/ Most Viewed

Google Reveals New “Secret” Web Search Project

In a blog post by Google's Sitaram Iyer, Staff Software Engineer, and Matt Cutts, Principal Engineer, a "secret project" has been revealed in an effort where the company is aiming to enhance various key aspects of its web search technology including indexing speed, accuracy, and comprehensiveness. The company so far has released the new engine "under the hood," for testing and feedback only and says most users will not notice a difference in search results. more

Significant Uptick Reported in Targeted Internet Traffic Misdirection

Jim Cowie of Renesys reports: Traffic interception has certainly been a hot topic in 2013. The world has been focused on interception carried out the old fashioned way, by getting into the right buildings and listening to the right cables. But there's actually been a significant uptick this year in a completely different kind of attack. more

The Internet of Trash

It's often a clear signal that we're in deep trouble when politicians believe they need to lend a hand and help out with regulations. A bill has been passed by the US Congress, and now signed into law, that requires the National Institute of Science and Technology to work with other agencies in developing guidelines for the use of devices that manage security vulnerabilities, patching, together with configuration and identity management. more

NCUC Sends Urgent Plea to the ICANN Board Regarding Recent Changes Affecting Noncommercial Groups

An open letter from nearly 150 individual and organizational members of ICANN's Non-Commercial Users Constituency (NCUC) has been submitted to ICANN's board of directors and CEO. The letter has expresses serious concern over a recent ICANN Board decision regarding the restructuring of the Generic Names Supporting Organization (GNSO). From the letter: "We believe that the Noncommercial Stakeholder Group (NCSG) chartering process has been seriously flawed on both procedural and substantive grounds. We appeal to you to address these problems before permanent damage is done to ICANN's reputation, to the GNSO reform process, and to the interests of noncommercial users of the Internet." more

On the Way to the G7 ICT Ministers’ Meeting in Japan

This week in Japan I have been invited to address the Multi-Stakeholder Conference that will officially open the G7 ICT Ministerial summit in Takamatsu. The focus of the ICT Ministerial will be on four distinct areas: (1) Innovation and economic growth; (2) Unrestricted flow of information, and ensuring the safety and security in cyberspace;
(3) Contributing to the resolution of global issues, including digital connectivity; (4) International understanding and international cooperation in the future. more

What Would a Human Rights-Based Approach to AI Governance Look Like?

Over the past year, discussions around artificial intelligence (AI) have saturated media and policy environments. Perspectives on it vary widely: from boosterist narratives, which posit the limitless potential of AI-powered technologies to help overcome social inequalities and accelerate industrial development, to apocalyptic framings, which suggest that a (speculative) 'artificial general intelligence' could make humans extinct. more

White House Announces Agenda for Game-Changing Cybersecurity R&D

The United States White House Office of Science and Technology Policy (OSTP) has released a new report titled, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, specifying an agenda for "game-changing" cybersecurity R&D according to an official announcement today. The report is described as "a roadmap to ensuring long-term reliability and trustworthiness of the digital communications network that is increasingly at the heart of American economic growth and global competitiveness." more

Finding the Holes in Your Application Security Blanket

Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more

Creating a Russian No-Cyber Zone

In response to Russia's horrific invasion and war against the Ukrainian nation ordered by Dictator Putin that will live in infamy, an array of nations, organizations, and companies have responded to shun and shut off Russia in every possible manner. The actions include no-fly zones, removal from ICT network services, and essentially universal declarations of condemnation. For the first time ever, all Russian proposals to the International Telecommunication Union (ITU) quadrennial standards body plenary known as the WTSA have been "bracketed"... more

China Releases Strategy on Cyberspace Cooperation

Ministry of Foreign Affairs and the Cyberspace Administration of China has jointly released a document titled "International Strategy of Cooperation on Cyberspace." more

CarPIF Regional Connectivity Meeting to Address Affordable and Resilient Internet Access

The Eastern Caribbean island of Grenada has been selected as the venue for the fifth regional meeting of the Caribbean Internet Peering and Interconnection Forum, CarPIF, set for June 12 to 13. The annual international event, which draws Internet giants like Facebook and Google to the region, is focused on developing the Internet in the Caribbean by improving policy and building relationships between network operators and content providers. more

The Diet Pill Security Model

The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong... more

ICM Registry Publicly Posts Filings for Independent Review Panel Against ICANN on .XXX Domain

ICM Registry (proponents of the .xxx initiative) and Stuart Lawley, Chairman and President of the organization, have filed a 522-page brief in the ongoing Independent Review Process that began last June. "In what may prove to be the biggest sleeper Internet governance issue of the year, ICM Registry has publicly posted its filings for the Independent Review Panel that will decide whether ICANN acted improperly in rejecting its application for a .xxx domain," writes Brenden Kuerbis in a post on the IGP blog.  more

ICANN LAC-i Roadshow Stirs “High Interest” in Caribbean ccTLDs

The Caribbean can create a unique flavour on the Internet by using effectively managed and financially stable Country Code Top-Level Domains. Speaking after ICANN's first Caribbean edition of its Latin American and Caribbean Internet Roadshow (LAC-i Roadshow), recently held in Turks and Caicos Islands, Albert Daniels said the event yielded "very high interest" in the management and operations of the local ccTLD, .tc. Daniels is ICANN's senior manager of stakeholder engagement in the Caribbean. more

TLDs of Vacant or Close to Vacant Places in the World

Royal Pingdom has put together a list of top ten places with designated country code Top-Level Domains that are barely inhabited. The list starts off with '.hm' for Heard and McDonald Islands, an Australlian territory, with zero population. Others include '.pn' for Pitcairn Islands (Population: 50), '.tf' for French Southern and Antarctic Lands (Population: 140), '.cc' for Cocos (Keeling) Islands (Population: 596) and '.va' for the Vatican City (Population: 826). more