/ Most Viewed

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more

Cybercriminals Shifting Focus From Windows PCs to Other Systems and Mobile

In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, tablet computers, and mobile platforms in general, according to the Cisco® 2010 Annual Security Report, released today. The report also finds that 2010 was the first year in the history of the Internet that spam volume decreased, that cybercriminals are investing heavily in "money muling," and that users continue to fall prey to myriad forms of trust exploitation. more

Wow, Sanford Wallace Owes a Lot of Money

Last September MySpace sued ur-spammers Sanford "Spamford" Wallace and Walt "Pickle Jar" Rines were for egregious violations of CAN SPAM. Neither responded, so as was widely reported, earlier this week the court granted a default judgement. Since they sent a lot of spam, the statutory damages came to an enormous $235 million. Even for Spamford, that's a lot of money. more

The IETF’s *Other* Diversity Challenge: An Update

Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more

NORDUnet’s Brilliant Internet Peering Strategy

NORDUnet, the R&E network connecting the Nordic countries has recently undertaken a brilliant Internet peering strategy that will have global significant ramifications for supporting research and education around the world. NORDUnet is now emerging as one of the world's first "GREN"s -- Global Research and Education Network. NORDUnet is extending their network infrastructure to multiple points of presence throughout the USA and Europe to interconnect to major Internet Exchange Points (IXPs). more

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

European Union Member States published a report on the 'EU coordinated risk assessment on cybersecurity in Fifth Generation (5G) networks'. The report is based on the results of the national cybersecurity risk assessments by all EU Member States. It identifies the main threats and threats actors, the most sensitive assets, the main vulnerabilities, and several strategic risks. more

Sopho’s Threat Report Focuses on Social Network Spam

The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more

Cyber Security Word Salad

Two months ago, the Trump White House published its National Cyber Strategy. It was followed a few days ago with the release of its draft NSTAC Cybersecurity "moonshot." The Strategy document was basically a highly nationalistic America-First exhortation that ironically bore a resemblance to China's more global two-year-old National Cybersecurity Strategy. more

Capping Broadband Internet by Design

FIOS by Verizon, is a bundled Internet access, telephone, and television service that operates over a fiber-optic communications network with over 5 million customers in nine U.S. states -- providing Fiber to the Home (FTTH). One of the first service areas was a Northern Virginia community known as Ashburn -- which is also is the cloud data center capital of the world. It literally sits on top of the most massive mesh of high bandwidth, low latency fiber in existence. more

What Ever Happened to the Closed Local Internet Registries?

Since the establishment of the RIPE NCC, 5,000 Local Internet Registries (LIRs) have closed. We wanted to find out why. Many of them were probably victims of the burst of the dotcom bubble. But how many? And which countries were mostly affected? How many closures were the results of mergers? We've got answers. more

Transfers of Domain Names Contemporaneous with Complaint: Cyberflight?

Cyberflight (defined as strategically transferring accused domain names to another registrar or registrant upon receipt of a complaint) was a sufficient irritant by 2013 for the ICANN to adopt recommendations to amend the Rules of the Uniform Domain Name Dispute Resolution Policy (UDRP). Effective July 1, 2015 the Rules now include a requirement for locking the domain as well as a change in the timing of transmitting the complaint to respondents. Before the amendment there had been no uniform approach to locking. more

Exploring Future Internet Architectures

UCLA and Washington University in St. Louis recently announced the launch of the Named Data Networking (NDN) Consortium, a new forum for collaboration among university and industry researchers, including Verisign, on one candidate next-generation information-centric architecture for the Internet. Verisign Labs has been collaborating with UCLA Professor Lixia Zhang, one of the consortium's co-leaders, on this future-directed design as part our university research program for some time. more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

International Law of Critical Internet Infrastructure [CII]: A Comparative Analysis

On Friday December 13, 2024 at 10:00–12:00 CET (09:00-11:00 AM UTC) the Lodz Cyber Hub at the University of Lodz Law School, an ICANN EURALO ALS, and the United Nations University – Comparative Regional Integration Studies (UNU-CRIS) hosts an online workshop 'International Law of Critical Internet Infrastructure: A Comparative Analysis of Europe and China'. more

Innovation Today is IN the Network

The largest and most important global information infrastructure today by any measure is clearly the global mobile network and all of its gateways, services, and connected devices. That network is standardized, managed, and energized by a combination of the 3GPP and GSMA. The level of 3GPP industry involvement and collaboration today probably exceeds all other telecom, internet, and assorted other bodies put together... and then some. more