discussion was documented by independent experts that will feed into five 90 minute Forums in Istanbul and that will in turn report into a Best Practices Main Session. more

Facebook Introduces Open/R as a More Efficient Modular Routing Platform

Facebook has announced a new routing system aimed at solving fast-recovery challenges for its Terragraph network that brings high-speed internet connectivity to dense urban areas. more

European Data Breaches Have Resulted in Loss of 645 Million Records Since 2004

A first-time study of publically-reported data breaches in the 28 European Union member countries, plus Norway and Switzerland, conducted by the Central European University's Center for Media, Data and Society (CMDS) has found that between 2004 and 2014 the continent's organizations suffered 229 incidents covering 227 million personal records.  more

The Early History of Usenet, Part IX: Retrospective Thoughts

Usenet is 40 years old. Did we get it right, way back when? What could/should we have done differently, with the technology of the time and with what we should have known or could feasibly have learned? And what are the lessons for today? A few things were obviously right, even in retrospect. For the expected volume of communications and expected connectivity, a flooding algorithm was the only real choice. more

Experts Concerned Over Looming Security Risks of Ultrasonic Cross-Device Tracking

In the upcoming Black Hat London presentation, security researcher from University College London, Vasilios Mavroudis and colleagues are going to describe and demonstrate the practical security and privacy risks that arise with the adoption systems enabled with ultrasonic cross-device tracking (uXDT). more

When UDRP Consolidation Requests Go Too Far

Although including multiple domain names in a single UDRP complaint can be a very efficient way for a trademark owner to combat cybersquatting, doing so is not always appropriate. One particularly egregious example involves a case that originally included 77 domain names -- none of which the UDRP panel ordered transferred to the trademark owner, simply because consolidation against the multiple registrants of the domain names was improper. more

Lawful Access Bills Proposed for ISPs in Canada

Michael Geist writes: "The bills contain a three-pronged approach focused on information disclosure, mandated surveillance technologies, and new police powers. The first prong mandates the disclosure of Internet provider customer information without court oversight. Under current privacy laws, providers may voluntarily disclose customer information but are not required to do so. The new system would require the disclosure of customer name, address, phone number, email address, Internet protocol address, and a series of device identification numbers." more

IPv4 and Education: The Basics

An IP address is a unique identifier for a device on a network, including the internet. IP stands for Internet Protocol (IP) which is a set of rules (a protocol) for addressing and routing data so it can travel through networks and arrive at its intended destination. Hence, "address." Internet-connected devices such as computers and smartphones each have a unique IP address. more

FISMA Focus: Continuously Monitoring the Cyber-Levee

NIST's release of their initial public draft of SP 800-137, Guide for Continuous Monitoring of Information Systems and Organizations will create a set of challenges for the federal cybersecurity community. Agencies and contractors will need to shape the document through the multi-stage revision process while continuing to implement their own continuous monitoring measures. more