/ Most Viewed

ARIN’s New CEO: IPv6 One of the Most Critical Internet Issues Today

The American Registry for Internet Numbers (ARIN) named John Curran as president and chief executive officer, effective July 1, 2009. Since January 1, 2009, Curran has served as acting president and CEO of ARIN. He is a founding member of the ARIN Board of Trustees and served as chairman from August 1997 to December 2008. Curran has also been a valuable participant on CircleID where he has shared his views on a number key issues such as IPv6. more

What Will 2021 Have Install for the ICT Industry?

While 2021 will remain a year with lots of uncertainties, at the same time, we can say that the pandemic has not affected the information and communications technology (ICT) industry in any significant way. Yes, there has been a slowdown, for example, in the sale of smartphones. Shortages in both materials and expertise are slowing fiber deployment, and the recovery over 2021 will be slow and uncertain because of the many lockdowns and travel restrictions. more

US Government Networks Thoroughly Penetrated by Foreign Spies, Experts Tell Senate

Network security experts from across the U.S. government told a U.S. Senate Armed Services Subcommittee on Tuesday that federal networks have been thoroughly penetrated by foreign spies, and that current perimeter-based defenses that attempt to curb intrusions are outdated and futile. more

FCC Pushing for Free Internet Plan, Called Most Controversial Issue in December

Outgoing Federal Communications Commission Chairman Kevin Martin is pushing for action in December on a plan to offer free, pornography-free wireless Internet service to all Americans, despite objections from the wireless industry and some consumer groups. The proposal to allow a no-smut, free wireless Internet service is part of a proposal to auction off a chunk of airwaves. The winning bidder would be required to set aside a quarter of the airwaves for a free Internet service. more

Reduce Churn with Better Visibility Over Your Service Activation Processes

How much visibility do you have over service activation processes? For many service providers, the answer to that question is bleak. The sad truth is that visibility over service activation processes, including errors and misconfigurations, is lacking in many Tier 3, Tier 2, and even Tier 1 organizations. Today's operators often turn to multiple siloed systems when attempting to ensure that services are activated accurately, on time, and are working as promised. more

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more

Twitter Worker Who Disabled Trump Account Likely Violated Computer Fraud and Abuse Act, Says Lawyer

A prominent attorney for cybersecurity issues says the unnamed Twitter worker who deactivated President Trump's Twitter account not to say anything and get a lawyer. more

Cyptech Needs You!

In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more

Swimming Australia Website Comes Under DDoS Attack in Wake of Allegations Against Chinese Swimmer

The website of Swimming Australia has come under DDoS attack just hours after the Australian Bureau of Statistics went back online following a similar attack bringing the online census initiative to a halt. more

Networking Firm Loses $46.7 Million to Fraudulent Wire Transfer

Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation." more

4% of Americans Online Use Location-Based Services, According to Pew Survey

In its first report on the use of "geosocial" or location-based services, the Pew Research Center's Internet & American Life project finds that 4% of online adults use a service such as Foursquare or Gowalla that allows them to share their location with friends and to find others who are nearby. On any given day, 1% of internet users are using these services. more

Don’t Let Patent Wars Widen Digital Divide

For generations, large pockets of Africa were isolated from things many of us take for granted: access to medical treatment and advances that can make the difference between a healthy, productive life or debilitating illness -- or even an early death. These problems still persist, but over the last two decades technology has helped break through and enable medical professionals to reach the poorest and most remote populations and offer some hope. more

Report Looks at Humanitarian Futures for Messaging Apps

To develop responsible, effective and safe ways to use messaging apps, organizations need to better understand the opportunities and risks they present - new research report released by The Engine Room in partnership with International Committee of the Red Cross (ICRC) and Block Party. more

First .emarat Arabic Script Domain Name is Live!

The .emarat Arabic script Internationalised Domain Name (IDN) ccTLD for the United Arab Emirates has been entered into the DNS Root Zone and is therefore now resolving. This is a truly historic moment in the development of the Internet in the United Arab Emirates and the wider Arabic-speaking world as it removes the last hurdle preventing people without English-language skills from enjoying the full benefits that the Internet has to offer. more

New Cyber Security Bill Could Increase Power of President and DHS

Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more