A study comparing best-of-breed computer security vendors suggests more than half of active malware and phishing threats on the Internet go undetected, with an average detection rate of 37% for malware and 42% for phishing. "Given the dynamic nature of today's online threats and the traditionally reactive approach taken by today's malware and phishing detection technology, conventional signature-based solutions are inherently at a disadvantage to keep up," said Panos Anastassiadis, CEO and Chairman of Cyveillance. "Because the majority of damage occurs during the first 24 hours of an attack, early detection of attacks is crucial." more
The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The digital domain is not limited to the technologies itself, but it has an important ethical dimension that encompasses the values, principles and instruments that inform and govern it. Created by humans for humans, our beliefs, cultural backgrounds, and biases are reflected in the codes we write and the algorithms we create. more
WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. more
The digital realm is bursting with data. The buzz words of today are "big data," and I know you've heard them. There's a reason why. It can boost business in extraordinary ways. But how? Let's first look at what exactly big data is: enormous collections of information developed either internally from the company itself or from a vast array of new media. At times, this data is so large, it cannot be analyzed using standard means of examination. more
New research indicates cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness. Conducted by the Ponemon Institute, the Second Annual Cost of Cyber Crime Study revealed that the median annualized cost of cybercrime incurred by a benchmark sample of organizations was $5.9 million per year, with a range of $1.5 million to $36.5 million each year per organization. This represents an increase of 56 percent from the median cost reported in the inaugural study published in July 2010. more
Since Ethos announced its investment in PIR last fall, Ethos has welcomed the opportunity to engage with .ORG registrants and users to hear their ideas and answer their questions. We listened to concerns expressed in the community, and we worked to address them. We announced a number of voluntary commitments that Ethos is prepared to make, and then we listened to feedback from the community on the scope of those commitments, as well as on the enforceability of those commitments. more
Iran's 2026 internet shutdown was not a glitch but a trial of digital sovereignty, revealing how easily connectivity can be weaponised to silence society, concentrate state power, and fracture the promise of a global internet. more
A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. more
The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more
A new nonprofit organization called the Open Web Foundation (OWF) launched today with a mission to be an independent non-profit dedicated to the development and protection of open, non-proprietary specifications for web technologies. "The Open Web needs Open Data, Open Date needs Open Specifications," is one of the statements used in today's opening presentation. With backing from some of the biggest companies including Google, MySpace, Facebook, and Yahoo, the foundation plans to serve as a placeholder for "all the legal dirty work that needs to happen in order for data portability to become a reality." more
As a product manager and engineer, I really enjoy attending the technology-oriented Cable-Tec Expo each year. It has a stronger technology focus than many other industry trade shows and it's always a good opportunity to talk to the engineering teams from all of the operators and vendors. more
Internet governance is shifting from participatory forums to security-driven mandates. As authority accelerates ahead of legitimacy, technical systems face growing instability and operators absorb the risks of politically motivated control. more
C-SPAN interviews professor Gene Spafford from Purdue University on the topic of cybersecurity and how the current Internet is a conduit for all types of "cybercrime". He also talks about the much discussed article "A New Internet?" by John Markoff in the February 14, 2009, New York Times in which he was quoted. The piece argued for a new type of Internet that is more secure with the trade-off of users giving up more of their anonymity. Professor Spafford talks about alternative solutions and he responded to questions via telephone calls and email. more
ICANN is preparing to search for its next CEO. In the past and again now, each of us has been asked for advice about applying for the job. We have willingly offered our perceptions of what the job requires. The general thrust of our advice is to alert the potential applicant about the complexities and demands of the job so they can assess for themselves whether they might be a viable candidate. Our comments in these situations are, of course, purely our own opinions, and are not connected to the official posture of ICANN. more
Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices. To combat this problem, device provisioning solutions include mechanisms to prevent loss -- but what do you really need to protect your bottom line? more