/ Most Viewed

The Supreme Court Decides that Compatible Software is Still Legal

Back in the 1980s, everyone used the Lotus 1-2-3 spreadsheet on their PCs. In 1989, Borland released a competitor, Quattro Pro. It used the same menu commands as 1-2-3 so that users could import their 1-2-3 spreadsheets with keyboard macros. Lotus sued Borland, and after a loss in the district court, Borland won on appeal, arguing that the keyboard commands are a "method of operation" and not subject to copyright. Lotus appealed to the Supreme Court... more

Cuba Testing 3G Internet Access

ETECSA, Cuba's monopoly ISP, has been running free tests of their forthcoming mobile access. It seems that the latest test is over for now, but Andy Garcia (@Dancuba96) ran a speed test before it ended... ETECSA has not announced when commercial 3G service will commence, where it will be available at first and what it will cost, but the following image at the start of the @ETECSA_Cuba Twitter page suggests that service will begin soon they are serious about mobile #Internet access. more

US Election-Related Web Properties Prone to Fraud and Misinformation Due to Lack of Domain Security

The risks of fraud and disinformation in the U.S. election process have been hiding in plain sight. CSC's new research finds that a large majority of web domains closely linked to the campaign websites for Joe Biden and Donald Trump lack basic domain security protocols and are prone to domain spoofing tactics. This makes them a potential target for hackers looking to spread disinformation ahead of the election, and criminals who want to take advantage of voter intentions... more

Internet Society’s New Policy Brief Series Provides Concise Information On Critical Internet Issues

Have you ever wanted to quickly find out information on key Internet policy issues from an Internet Society perspective? Have you wished you could more easily understand topics such as net neutrality or Internet privacy? This year, the Internet Society has taken on a number of initiatives to help fill a need identified by our community to make Internet Governance easier to understand and to have more information available that can be used to inform policymakers and other stakeholders about key Internet issues. more

A Perfect Storm Brewing for European ccTLDs?

The European country code top-level domain (ccTLD) market is at a crossroads, facing a confluence of challenges that could reshape its trajectory in the coming years. From slowing growth and rising renewal prices to shifting user behaviour driven by AI, the market is undergoing profound changes. These trends suggest a potential decline in domain volumes and a shift in how domains are valued and used. Here's a closer look at the factors contributing to this "perfect storm" and what it means for the future of European ccTLDs. more

Network Outages Go Global

On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more

The Great Inevitable: From Broadband Internet to Cloud Application Access

Some inevitable changes are hard to see in prospect, yet are 'obvious' in retrospect. The next communications revolution is 'made for cloud' access. A colleague pointed me to a Forbes article "For Today's Telecoms Companies, Customer Experience Is Just As Important As Download Speeds". It was written by Huawei's global president of assurance and managed services. Well, I told you so! more

X-Force Report: Corporations Becoming No. 1 Security Threat to Their Own Customers

With the alarming increase in cyberattacks, criminals are literally turning businesses against their own customers in order to steal consumer's personal data, warns the latest annual X-Force Trend and Risk report from IBM. "The security industry puts a lot of effort into the technical evaluation of security threats, examining, sometimes at great length, the potential threat that each issue might present to corporations and consumers. Criminal attackers out for profit, however, have considerations that the security industry does not always take into account, such as monetization cost and overall profitability." more

European Commission on the Future of the Internet

The European Commission has just published a communication which describes the broad lines of its Internet policy in the coming years. Vint Cerf, on the Google Public Policy blog sees this as a very interesting vision. Indeed, it closely links the issue of openness of the Internet to several obvious and not-so-obvious factors. more

US Senators Move to Shield Undersea Internet Cables from Global Threats

A bipartisan Senate bill seeks to strengthen U.S. oversight and global coordination to protect undersea fiber-optic cables, vital infrastructure increasingly targeted by geopolitical adversaries, natural disasters, and cyber or physical sabotage. more

Artful Misrepresentations of UDRP Jurisprudence

The jurisprudence applied in adjudicating disputes between mark owners and domain name holders under the Uniform Domain Dispute Resolution Policy (UDRP) is essentially a system that has developed from the ground up; it is Panel-made law based on construing a simple set of propositions unchanged since the Internet Corporation for Assigned Names and Numbers (ICANN) implemented them in 1999. Its strength lies in its being a consensus-based rather than dictated jurisprudence. more

Widespread Compromised Routers Discovered With Altered DNS Configurations

A widespread compromise of consumer-grade small office/home office (SOHO) routers has been discovered by threat intelligence group Team Cymru. According to the report, "attackers are altering the DNS configuration on these devices in order to redirect victims DNS requests and subsequently replace the intended answers with IP addresses and domains controlled by the attackers, effectively conducting a Man-in-the-Middle attack." more

New Report About Internet Routing With MANRS

I find myself reading, frequently, about "interesting" exploits of IP routing. Recent history includes the redirection of Telegram traffic to Iran, Google traffic to China, and Cloudflare traffic to Nigeria -- and, per bgpstream.com, 64 events this month, 18 of them on one day. Is this expensive? You bet, both in money and in mindshare. Imagine the impact of discovering your company's name in the press. more

Trying to Predict Miguel Diaz-Canel’s Internet Policy

I recently gave a short talk that concluded with some speculation on the attitude of Miguel Diaz-Canel, who is expected to replace Raúl Castro next year, toward the Internet. I searched online and came up with three clues -- two talks he has given and one act. In May 2013, Diaz-Canel gave a speech at an educator's conference in which he anticipated today's preoccupation with fake news. He acknowledged the futility of trying to control information. more

UN Treaty Threatens Cybersecurity, Warns Google

As governments convene to discuss the UN Cybercrime Treaty, Google is urging caution, warning that the current draft could endanger online security and free expression.  more