/ Most Viewed

MAAWG Overview of DNS Security - Port 53 Protection

J.D. Falk writes: Last week, MAAWG quietly published a new document titled "Overview of DNS Security - Port 53 Protection." [PDF] The paper discusses cache poisoning and other attacks on the local DNS, including likely effects of such a compromise and what access providers may be able to do to prevent it. more

Telecom Execs Meet at the NGT Asia Summit to Discuss the Move to 4G

"Such a meeting has been a long time coming, large operators have been losing revenue as the communication market has diversified, network optimization should lend to them finding new revenue streams as the level of service can expand" -- Nick York, NGT Summit Director Asia Pacific. more

Afilias and Neustar to Collaborate With ISC on DNS Security Initiative

Internet Systems Consortium (ISC) has announced that it is working with Afilias and Neustar, Inc. in the effort to support ISC's DNSSEC Look-aside Validation (DLV) registry by providing secondary DNS service for the DLV zone. DLV is a mechanism that provides many of the benefits of DNSSEC (short for DNS Security Extensions), enabling domain holders to secure their domain information today in advance of broader DNSSEC deployment and adoption. "Adding Afilias and Neustar as secondary DNS providers for the DLV zone demonstrates our collective understanding that DLV is a vitally important production service bigger than any single provider in the same way that there are 13 root server operators, not just one." more

Google Limits Some Employees’ Access to the Internet

Google has launched a pilot program to bolster its cybersecurity defenses by limiting internet access for some employees. Initially, Google selected 2,500 participants, but after receiving feedback, it modified the program to allow employees to opt out and invite volunteers to join. more

Hackers Earned Over $100K in 20 Days Through Hack the Air Force 2.0

HackerOne has announced the results of the second Hack the Air Force bug bounty challenge which invited trusted hackers from all over the world to participate in its second bug bounty challenge in less than a year. more

APWG Releases 2008 First Quarter Phishing Activity Trends Report

The Anti-Phishing Working Group (APWG) has released its 2008 first quarter Phishing Activity Trends Report revealing that the Crimeware-Spreading URLs rose rapidly doubling previous high. More specifically, the report say that numbers of crimeware-spreading URLs infecting PCs with password-stealing code rose 93 percent in Q1, 2008 to 6,500 sites, nearly double the previous high of November, 2007 -- and an increase of 337 percent from the number detected end of Q1, 2007. On the positive side, the number of phishing reports and new phishing websites decreased at the end of Q1 2008 period. more

FCC Chairman Ajit Pai: Net Neutrality “A Mistake”, Planning on Much Lighter Style Regulation

During a speech at Mobile World Congress today, Ajit Pai said that net neutrality was "a mistake" and that the commission is now "on track" to return to a much lighter style of regulation. more

US, China Reach Agreement on Guidelines to Combat Cybercrime

United States Justice Department has announced that US and China have reached an agreement governing how the two countries will request assistance to combat cybercrime. more

ICANN Extends Chehadé‘s Contract by Two More Years

ICANN today announced that its Board has extended the contract of Fadi Chehadé, President and Chief Executive Officer, by two more years. "I'm glad to be able to expend my energy and passion towards ICANN's noble mission and great public responsibility," said Chehadé. more

Women in Security Organize New Conference in Reaction to RSA’s Lack of Female Speaker Inclusion

RSA, one of the largest cybersecurity conferences, has been criticized for booking only one female keynote speaker this year who is Monica Lewinsky. more

ICANN Must Stop Resisting Accountability Changes, Warn US Senators

Two leading US senators, John Thune, chairman of the Senate Committee on Commerce, Science, and Technology, and ranking member Brian Schatz have signed a letter warning that without "significant accountability reforms that empower the community," Congress will not support the transition of the IANA contract from the US government to ICANN. more

Cyberhygiene Requires Critical Thinking

At his farewell speech in August outgoing, Telstra CEO Andy Penn mentioned that the cyber threat has never been as serious as the present. He mentioned the deteriorating geopolitical situation and the big shift in how criminals operate in the cyber domain. One thing is for sure is that in order to enjoy all the positives resulting from the digital economy, we need to be far more vigilant about the barrage of information that we are receiving and/or have access to. more

The 50th Anniversaries of the Moon Landing and First ARPANET Message

The anniversaries of these milestones remind us of the economic and social returns we have seen from ambitious Federal research and development programs. These events were milestones... the manned spaceflight program and the development of digital telecommunication networks from Morse's telegraph to early electronic digital computers and telemetry experiments, the SAGE early-warning system and eventually the ARPANET and the Internet. more

The Great Firewall of China

Are you suffering delays in your recent emails to china? It may be because of "series of disruptions to cross-border email traffic on adjustments to the country's vast Internet surveillance system," Reuters reports today. The delays have been going on for four days now. But, of course, there is no way to get official confirmation. The symptom seems to be an error message that is returned to the sender... more

Proposed UK Bill Will Make it Criminal Offence for Tech Firms to Warn Users of Government Spying

Yahoo recently become the latest company to join Twitter, Facebook and Google for promising to alert users suspected of being spied on by state-sponsored actors. However UK ministers want to make it a criminal offence for tech firms to warn users of requests for access to their communication data made by security organizations. more