A recent report from Specops Software reveals alarming security vulnerabilities within VPN password systems, highlighting over two million VPN passwords stolen by malware in the past year. more
In an earlier post, I looked at the use of the Internet by anti-government protesters last month and the government's attempt to block them. Now, a few weeks later, let's see how the Internet changed after my July 18 post. The protesters used messaging and social media services, which the government tried to block, and posted images and videos of protests around the island. more
A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more
InterConnect announces a second date for its "Master Class on Internet Governance" starting 17 – 21 November 2014. InterConnect provides the following information regarding the course. more
Ben Parr of Mashable reports: "The use of Twitter (Twitter) has been immense. #IranElection has been a top trending topic for days, as have terms like Iran, Tehran, Ahmadinejad, and Mousavi. But while there have been 10,000 to 50,000 tweets at any hour mentioning "Iran", it peaked yesterday at 221,744. This seems extreme, but it makes sense when you realize that it corresponds with when Twitter's downtime was rescheduled, which had major buzz the entire day." more
A recent study released today suggests 53 percent of critical infrastructure providers have experienced what they perceived as politically motivated cyber attacks. According to Symantec's 2010 Critical Information Infrastructure Protection (CIP) Survey, participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 during a period of five years to their businesses. more
Public Interest Registry (PIR), the nonprofit managing the .ORG domain, recently announced it now oversees 11 million registrations. Jon Nevett, PIR's CEO, attributes this growth to what he describes as a "responsible" expansion, emphasizing a focus on security and community support. more
Google is experimenting with new cryptography to future-proof Internet communications against quantum computers. Matt Braithwaite, Google Software Engineer in a blog post on Thursday wrote: "Quantum computers are a fundamentally different sort of computer that take advantage of aspects of quantum physics to solve certain sorts of problems dramatically faster than conventional computers can." more
Kevin Murphy reporting in Domain Incite: "ICANN CEO Fadi Chehade and a US ambassador today both talked up the multistakeholder model as a cure to concerns about PRISM and related surveillance programs. But the US warned against using the spying scandal to push internet governance into the hands of 'centralized intergovernmental control'... Chehade and Ambassador Danny Sepulveda, US coordinator for international communications and information policy, were speaking at the opening ceremony of the Internet Governance Forum in Bali, Indonesia." more
U.S. and Britain plan to conduct a test later this month to assess how regulators for the world's two biggest financial centers in New York and London would communicate in the event of a major cyberattack or broader IT problems, a spokesman for British government cybersecurity body CERT-UK said on Monday. more
The SEACOM submarine cable, completed in the past 24 hours, is the first modern submarine cable connecting to eastern Africa, and the first of an unprecedented wave of new cable projects on both the eastern and western coasts of Africa. Approximately USD2.4 billion in new submarine cable projects are scheduled for completion by the end of 2011. The plans for so many new cables reflect both Africa's lack of international communications infrastructure, and soaring capacity requirements. more
When you go to the doctor for a yearly checkup, do you think about health or insurance? You probably think about health, but the practice of going to the doctor for regular checkups began because of large life insurance companies in the United States. These companies began using statistical methods to make risk or to build actuarial tables they could use to set the premiums properly. Originally, life insurance companies relied on the "hunches" of their salesmen, combined with... more
Contrary to previous security reports suggesting compromised machines remain infected for 6 weeks, experts at Trend Micro say these estimates are far from accurate. In its recent blog post the company said: "During the analysis of approximately 100 million compromised IP addresses, we identified that half of all IP addresses were infected for at least 300 days. That percentage rises to eighty percent if the minimum time is reduced to a month." Additionally the study also indicates that while three quarter of the IP addresses were linked to consumer users, the remaining quarter belonged to enterprise users. more
ICANN has announced a list of over 40 diverse practitioners, subject matter experts, and thought leaders as members of the ICANN Strategy Panels to support development of the organization's strategic and operational plans. more
Whether you're a service provider or subscriber, a broken connection is an ugly situation. Operators need to shift resources to diagnose and fix the problem. Subscribers must find another way to get back online and continue with their business. And with the proliferation of cloud storage and Internet-based communication platforms, Internet connectivity is now a necessity for many. So when a disruption occurs, the angry calls are guaranteed. more