/ Most Viewed

Luddites of the 21st Century Unite, Revisited

Some years ago I wrote a post on the fact that I saw the world automate fast and did not see a lot of people worrying about the consequences for their lives. Nobody was smashing automated production lines. Smashing smartphones and laptops. In fact, embrace of new technology by the masses probably never before in history went this fast. Several and very different causes, including globalization, have led to a level of wealth that made these expensive tools and toys within reach of a vast number of people. more

Comment Period for ICANN Accountability Process Enhancement Extended

ICANN made an announcement today stating that in response to ensuring the community has sufficient time, while also having the process in parallel to, and informing, the process to Transition NTIA's Stewardship of the IANA Functions, there is a one week extension of the comment period to 6 June. more

No Honor Among Thieves on the Internet

Apple's Wordwide Developers Conference may have just ended, but already, the conference release of Mac's OS X 10.6 — a beta build previewed for developers — has been leaked onto torrent sites. It borders on irony: for years, Mac lovers have touted the superior security of the Mac operating system over Windows, but earlier this year, it was torrent sites — the very sites where OS X 10.6 is now being freely copied — that caused more than 25,000 Mac users to fall victim to the iServices Trojan. Some Macs never learn. more

Unsolicited Smartwatches Bearing Malware Target U.S. Service Members: Army CID Raises Alarm

U.S. military service members around the country have reported receiving unsolicited smartwatches by mail, triggering warnings from the Department of the Army Criminal Investigation Division (CID). more

Canadian Government Stepping Up on Internet Surveillance

A Canadian law expected to be introduced next week could greatly assist law enforcement authorities in the country to access date revealing internet-user habits and personal information. Privacy watchdogs caution if the so-called Lawful Access law is passed, it would give police access to webbrowsing history and sensitive personal information, and would grant greater permission to track the cellular phones of suspects -- much of it without the requirement of a warrant. more

What Happened to Quantum Networks?

A few years ago, there were a lot of predictions that we'd see broadband networks converting to quantum technology because of the enhanced security. As happens with many new technologies, quantum computing is advancing at a slower pace than the wild predictions that accompanied the launch of the new technology. more

IGF 2015 Takes Action, Developing Best Practices to Address Internet Issues

After many months of hard work and preparation, the IGF community has published draft Best Practices on a range of key issues, complementing other intersessional efforts such as Policy Options for Connecting the Next Billion, and Dynamic Coalitions. Best Practices Forums (BPFs) offer the Internet governance community tangible ways to address Internet issues. more

U.S. National Security Agency Announces AI Security Center

U.S. National Security Agency Director, Army Gen. Paul M. Nakasone, has announced the formation of the AI Security Center, a new entity designed to oversee the development and integration of artificial intelligence within the nation's security systems. more

NTAG Chair Blog: Odds and Endings

Imagine if the US Bureau of Labor Statistics delayed one of its reports for say, two months. No explanation. Just didn't release the employment numbers when it said it would. What if the Federal Reserve decided to say it was going to raise interest rates, but then just didn't? The global economy would be thrown into chaos. These organizations know that when you run critical infrastructure your word is part of that infrastructure. more

The Growth of DNS-OARC Highlights Great Strides in DNS Research

This past weekend several of my Dyn colleagues and I attended the DNS-OARC annual meeting and fall workshop in Montreal. "OARC" in the organization's title stands for "Operations, Analysis and Research Center". DNS-OARC was founded by the Internet Systems Consortium (best known as the maintainers of the BIND DNS software) in 2004 to address a gap in the DNS community. Engineers working to extend the DNS protocol itself have always had a home in the Internet Engineering Task Force (IETF), but there was no corresponding community for those who operated DNS infrastructure and did research using data gleaned from DNS operations. more

Internet Cable Activated in Cuba

Doug Madory reporting from Renesys: In February 2011, the first submarine cable connecting the island nation of Cuba to the global Internet (by way of Venezuela) landed on Siboney beach, Santiago de Cuba. In the two years since, the fate of the cable has been a mystery for Cuba observers. In the past week, Renesys' global monitoring system has picked up indications that this cable has finally been activated, although in a rather curious way, as explained... more

Where Do You Start to Mitigate the Latest Destruction-Motivated Cyber Threats?

With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more

UN Human Rights Council Passes Resolution ‘Unequivocally’ Condemning Internet Shutdowns

United Nations Human Rights Council today adopted resolutions condemning measures to intentionally prevent or disrupt access or dissemination of information on the Internet in violation of international human rights law. more

Is Anti-Virus Dead?

Each SANSFIRE, the Handlers who can make it to DC get together for a panel discussion on the state of information security. Besides discussion of the hot DNS issue, between most of us there is a large consensus into some of the biggest problems that we face. Two come to mind, the fact that "users will click anything" and that "anti-virus is no longer sufficient". These are actually both related in my mind... more

Liberia’s Internet Brought to a Halt After Facing Multiple Mirai-Based Attacks

The entire internet infrastructure of the African nation of Liberia is distributed by the same weapon used to cause the historic cyberattack just two weeks ago. more