/ Most Viewed

Trump Expected to Name FCC Commissioner Ajit Pai as Chairman

"Pai, a Barack Obama nominee who has served as the senior FCC Republican for more than three years, could take the new role immediately and wouldn't require approval by the Senate because he was already confirmed to serve at the agency," Alex Byers and Tony Romm reporting in Politico. more

No Apparent Financial or Political Motivation Behind Dyn DDoS Attacks, Says Intelligence Firm

In an after-action analysis of the Mirai botnet attacks on Dyn, business intelligence firm, Flashpoint has assessed with "a moderate degree of confidence" that the perpetrators behind the attack were most likely not politically motivated, and most likely not nation-state actors. more

Best Practices for Implementing IPv6 and Avoiding Traffic Exposures

There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks. As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. more

Trump Administration Backs Repeal of Broadband Privacy Rules

"In a defeat for digital privacy advocates, the House of Representatives voted Tuesday to allow internet service providers to sell information about consumers’ browsing history without their knowledge or consent," Molly Olmstead reporting in Slate. more

Critical Differences Of Public And Private Clouds

Private or public? Both cloud types offer benefits and both have enjoyed significant growth over the last few years. Yet, what's the best bet for your business: The virtually limitless resources of public cloud stacks, or the close-to-home control of private alternatives? Here's a look at some critical differences between public and private clouds... more

UK Announces $28M Fund for Army Cyber Operations Centers

The UK Ministry of Defence has announced a £22m ($28 million) fund for the development of British Army cyber operations centers across the country. more

Russia Is Studying China’s Legislative Experience in Fighting Internet Corruption, Cyber-Terrorism

Russian State Duma deputy, chairman of the Committee on Security and Corruption Control Vasily Piskarev told Russian reporters on Tuesday that Russia is studying China's legislative experience in dealing with corruption, cyber-terrorism and cross-border crime on the Internet. more

ICANN Accountability Proposal Enhances Power of Governments Over Internet, Risks IANA Transition

While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more

Broadband Labels are Here

On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website. more

8 Things to Look for in a Registrar Automation Platform

In today's world, domain name registrars play a very important role in the functioning of the domain name ecosystem. This is in stark contrast from the Registry-dominated industry most of us have been used to seeing over the past decade. After the introduction of New gTLDs, Registrars have been elevated to a strategic and important pedestal because they're the first contact point to end customers of domain names. more

EURid Pauses Brexit Plans

When the UK announced its intention to withdraw from the European Union it was clear to some of us that this would cause complications with .eu and possibly other domain name extensions. Over the past year, it's become clear that the European Commission, who mandate the .eu domain name policy, weren't interested in providing a "soft landing" for impacted registrants of .eu domain names. more

First gTLD Auction Settled; Next Auction Will Be on August 13th

We're pleased to announce that the first Applicant Auction has come to a successful finish! As of this morning, the winners are now the only remaining applicants for the six contested strings... The winning prices totalled $9.01 million, which we have distributed to the other applicants after confirming that their ICANN applications have been withdrawn. more

U.S. Senators Push for Federal Oversight of Advanced AI Systems

Senators Hawley and Blumenthal propose a bipartisan bill requiring federal evaluation of advanced AI systems, aiming to prevent misuse while balancing national security, civil liberties, and technological competitiveness. more

Massive Data Breach Hits HCA: 11 Million Records Compromised

In what is currently the largest healthcare industry data breach, Hospital Corporation of America (HCA) has confirmed the theft of 11 million patient records. HCA, one of the country's most prominent healthcare providers, believes the breach originated from an external storage system used for email automation. more

Internet Society Issues Statement on Developing Cyber Security Policy Initiatives

The Internet Society has released an announcement setting out its views on the development of policy to address the balance between security and privacy. From an Internet perspective and in the context of the growing threat vector from hacking, targeted cyber attacks on networks and individuals, and surveillance, the Internet Society's approach to the development of cyber security policy initiatives is based on the following key considerations. more