/ Most Viewed

Cybercriminals Continuing to Exploit Human Nature, Increasing Reliance on Ransomware, Study Finds

Cybercriminals are continuing to exploit human nature and relying on familiar attack patterns such as phishing, and increase their reliance on ransomware, where data is encrypted and a ransom is demanded, according to Verizon 2016 Data Breach Investigations Report released today. more

SpaceX Proposes a Million More Satellites on Paper

SpaceX has filed a plan to place more than a million satellites in low Earth orbit, recasting data centres as spaceborne infrastructure while testing regulators, safety, competition and the line between vision and paper ambition. more

European Data Breaches Have Resulted in Loss of 645 Million Records Since 2004

A first-time study of publically-reported data breaches in the 28 European Union member countries, plus Norway and Switzerland, conducted by the Central European University's Center for Media, Data and Society (CMDS) has found that between 2004 and 2014 the continent's organizations suffered 229 incidents covering 227 million personal records.  more

Senate Bill to Reverse FCC Decision to Repeal Net Neutrality Received Its 30th Co-Sponsor

A Senate bill that would reverse the Federal Communications Commission's (FCC) decision to repeal Net Neutrality received its 30th co-sponsor today, ensuring it will receive a vote on the Senate floor. more

8 Facts About 3-Member Panels in UDRP Cases

Proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP) can be heard by either a one- or three-member panel. Here are eight important facts that every complainant (trademark owner) and respondent (domain name registrant) should consider when deciding whether to select one or three members... Either party - complainant or respondent - has an opportunity to select a three-member panel... more

Internet Society Seeks Nominations for 2017 Board of Trustees

Are you passionate about preserving the global, open Internet? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Internet Society serves a pivotal role in the world as a leader on Internet policy, technical, economic, and social matters, and as the organizational home of the Internet Engineering Task Force (IETF). more

Net Neutrality Advocates Planning Two Days of Protest in Washington DC

A coalition of activists and consumer groups are planning to gather in Washington, DC to meet directly with the members of Congress, which is said to be the "most effective way to influence their positions and counter the power of telecom lobbyists and campaign contributions." more

Google Offers Free DDoS Protection for News Sites

Google has announced its first initiative out of Jigsaw which is the expansion of its experimental service, Project Shield. Google is offering Project Shield as a free service leveraging Google technology to protect news and free expression sites from DDoS attacks on the web. more

Automated Web Application Attacks Can Peak at 25,000 an Hour

Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to the newly released Imperva Web Application Attack Report. Report also notes that when websites came under automated attack they received up to 25,000 attacks in one hour, or 7 attacks every second. more

Lawful Access Bills Proposed for ISPs in Canada

Michael Geist writes: "The bills contain a three-pronged approach focused on information disclosure, mandated surveillance technologies, and new police powers. The first prong mandates the disclosure of Internet provider customer information without court oversight. Under current privacy laws, providers may voluntarily disclose customer information but are not required to do so. The new system would require the disclosure of customer name, address, phone number, email address, Internet protocol address, and a series of device identification numbers." more

Rising Ransomware Threats and a Record-Breaking $75M Payout

A recent report has revealed an alarming trend in ransomware attacks and a staggering $75 million ransom payout. The report by Zscaler ThreatLabz team indicates a 17.8% increase in ransomware attacks. more

Iran Gives Messaging Apps a Year to Move Data Inside Country

Iran has given foreign messaging apps a year to move data they hold about Iranian users onto servers inside the country, prompting privacy and security concerns on social media. more

Annual Review of .fr ccTLD, With Growth of +6% in 2021

Like 2020, the year 2021 saw exceptional conditions, with the persistence of the health crisis. As the registry for the .FR TLD, Afnic was well placed to observe the adaptation of French society to these exceptional conditions, particularly from the viewpoint of the digital transition process. Following on from a historical record in .fr domain name creations in 2020 (793,441), the 776,514 in 2021 have confirmed the take-up of digital benefits by French users, with registrations still up 12% as compared to 2019. more

NANOG’s Edward Mc Nair to Deliver Keynote Address at CaribNOG 17 in April

Edward Mc Nair will deliver the keynote address at the next regional meeting of the Caribbean Network Operators Group (CaribNOG), to be held in Bridgetown, Barbados from April 10 to 12. The featured talk will take place on Thursday 11 April at 9 am AST. A live netcast will be available. Mc Nair is the Executive Director of the North American Network Operators Group (NANOG). more

Trust Binding

A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more