/ Most Viewed

Cisco Warning Software Used in Hundreds of Its Products Vulnerable to Critical Security Flaw

The security flaw was discovered by the company's own security researchers in WikiLeaks' most recent disclosure of classified information, released last week. more

Cloud-Edge Collaboration: The Inevitable Future of AI Computing

Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more

What If IANA Transition Was Only a Mirage?

The U.S. government has long had a far-reaching control over the internet's technical center. What will happen now when ICANN's Board puts together a proposal on how to transfer responsibility for certain key functions within the domain name system to the internet community? Last week, ICANN had its 55th conference in Marrakech. The most important result of the meeting is that all parts of the so-called internet community approved that ICANN's Board will send a proposal to the U.S. National Telecommunications and Information Administration (NTIA) which suggests how to transfer responsibility for certain key functions within the domain name system to the internet community... more

EU and US Carry Out First Joint Cyber Security Exercise

The first joint cyber security exercise between the EU and US is being held today in Brussels, with the support of the EU's cyber security Agency ENISA and the US Department of Homeland Security. The day-long table-top exercise, named "Cyber Atlantic 2011", is using simulated cyber-crisis scenarios to explore how the EU and US would engage each other and cooperate in the event of cyber-attacks on their critical information infrastructures. more

The Trade War for Undersea Fiber

A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more

Second Round of Initial Evaluations for New gTLDs

Mary Iqbal writes to report that ICANN has released the second round of Initial Evaluation Results on March 29. ICANN is currently reviewing new gTLD applications at a rate of 30 applications per week and has plans to increase that to 100 per week. more

The History of Broadband Price Competition

It's sometimes easy to forget that the broadband business is just over twenty-five years old. The telephone companies had a monopoly on copper-based technologies until Congress passed the Telecommunication Act of 1996, which forced the big telephone companies to allow competition for copper-based broadband services. more

Google Releases a One-Stop Reference Source to Browser Security

Today via its Online Security Blog, Google announced the release of its Browser Security Handbook aimed at providing web application developers, browser engineers, and information security researchers a "one-stop reference" to critical security attributes of modern web browsers. "Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities," says the introduction to the 60-page document. more

Nigerian Scammer, Ringleader of International Criminal Network Arrested

The 40-year-old Nigerian national, ringleader of a global network believed to be behind scams totalling more than USD $60 million has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial Crime Commission (EFCC). more

New York’s Department of Financial Services Issues Cybersecurity Proposal

New York state is proposing new rules requiring banks and insurance companies to establish cybersecurity programs and designate an internal cybersecurity officer. more

Survey Finds “Complexity” as Most Common Challenge in Deploying DNSSEC

According to a recent survey conducted by the European Network and Information Security Agency (ENISA), 78% of service providers in Europe have plans to deploy DNSSEC within the next 3 years. On the other hand, the study also found 22% have no plans to deploy DNSSEC in the next 3 years. more

Building a Trusted Internet Starts with Hosting Providers

The Secure Hosting Alliance has introduced a certification programme to establish clear, verifiable standards for internet hosting providers, aiming to improve accountability, boost transparency, and strengthen the trust that underpins global online infrastructure. more

Internet Capacity Is Keeping Pace With Traffic Growth, Says Research Firm

According to new data from TeleGeography research group, international Internet traffic grew 53% between mid-2007 and mid-2008, down from 61% the preceding year. Traffic growth between the US and Latin America was especially fast, surging 112%. In contrast, traffic on internet backbones between major cities in the relatively more mature US market rose a modest 47%. For the second consecutive year, according to the study, total international Internet capacity grew faster than total Internet traffic, leading to lower utilization levels on many internet backbones. Between 2007 and 2008, average traffic utilization levels decreased from 31% to 29%... more

Sophisticated Maleware Found Aimed to Target Energy Companies

"The threat uses sophisticated techniques to evade detection and prepares the ground for more malware components," Lucian Constantin reporting in CIO: "Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies." more

Survey Says Internet Won’t Make Us Stupid

Or at least majority of 895 technology stakeholders' and critics' that were recently surveyed by the Pew Research Center's Internet & American Life Project and Elon University's Imagining the Internet Center. Some of the quantitative results from the expert group include the following... more