/ Most Viewed

Telecoms Development Booming in the French Pacific Territories

After the nuclear submarine debacle with France, political ties have been restored, and both France and Australia have agreed on further cooperation in the South Pacific, where France has several overseas territories. Also, here telecoms is a key issue. Such cooperation has become more urgent with the increased political interest of China in the region. more

A Look at the Security Collapse in the HTTPS Market

While in recent years, HTTPS has become integral part of protecting social, political, and economic activities online, widely reported security incidents -- such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed -- have exposed systemic security vulnerabilities of HTTPS to a global audience. more

In the 5G Era, at Least 20 Million U.S. Homes Will Rely on Wireless for Broadband

There now can be no doubt that fixed wireless, mostly 5G, will be a viable business in the right locations. Today's wireless has enormous capacity, enough to supply the broadband needs of a significant population. It's better than most DSL and a workable alternative to cable in many locations. Traffic demand is falling, with Cisco predicting the U.S. will fall to 31% growth in 2021. more

ICANN’s Registration Data Request Service: Open Working Session at ICANN79

Last November, ICANN launched a ticketing system for those interested in obtaining domain name registration data ("WHOIS"). Titled Registration Data Request Service, or RDRS, the portal aims to direct requests for WHOIS data to participating registrars, who then decide whether or not to disclose the data. more

For the First Time Wireless Carriers and Auto Makers Seek Common Ground on Wireless Standards

For the first time auto makers and wireless carriers are actually seeking common ground around the creation of the wireless new standard, writes Roger Lanctot, Associate Director in the Global Automotive Practice at Strategy Analytics. more

A Call to Action for an Inclusive WSIS+20 Review

Last week, GPD, together with 114 organisations and 57 individual experts from civil society, the technical community, industry and academia, presented a set of cross-stakeholder community recommendations aimed at operationalising the modalities for the twenty-year review of the WSIS (WSIS+20). The open letter responds to the adoption on 25 March of a UN General Assembly resolution on WSIS+20 modalities, advocating for a transparent and inclusive review process that meaningfully engages all relevant stakeholders. more

Ransomware Attacks Skyrocket: Median Cost Doubles to $26,000, Representing a Quarter of All Breaches, Reports Verizon

A report from Verizon Business's 16th annual Data Breach Investigations Report (DBIR) reveals a startling surge in the frequency and cost of cyberattacks. It analyzed 16,312 security incidents and 5,199 breaches, showing a sharp uptick in the cost of ransomware.  more

NTIA Chief Suggests “Cooling Off Periods” for ICANN Staff Before Moving On to Outside Jobs

In a statement delivered during the ICANN63 in Barcelona, David Redl,
Assistant Secretary of Commerce for Communications and Information (NTIA) said that while the community has greatly improved ICANN's accountability there is still room left for improvements. more

Congress Still Raising Concerns About ICANN’s New gTLD Program

Juliana Gruenwald reporting in the NationalJournal: "Nearly six months after the program was launched, key members of Congress are still raising concerns about a plan to introduce hundreds of new Internet addresses into the domain name systems, saying they want fresh assurances that the new strings will not harm trademark holders and that the public has adequate opportunity to comment. The latest salvo came on Tuesday from the top leaders of the House and Senate Judiciary committees..." more

Should You Pay Ransomware Demands?

Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more

Characterizing the Friction and Incompatibility Between IoC and AI

Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more

Over $31 Million Stolen by Hackers from Russian Central Bank

Hackers have stolen over 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank reported today. more

Chinese Hackers Exploit U.S. Telecom Systems, Eviction Efforts Lag

American officials have revealed an ongoing struggle to expel Chinese hackers from telecommunications networks, months after the espionage was first discovered. The campaign, attributed to a group called "Salt Typhoon," has infiltrated major telecom carriers, particularly in the Washington region. more

ICANN Cancels Jordan Meeting Due to Middle East Turmoil

Following reports by various sources yesterday, ICANN today has officially announced that it will not hold its Jun 20-24 Public Meeting in Amman, Jordan. ICANN's Board of Directors made the decision in light of recent developments in the Middle East. "The Board reluctantly made its decision after closely monitoring the rapidly changing developments affecting the Middle East. The decision reflects the Board’s view that regional developments could have a negative impact on attendance at the meeting," says ICANN's via a blog post today. more

Crypto Back Doors Are Still a Bad Idea

In the always interesting Lawfare blog, former FBI counsel Jim Baker in a piece called Rethinking Encryption reiterates his take on the encryption debates. There's a certain amount that makes me want to bang my head against the wall... But it's worth reading to remind us of what the other side is thinking, even with a lot of motivated reasoning that makes him conclude that Congress can pass some laws and the going dark problem will be solved. more