/ Most Viewed

Threat Intelligence Platform in Action: Investigating Important Use Cases

As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more

Next Generation Telecoms: FttH and Trans-Sector Strategies

The deployment of Fiber to the Home (FttH) around the world is beginning to lead to exciting developments for the next generation of telecommunications. In particular, infrastructure based on FttH is providing the foundation for smart communities and cities where a number of technologies and services are combined to create an enhanced value proposition for residents. Smart homes connected to these networks can utilise services such as tele-health, e-education and e-government as well as access digital media and high speed Internet. more

The Summit of the Future: A Hope for the Future

The Summit of the Future (SotF) was held at the United Nations Headquarters in New York on September 22 -- 23, 2024. World leaders, in the presence of stakeholders from the private sector, civil society, academic/technical communities, and youths, endorsed a landmark Pact for the Future of mankind. The Pact for the Future (P4F) (A/RES/79/1) was a significant, consensus-driven but non-binding document agreed upon by world leaders specifically on September 22, 2024. more

A Research Finds Banking Apps Leaking Info Through Phones

A recent research seems to indicate that financial industries should increase the security standards they use for their mobile home banking solutions. IOActive Labs recently performed a black box and static analysis of worldwide mobile home banking apps. The research used iPhone/iPad devices to test a total of 40 home banking apps from the top 60 most influential banks in the world. more

Internet Society’s Contribution to the WSIS+10 Written Consultation

Today we at the Internet Society submitted our contribution to the United Nations General Assembly's 10-year review of the World Summit on the Information Society (WSIS+10) that will take place in New York in December. The goal of this meeting is to set the agenda for the UN - and through that the agendas of nations around the world -- with regard to the future of the "Information Society". more

Regulation of Algorithmic Regulation Begins

A Chinese law that went into effect six months ago required online service providers to file details of the algorithms they use with China's centralized regulator, the Cyberspace Administration of China (CAC). In mid-August, CAC released a list of 30 algorithms used by companies such as Alibaba, TenCent and Douyin, the Chinese version of Tiktok, with a brief description of their purpose. more

The Hill: FCC Response to Sen. Cruz Reveals Hidden ICANN Agenda in Net Neutrality Order

Fred Campbell reporting in The Hill writes: "It's no secret that controversy has plagued the Obama Administration's plan to surrender U.S. oversight of the Internet domain naming and numbering systems from the current U.S.-based ICANN to the 'global multistakeholder community.' But the reason the Federal Communications Commission (FCC) declined to exercise its statutory jurisdiction over Internet numbering inside the United States was indeed secret until Senator Ted Cruz forced the FCC to explain itself." more

Dot App, Dot Art Among Most Applied-for TLDs According to List Revealed by ICANN

ICANN announced today that it has received 1,930 applications for its new generic Top-Level Domain (gTLD) program. 884 from US based organizations, 40 are from the UK, 303 from the Asia-Pacific region and 17 from Africa. Rod Beckstrom, ICANN's CEO, during the "Reval Day" event that took place in London today said: "The internet is about to change forever -- now a powerful change is coming." more

Jevons Paradox and Internet Centrality

The story of computing and communications over the past eighty years has been a story of quite astounding improvements in the capability, cost and efficiency of computers and communications. If the same efficiency improvements had been made in the automobile industry cars would cost a couple of dollars, would cost fractions of a cent to use for trips, and be capable of travelling at speeds probably approaching the speed of light! more

Carrier Hotels: The Unsung Critical Part of Broadband Connectivity

Today's blog talks about a critical part of the broadband network that most people don't know about -- carrier hotels. These are locations that have been created for the specific purpose of allowing carriers to connect to each other. The need for carrier hotels became apparent in the year after the passage of the Telecommunications Act of 1996. That new law allowed local competition for telephone service. more

Airplanes Vulnerable to Hacking, Says U.S. Department of Homeland Security

Researchers have been able to successfully demonstrate a commercial aircraft can be remotely hacked. more

ccTLD Market Share Catching Up to gTLDs, CENTR Reports

Council of European National Top level Domain Registries (CENTR) has released its latest quarterly Domain Name Stat Report stating that ccTLDs have continued increasing their market share against gTLDs -- this quarter rising from 44% to 45%. ccTLD IDNs continue to grow although at a slightly lower rate. more

Senate Urges Domain Registrars to Combat Russian Election Interference

The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more

Are We Facing the Splinternet?

One of the consequences of the war between Russia and Ukraine is that Russia has largely stopped participating in many large worldwide web applications. Russia has blocked Facebook and Twitter. Other applications like Apple, Microsoft, TikTok, Netflix, and others have withdrawn from Russia. The European Union is in the process of trying to block Russian-generated content, such as the state-owned news outlets of RT (formerly Russia Today) and Sputnik. more

Obama Administration Announces $400 Million Advanced Wireless Research Initiative

Obama Administration announced today a $400 million Advanced Wireless Research Initiative led by the National Science Foundation (NSF). more