/ Most Viewed

Apple CEO Tim Cook Calls for New Privacy Law, Suggests Data Broker Clearinghouse

Apple's chief executive officer Tim Cook has called for the US Congress to introduce a national privacy law, attacking a "shadow economy" where personal data is bought and sold without their knowledge. more

Reported Risk of Undersea Communication Cable Sabotage Are Exaggerated

Responding to a recent New York Times article which warned the possibility of Russian submarines possessing the ability to sabotage undersea communication cables, Doug Madory, Director of Internet Analysis at Dyn, calls them exaggerated scenarios. more

M-Government Requires Mobile ID

More and more governments are now looking at electronic ways to deliver services to their citizens. With the enormous growth in mobile penetration this infrastructure is now becoming a viable alternative in the delivery of services. But personal authentication is required to make this happen. This is recognised throughout the industry for a range of services and the GSMA has launched a project 'Mobile Contact' aimed at developing a standardised mobile ID. more

ACMA: 30,000 PC’s Infected in Australia Per Day

Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more

Genachowski: FCC Will Enforce Net Neutrality and Watch Any Violations of Principles

US Federal Communications Commission (FCC) Chairman Julius Genachowski today reaffirmed his commitment to network neutrality and said that the FCC will go after anyone who violates its tenets. "One thing I would say so that there is no confusion out there is that this FCC will support net neutrality and will enforce any violation of net neutrality principles," said Genachowski told The Hill newspaper when asked what he could do in his position to keep the Internet fair, free and open to all Americans. more

Cruz and Co Send ICANN Another Letter

Republican Presidential hopeful Ted Cruz (and others) has sent yet another letter to ICANN. This time round, the letter is addressed both to the Chairman of the ICANN Board, Dr Steve Crocker, as well as to former CEO Fadi ChehadĂ©. The letter repeats some of the questions previously put to ICANN, though the wording is much blunter this time round. Cruz' office issued a press release with details of the letter under the title of "ICANN Is Stonewalling the U.S. Congress". more

EFF: U.S. Cybersecurity Strategy Likely to Have Serious Implications for Canadians

EFF and several other civil society organizations have declared a 'Stop Cyber Spying Week' in protest of several controversial U.S. cybersecurity legislative proposals, including the bill currently before Congress and the Senate called CISPA... more

DNSSEC Workshop on March 26 to Be Streamed Live from ICANN 49 in Singapore

If you are interested in DNSSEC and how it can make the Internet more secure, the DNSSEC Workshop at ICANN 49 in Singapore will be streamed live for anyone to listen and view. One of three DNSSEC-related technical events at ICANN 49, the DNSSEC Workshop takes place on Wednesday, March 26, from 8:30am - 2:45pm Singapore time. more

UK’s National Cyber Security Centre Reveals Plans to Scale Up DNS Filtering

Speaking at the Billington Cyber Security Summit in Washington DC, Ciaran Martin, head of UK's Government Communication Headquarters (GCHQ) and the first Chief Executive of the new National Cyber Security Centre (NCSC), set out how the new organization will use DNS filters as part of its plan to curb cyberattacks. more

Review Your Email Forwarding Practices

As unusual as it may be for a lawyer to speak at a IETF meeting, Ian Walden gave a lecture on Data Protection Directives and updates thereof. He said they affect some 90 jurisdictions. A difference between email addresses and cookies - the latter are the main subject of the January 2012 update of the directives - is that after more than a decade of enforcement, specific browser extensions may allow users to browse what cookies they have, while no record states whom they conferred their email addresses to. more

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more

Why Cancel a Domain Name in a UDRP Case?

While the most common results of a UDRP proceeding are either transfer of a disputed domain name to a complainant or denial (that is, allowing the respondent to retain it), there is another possible outcome: cancellation. I'm always surprised to see a UDRP decision in which a domain name is cancelled. True, many trademark owners don't really want to obtain control of a disputed domain name (and, instead, they simply want to get it taken away from a cybersquatter). more

U.S. Government Trying to Persuade Allied Countries to Avoid Telecom Equipment from China’s Huawei

The U.S. government is engaged in persuading wireless and internet providers in allied countries to stop using telecommunications equipment from China's Huawei Technologies. more

NTIA to Allow IANA Functions Contract to Expire October 1

On Friday, ICANN informed NTIA that it has completed or will complete all the necessary tasks called for in the transition proposal by the end of the contract term. more