/ Most Viewed

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

VoIP Security FUD

I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more

The Rise of ChatGPT and Its Impact on Cybersecurity

The emergence of ChatGPT, a powerful AI language model developed by OpenAI, has revolutionized the way developers approach coding tasks. With its ability to generate code snippets and even entire software programs, ChatGPT offers convenience and time-saving potential. more

A Glance Back at the Looking Glass: Will IP Really Take Over the World?

In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical technologies were just starting to come into their own, and all-optical switching was just beginning to be considered for large-scale deployment. What Hartley says of history holds true when looking back at what seems to be a former age: "The past is a foreign country; they do things differently there." more

Green Revolving Funds Can Help Fund Costs of Cloud Computing and R&E Networking

There have been some interesting new developments in university Green Revolving Funds (GRF) that I believe could be a significant revenue opportunity for cloud suppliers and R&E networks. In this age of severe financial constraints and cutbacks for universities, new revenue models are needed to sustain advanced cyber-infrastructure in support of research and education. more

Fiber in the Water Pipes

Fiber networks are getting a surprising new route: water pipes. An innovative technology promises faster, cheaper installations while avoiding traditional construction hurdles. However, concerns about water utility cooperation and repair challenges remain. This approach could revolutionize fiber deployment in municipal and greenfield communities, but its adoption hinges on proving its reliability and safety. more

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more

SBI, One of India’s Largest Banks, Switching Its Domain to Branded TLD, bank.sbi

The State Bank of India (SBI) has announced it will be switching its domain name from "sbi.co.in” to the branded "bank.sbi", according to various news sources. more

New Data on Domain Name Contact Availability and Privacy

Nearly 90% of the internet's generic top-level (gTLD) domain names do not have identifying contact information in the Registration Data Directory Services (RDDS) system, according to a report by Interisle Consulting Group. A key finding of the report is the rapid growth of registrar-provided proxy service offerings and the inclusion of these services for both new and existing registrations. more

Watch the Online Events Series on “Digital Citizenship and Bill of Rights”

DataPrivacyBR and the Internet Integrity Task Force, IITF, in collaboration with CircleID and IGF recently held 2 online events focusing on digital citizenship, governance, and a digital bill of rights and responsibilities. A diverse group of high-level presenters and speakers spanning all stakeholder groups, addressed questions such as: What are the foundational principles that define and protect the rights and responsibilities of digital citizenship? Do existing internet governance models take digital rights sufficiently into account? Are there alternatives to business models that are based on digital exploitation and servitude? Why do we need a digital Bill of Rights and Responsibilities and how can it be created? more

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more

Internet Politics: Developed vs Developing

It is not so convincing how the developed world looks at the rest of the hemisphere with the same attitude of equality and control. On one hand there are voices of equality where as in the other there is greed of power and control that lures them with an unending fight of power vs power in safeguarding their own survival. From the participation and development of policies to running the concept of any kind of technology platform, the sense of control and collaboration that catalyzes and leads the overall process. more

DK Hostmaster Wins Award for Transparency and Trust Online

The nonprofit Alliance for Safe Online Pharmacies (ASOP Global) presented its annual Internet Pharmacy Safety E-Commerce Leadership Award to .DK Hostmaster at the 2018 ICANN63 today in Barcelona, Spain. The domain name administrator for Denmark, DK Hostmaster, was selected for the award based on their commitment to ensuring citizen safety by maintaining transparent WHOIS data, proactively enforcing identity accuracy policies to increase consumer trust and safety online. more

Trump Relaxes U.S. Regulation to Launch Cyberattacks

President Donald Trump has reversed an Obama-era policy that set limits on how the United States deploys cyberattacks. more

FCC Proposes a ‘Third Way’ of Regulating Broadband Providers

Jared Newman reporting in PC World: "Wounded from a court decision that stopped the government from regulating Internet service providers, the Federal Communications Commission has announced a new way to gain some control over the broadband industry. The proposal would let the FCC treat Internet transmissions like telephone communications, entailing more oversight, but would prevent government control over Web services, applications and e-commerce sites." more