/ Most Viewed

Study Finds Majority of U.S. Gov’t Agencies Fail to Meet Security Mandate for DNSSEC Adoption

Majority of U.S. Federal agencies using .gov domains have not signed their DNS with DNSSEC (Domain Name Security Extensions) despite a December 2009 Federal deadline for adoption, according to the latest report by IID (Internet Identity). IID analyzed the DNS of more than 2,900 .gov domains and has released the results in its "Q3 State of DNS Report". more

The Growth of DNS-OARC Highlights Great Strides in DNS Research

This past weekend several of my Dyn colleagues and I attended the DNS-OARC annual meeting and fall workshop in Montreal. "OARC" in the organization's title stands for "Operations, Analysis and Research Center". DNS-OARC was founded by the Internet Systems Consortium (best known as the maintainers of the BIND DNS software) in 2004 to address a gap in the DNS community. Engineers working to extend the DNS protocol itself have always had a home in the Internet Engineering Task Force (IETF), but there was no corresponding community for those who operated DNS infrastructure and did research using data gleaned from DNS operations. more

Is There a Business Case for Fast Cellular?

We've gotten a glimpse of the challenges of marketing faster cellular usage since the two major cellular providers in South Korea made a big push in offering ultrafast cellular broadband. South Korea has two primary cellular carriers – SK Telecom and KT – and both have implemented cellular products using millimeter wave spectrum in Seoul and other dense urban areas. more

New In-depth Analysis Finds Thousands of Domains Used in Technical Support Scams

A study conducted by PhD candidates at the Stony Brook University resulted in identifying malvertising as a major culprit for exposing users to technical support scams which allowed them to build an automated system capable of discovering, on a weekly basis, hundreds of phone numbers and domains operated by scammers. more

The Security Talent Gap Is Misunderstood and AI Changes It All

Despite headlines now at least a couple of years old, the InfoSec world is still (largely) playing lip-service to the lack of security talent and the growing skills gap. The community is apt to quote and brandish the dire figures, but unless you're actually a hiring manager striving to fill low to mid-level security positions, you're not feeling the pain -- in fact, there's a high probability many see problem as a net positive in terms of their own employment potential and compensation. more

The Huawei Issue in the Broader Context of Global Politics

It is very sad to see that Huawei has become a victim of US-China trade war politics and it will be very interesting to see how their court case against the US Government will pan out, the company claims that the ban of its products is "unconstitutional." There is no indication that Huawei has been involved in any spying activity; nor does it appear to have any intention of doing so. more

Do Not Track: Not as Simple as it Sounds

Over the past few weeks, regulators have rekindled their interest in an online Do Not Track proposal in hopes of better protecting consumer privacy. ... There are a variety of possible technical and regulatory approaches to the problem, each with its own difficulties and limitations, which I'll discuss in this post. more

Pinpointing Urban Broadband Gaps

The City of Chicago asked some researchers at the University of Chicago for help to identify the neighborhoods and the number of households that are not connected to broadband. It's been well known that large numbers of people in cities don't have broadband, but there have been no easy ways to pinpoint where solutions are needed. more

Phishers Using New Web-Based Technique ‘In-Session Phishing’ to Steal User Data, Researchers Warn

Security researchers have identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on to an online banking, brokerage, or other sensitive website. The technique, called In Session Phishing, can be used to inject into all major browsers legitimate looking Pop Up messages using malicious JavaScript that request passwords, account numbers, etc., on behalf of the trusted website. more

Twitter Worker Who Disabled Trump Account Likely Violated Computer Fraud and Abuse Act, Says Lawyer

A prominent attorney for cybersecurity issues says the unnamed Twitter worker who deactivated President Trump's Twitter account not to say anything and get a lawyer. more

No Government Veto Over Future Top-Level Domain Names

Declan McCullagh reporting in CNET News: "The Obama administration has failed in its bid to allow it and other governments to veto future top-level domain names, a proposal before ICANN that raised questions about balancing national sovereignty with the venerable Internet tradition of free expression. A group of nations rejected that part of the U.S. proposal last week, concluding instead that governments can offer nonbinding 'advice' about controversial suffixes such as .gay but will not receive actual veto power." more

IANA Transition is Just the Beginning

The transition of the Internet Assigned Numbers Authority (IANA) functions is finally in the history books. After almost two years of working groups and multiple rounds of meetings, most of us want to take a long vacation and never hear the acronym "IANA" again. However, the transition is just the beginning. Now is the time for the multistakeholder community to exercise its new authorities and responsibilities to ensure ICANN remains accountable to every internet user. more

Want to Help Guide the Future of the MANRS Routing Security Initiative?

Would you like to help guide the future of the Mutually Agreed Norms for Routing Security (MANRS) initiative? As the MANRS community continues to develop new efforts to make the routing layer of the Internet more secure (ex. the equipment vendor program), would you like to help lead the work? The MANRS community is seeking volunteers for its new Steering Committee. The committee will lead the community as it evolves its governance model.  more

Lead With Privacy and Customers Will Follow

From high-profile data breaches to increasingly sophisticated tracking systems, the issue of consumer privacy is earning a lot of headlines these days. To better protect their personal privacy, many consumers are taking matters into their own hands. A Forrester Consulting survey revealed that one-third of consumers polled admitted to using do-not-track tools and ad blockers to protect their online privacy, while another 25 percent have cancelled at least one online transaction after reading the seller's privacy policy. more

Can Cellphones Capture the Broadband Market?

Linda Hardesty wrote an interesting article in FierceNetwork that asks the question, "What if, in ten years, young people don't subscribe to fixed broadband at all?" Her story is based on a U.K. research group that predicts that within ten years, there will be a lot of young people who will never have subscribed to a landline broadband product. more