Comcast has reached an agreement to acquire Time Warner Cable, according to a tweet from CNBC reporter, Dave Faber. The new company, based on the $44 billion purchase, will be by far the largest cable provider in the U.S. with over 33 million subscribers, and is assumed to face tough review from the Federal Communications Commission. more
The discussion about the future of the .ORG domain registry has been partly rooted in stewardship. Who will guide the Public Interest Registry (PIR) so it continues to serve the .ORG community? For those of us at Ethos Capital, the company acquiring PIR, this has been a central focus. We understand that owning PIR makes us stewards of an essential part of the fabric of the Internet. more
I am currently in Hyderabad, attending the Internet Governance Forum, IGF. With hours before the official opening, it might be worth reflecting a bit on Internet Governance and the general discussion on the role of international policy and ICT (information and communication technologies). I have several times before said, and written, that the real difference that governments could make (assuming that Governance is in relation to Governing) in Internet policy is close to their traditional roles. more
Having been involved in the telecommunications industry for a long time, I followed many of the discussions involving health concerns when the 3G and 4G mobile technologies were introduced. This time, with 5G, the situation is no different. Again, there are many communities worried about the potential negative health effects of the radiation that emanates from mobile communications. more
According to a recent analysis, the cyber threat landscape has changed dramatically one year since the Russian invasion of Ukraine. Google TAG, Mandiant, and Trust & Safety have released a report titled, Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape, based on analysis from Google’s Threat Analysis Group (TAG), Mandiant, and Google Trust & Safety. more
The websites and digital platforms of Qatar-based Al Jazeera Media Network are undergoing systematic and continual hacking attempts, the news agency reported a few hours ago on its website. more
Google has announced that it is working to bring high-speed internet to Cuba, one of the world's least-connected countries. In a blog post published Monday, the company said it is bringing Chromebooks, Cardboard virtual reality kits, and other Google products to the Museo Orgánico Romerillo in Havana, where they will be connected to an internet network operated by the government-owned carrier ETECSA. more
The U.S. Department of Justice and the FBI announced on Wednesday that they have taken actions to disable an international botnet of more than two million infected computers responsible for stealing corporate data including user names, passwords and financial information. more
Amidst debates concerning privacy rules for ISPs, Comcast in an FCC filing on Monday has urged the Commission to not interfere with business models offering discounts or other value to consumers in exchange for allowing ISPs to use their data. more
Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. more
The Canadian Security Intelligence Service (CSIS) is reported to have warned companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities. more
New security report has revealed at least 48 companies involved in research, development, manufacturing of chemicals and advanced materials have been victims of a coordinated cyberattack traced to a source in China. The purpose of the attacks, code named Nitro, appear to be industrial espionage, collecting intellectual property for competitive advantage, according to Symantec. more
According to a new security report released today by SANS Institute, TippingPoint and Qualys, the number of vulnerabilities found in applications in the last few years is far greater than the number of vulnerabilities discovered in operating systems. "On average, major organizations take at least twice as long to patch client-side vulnerabilities as they take to patch operating system vulnerabilities. In other words the highest priority risk is getting less attention than the lower priority risk." more
"The chairman of the U.S. Federal Communications Commission is moving quickly to replace the Obama administration's landmark net neutrality rules and wants internet service providers to voluntarily agree to maintain an open internet," David Shepardson reporting in Reuters. more
Listening to several of the discussions here at the IGF (so far), my post from yesterday seems to be close to what the focus of this meeting is, control and access to resources. Yesterday I highlighted areas of Governance where Governments actually could help, and make difference. Admittedly, that is not all the aspects of governance though. more