/ Most Viewed

Hurricane Sandy Had Surprising Impact on Global Internet Traffic Flow

In addition to knocking out power and Internet connectivity in a significant part of the New York metropolitan area, Sandy also had a surprising impact on the world's Internet traffic, traffic that neither originated from nor was destined to areas effected by the storm, Renesys reports. "From locations around the globe as varied as Chile, Sweden and India, some Internet traffic was forced onto alternate paths, avoiding failures at critical transit points in the NYC area." more

One Billion Smartphones in Use in the World, According to a Recent Study

Reported today on mobiThinking blog, the number of smartphones in use worldwide has now broken the 1 billion mark, according to Strategy Analytics. "That is a stunning landmark... It is an awful lot of smartphones. It is equivalent to one seventh of the global population and one sixth of mobile phone subscribers. But it is a lot less smartphones than some people have been reporting. Barely a day goes by without some ludicrous estimate of smartphone penetration." more

The Changing World of Network Management in an Increasingly Cloud-Centric World

Over the past two weeks Andrew Lerner, Vice President in Gartner Research covering enterprise networking products, has put out two successive blogs that raise really interesting questions about the changing world of network management in an increasingly cloud-centric world. In "What Keeps Network Folks Up at Night?", Andrew writes about the worrisome challenges in the Banking/Financial industry related to frequent manual network configuration errors. more

ICANN Website Breached, Passwords Obtained by an Unauthorized Person

Usernames/email addresses and encrypted passwords for profile accounts created on the ICANN.org public website have been obtained by an unauthorized person, the Internet Corporation for Assigned Names and Numbers announced Wednesday night. more

How Brexit Raises Risks for Non-Compliant .EU Domain Names

On June 3, 2020, EURid, the registry for .EU domains, published its timeline and action plan to withdraw and delete .EU domains registered to entities and individuals located in the U.K. ... Following the .EU regulations that were published on March 29, 2019, registrations of .EU domain names may be held by EU citizens, citizens of Iceland, Liechtenstein, and Norway, independent of their place of residence -- as well as organizations that are established in the EU. more

NTAG Chair Blog: Singapore Mid-term Update

While the media spotlights the US role in Internet governance, the NTAG Executive Committee has been focussed on the daily business of ensuring the New gTLD programme is moving forward in the best interests of applicants. There are signs that ICANN is becoming more responsive to applicant needs. Quick action implementing GAC Advice once it was resolved by the New gTLD Program Committee, the recent name collision webinar, and an ongoing dialogue on new gTLD auctions procedures are all positive steps. more

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more

Executive Order and the New Date Privacy Rights of Non-US Citizens

"Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US," Bruce Schneier writes in his security blog. more

Will COVID-19 Traffic Kill the Internet?

This is the question being asked all across the industry as the volume of data traffic has leaped upward due to students and employees working from their homes. We got our first glimpse of the impact of the crisis when Verizon announced a week into the crisis that they were seeing a 22% increase in data traffic in their network. More recently, AT&T announced a 27% increase in network traffic. more

US Huawei Ban Threatens Internet Access in Rural Areas, Some Providers May Fold

Much of rural America with very low population density, depends on small wireless carriers for their internet access as AT&T, T-Mobile and other large providers have no interest in providing services. more

Hot Take on the Twitter Hack

If you read this blog, you've probably heard by now about the massive Twitter hack. Briefly, many high-profile accounts were taken over and used to tweet scam requests to send Bitcoins to a particular wallet, with the promise of double your money back. Because some of the parties hit are sophisticated and security-aware, it seems unlikely that the attack was a straightforward one directly on these accounts. more

Non-Commercial Stakeholder Group Releases Statement on ICANN Staff’s Accountability Plan

Non-Commercial Stakeholder Group (NCSG) today released the following statement on ICANN staff's accountability plan... "A number of public comments and discussions in London focused on the inherent conflict of interest behind staff developing its own accountability and transparency mechanisms, so it was surprising to see that input had not been taken into account in the development of this proposal..." more

Biden-Harris Administration Unveils National Cybersecurity Strategy

Today, the Biden Administration released the National Cybersecurity Strategy, which outlines the use of all available resources to protect the United States' security, safety, and economic prosperity. more

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more

Department of Homeland Security Issues More Warnings on Security Vulnerabilities in Medical Devices

The U.S. Department of Homeland Security has issued a warning about cybersecurity vulnerabilities in medical devices which have come after independent researchers, or the companies themselves, reporting the problems. more