/ Most Viewed

ITU-T - Still Living in 1924

Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more

Turns out ICANN’s Beckstrom is an Inspirational Patron of the Tea Party

Friday's edition of National Public Radio's "On The Media" devoted attention to the rise of the Tea Party and its widespread use of the social media. In the report Ken Vogel of Politico noted that the movement drew inspiration from the book, "The Starfish and the Spider" co-authored by ICANN President, Rod Beckstrom. more

Are There Countries Whose Situations Worsened with the Arrival of the Internet?

Are there countries whose situations worsened with the arrival of the internet? I've been arguing that there are lots of examples of countries where technology diffusion has helped democratic institutions deepen. And there are several examples of countries where technology diffusion has been part of the story of rapid democratic transition. But there are no good examples of countries where technology diffusion has been high, and the dictators got nastier as a result. more

Google Launches Project to Track Encryption Efforts - Both Internally and at Other Popular Sites

Google launched today a new effort to track the progress of encryption efforts - both at Google and on other popular websites. Google hopes the project will hold the company and others accountable to encrypt so as to enhance web safety and security. more

Tips for Managing Your Company’s Shadow IT Issues

Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more

Internet Consolidation at EuroDIG 2019: Questions in Need of Answers

At EuroDIG 2019 a workshop was organised around the topic of consolidation on the Internet. It was organised around four angles: technique, competition, society and human rights and; future research. One thing became extremely clear: no one contested that consolidation is taking place nor that this already has and will have an impact on the Internet and consecutively on society. more

The Shadow of the Web

I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced that it would appear supernatural to folks living just a century ago, or less. I worry for the Internet While it has been a major disruptive force, it is also susceptible to the existing paradigm. more

Credit Card Breaches a Salutary Lesson for DNSSEC Adoption

Maintaining an 150 year old house requires two things, a lot of time and a lot of trips to the hardware store. Since the closest hardware store to my house is Home Depot, it is rare that a weekend passes without at least one trip to Home Depot. So now in the wake of the Home Depot data breach I am through no fault of my own in a situation where any or all of the bank cards I use regularly could be cancelled if the issuer decides they might be compromised. And this is not the first time this has happened to me this year. more

How Will Rural Chileans Use SpaceX Starlink?

The Chilean Undersecretary of Telecommunications (SUBTEL) has begun a year-long pilot study of SpaceX's Starlink satellite Internet service. I don't know how many test locations they are planning, but the first two have been selected. Last week I discussed the first, the John F. Kennedy school in Sotomó, an isolated town at 41.6° South on a fjord in Chile's Lake Region, and the second will be in Caleta Sierra on the coast about 1,200 miles north of Sotomó. SpaceX is also considering a European pilot study in Georgia and perhaps (hopefully) others. more

There are Reports of Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks, NGOs

In the wake of the 2016 United States Presidential Election, not even six hours after Donald Trump became the nation's President-Elect, an advanced persistent threat (APT) group launched a series of coordinated and well-planned spear phishing campaigns. more

INET DC, Weds, July 24: Surveillance, Cybersecurity and the Internet’s Future (Livestream available)

Are you concerned about the recent reports about government surveillance programs? Are you concerned about security and privacy online? If so, you may want to attend (in person or remotely) the INET Washington DC event happening on Wednesday, July 24, from 2:00 - 6:00 pm US Eastern time at George Washington University. Sponsored by the Internet Society and GWU's Cyber Security Policy and Research Institute, the event is free and open to the public and will also be streamed live on the Internet for those who cannot attend in person. more

ICANN TAS Window Closes - What’s Next for Applicants?

It's official. After more than six grueling years of work for ICANN and the wider community, the new Top-Level Domain (TLD) application process finally closed a few hours ago. ICANN's Chief Operating Officer later advised the community in a release that just over 1900 applications had been submitted in the TAS with one hour remaining before the system closed (final numbers will be released on reveal day). This number of applicants falls within most industry estimates and shows significant demand as expected from across the globe. more

Quo Vadis ICANN?

The short history of Internet Governance is full of errors, failures, and - mainly - omissions. Despite the shortcomings, we also must acknowledge the achievements of past and present internet governance efforts. In particular, ICANN and its stakeholder constituencies have delivered on the mandate of a stable, secure and resilient Internet. Working with the IANA, IAB and IETF, the operational functions of IP addresses, and the Protocol Assignment and DNS must be seen as an unqualified success. more

How to Maximise Registrations Through Effective Registrar Relationships

There are some surefire ways to get channel engagement and drive registrations, but doing what everyone else is doing is not going to cut it in the world of new TLDs. Successful Registrar engagement requires an investment of time far in advance of what some Registry Operators appear to be expecting, both in terms of ongoing relationship management as well as continually providing tools which make it easier for Registrars to sell your extension over other TLDs. more

Another One (Partially) Bites the Dust

Following in the footsteps of Lethic, Waledac and Mariposa, yet another botnet has been taken offline. Not completely, though, it was only a partial disconnect. The Zeus botnet, also known as Zbot, is a trojan password stealer that captures passwords and sends them to the attacker. more