/ Most Viewed

FCC Introduces Broadband Labels

The Federal Communications Commission has introduced new broadband labels in order to provide consumers of mobile and fixed broadband Internet service with an easy-to-understand information about price and performance. "These labels provide consumers clarity about the broadband service they are purchasing, not only helping them to make more informed choices but also preventing surprises when the first bill arrives," said Chairman Wheeler. more

Internet Society Submits Comments on IANA Stewardship Transition Proposal


Internet Society submitted its comments today in response to the Call for Public Comment by the IANA Stewardship Transition Coordination Group. "The Internet Society has consistently advocated for the globalization of the IANA functions, said President and CEO Kathryn Brown in a related post today. "We firmly believe that the global community is ready now to assume this important stewardship role and that a successful completion of this process is a critical step in providing additional confidence in the collaborative and multistakeholder Internet governance model." more

FBI Pushing Enforcement Action Against Money Mules

Brian Krebs reporting on the Krebs on Security blog: "The FBI's top anti-cyber crime official today said the agency is planning a law enforcement action against so-called 'money mules,' individuals willingly or unwittingly roped into helping organized computer crooks launder money stolen through online banking fraud." more

ICANN Needs to Tighten Director-Conflict Policies, Says CEO

ICANN needs to strengthen conflict-of-interest policies for its board of directors, said Rod Beckstrom, CEO, in his opening remarks during the organizations 43rd public meeting in San Jose, Costa Rica. "It is time to further tighten up the rules that have allowed perceived conflicts to exist within our board. ... ICANN must place commercial and financial interests in their appropriate context," said Beckstrom, who plans to step down in July. "How can it do this if all top leadership is from the very domain name industry it is supposed to coordinate independently?" more

WiFi QoE Assurance with TR-069 - Part 2: Optimizing a Single Access Point

As we have seen in the first installment of this series, TR-069 offers unprecedented visibility into the customer premises network to highlight devices beyond the gateway, and in the case of WiFi, the issues affecting service quality. Insights into the surrounding WIFI landscape alone provide ample data to provision the access point (AP) to operate in a part of the spectrum with the least amount of interference. more

Security Researchers Uncover Cyber Espionage Network Invloving 103 Countries

A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more

Recursive DNS and You

In the world of DNS, there are two types of DNS servers, 'recursion disabled' and 'recursion enabled'. Recursion disabled servers, when asked to resolve a name, will only answer for names that they are authoritative for. It will absolutely refuse to look up a name it does not have authority over and is ideal for when you don't want it to serve just any query. It isn't, however, very useful for domains you don't know about or have authority over... more

U.S. Slammed as Major Host for Cybercrime

While Russia and Ukraine are generally regarded as today's main cybercrime hubs, "a lot of their infrastructure is housed in the west, in the United States to be precise," writes Vincent Hanna of Spamhaus Project. "Without exception, all of the major security organizations on the Internet we know of agree that the 'Home' of cybercrime in the western world is a place known as Atrivo/Intercage. We ourselves have not come to this conclusion lightly but from many years of dealing with criminal operations hosted by Atrivo/Intercage, gangs of cybercriminals -- mostly Russian and East European but with several US online crime gangs as well -- whose activities always lead back to servers run by Atrivo/Intercage..." more

Using 42 GHz Spectrum for Broadband

The U.S. Federal Communications Commission circulated draft rules to govern the lower 42 GHz spectrum (between 42-42.5 GHz). This is within the range of spectrum referred to as millimeter wave spectrum. This is one of the more unusual FCC spectrum deliberations because this spectrum is totally empty -- there is nobody currently authorized by the FCC to use the spectrum band. The FCC is starting this deliberation with a clean slate. more

Internet 2008 in Numbers

In a blog post today, Royal Pingdom has posted a variety of statistical answers to questions for 2008 such as: How many websites were added? (A: 31.5 million) How many emails were sent? (A: 210 billion per day) How many blog posts were published? (A: 329 million) Other numbers include total number of Internet users in the world which, according to June 2008 data, is recorded at 1,463,632,361 with Asia having the highest percentage of users (39.5%) followed by Europe as the second largest (26.3%) and North America as the third (17%). Numbers have been gathered using a wide variety of sources from around the Web. more

Getting Serious About Satellite Texting

One of the more interesting telecom announcements at the CES electronics show in Vegas was the announcement from the partnership of Qualcomm and Iridium of plans to bring satellite texting capability to many more cell phones and other devices. We've already seen a few other announcements recently of the ability to make emergency text calls when out of reach of cell coverage. more

Cameras, DVRs Used for Massive Cyberattack on French Hosting Company and Others

"Hackers infect army of cameras, dvrs for massive internet attacks," reports Drew Fitzgerald in the Wall Street Journal. more

China Shows Positive Attitude Towards IANA Transition

Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more

Schneier: “Someone Is Learning How to Take down the Internet”

"Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet," wrote renowned security expert, Bruce Schneier, in a piece published in Lawfare. more

Microsoft Data Suggests 1 Out of Every 14 Downloads is Malware

Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more