In part three of this series of posts looking at emerging internet content relating to coronavirus, we turn our attention to mobile apps - another digital content channel that can be used by criminals to take advantage of people's fears about the health emergency for their own gain.One of the most common attack vectors we have found in our analysis is the use of apps purporting to track global progression of COVID-19, or provide other information, but which instead incorporate malicious content. more
VeriSign today announced that effective July 1, 2010 there will be an increase in registry domain name fees for .com and .net, per its agreements with ICANN. According the press release, the registry fee for .com domain names will increase from $6.86 to $7.34 and the registry fee for .net domain names will increase, from $4.23 to $4.65. more
A Canadian law expected to be introduced next week could greatly assist law enforcement authorities in the country to access date revealing internet-user habits and personal information. Privacy watchdogs caution if the so-called Lawful Access law is passed, it would give police access to webbrowsing history and sensitive personal information, and would grant greater permission to track the cellular phones of suspects -- much of it without the requirement of a warrant. more
At the end of August, the FCC gave final approval to the requirement that ISPs must provide broadband labels. The FCC had originally approved the broadband labels in November 2022 but then received three petitions to further modify the rules. The recent order makes a few minor changes to the original order but largely leaves the original broadband label rules intact. more
A lot of rural areas are going to get fiber over the next five years. This is due to the various large federal grant programs like ReConnect and RDOF. New rural broadband is also coming from the numerous electric cooperatives that have decided to build broadband in the areas where they serve rural electric customers. This is all great news because once a rural area has fiber it ought to be ready for the rest of this century. more
Today, the ITU-T Study Group 15 determined a Recommendation that defines Y.1731 based operations, administration and management (OAM) for MPLS transport networks. This decision sets the stage for a divergence in MPLS development; it creates a situation where some vendors will use the IETF standard for MPLS OAM while other vendors implement the ITU-T Recommendation for OAM. This situation ensures that the two product groups will not work together. more
ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more
The U.S. Federal Communications Commission (FCC) has seemingly joined forces with the marketing arm of the cellular industry in declaring that the spectrum between 7-16 GHz is now considered to be 6G. Chairman Jessica Rosenworcel recently announced that the agency would soon begin looking at the uses for this spectrum for mobile broadband. more
Like any business, service providers must constantly evaluate the success of their operations. For implementations and installments, this is usually done by setting a strategic objective and then measuring progress made towards completion. But for operational teams, success is often measured by the repeated achievement of daily goals aligned to corporate objectives. Setting these benchmarks and collecting this data is accomplished by frequently running key performance indicators (KPIs). more
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says. more
As part of its Transparency Report, Google recently released large amount of data related to unsafe websites. Google groups unsafe websites into two main categories: Malware and Phishing sites. more
Last week, the Internet Corporation for Assigned Names and Numbers (ICANN) was forced to extend the deadline for the new gTLD application to April 20th, after the application system crashed and the technical issue which enabled some applicants to see file names and user names that belonged to other applicants. ... ICANN's decision to extend the deadline is reasonable in the circumstances. more
China's most powerful internet regulator has formally set controls over the country's thriving online broadcasting sector, requiring people live-streaming news and entertainment content to have a licence, among other rules," Zhuang Pinghui reporting today in South China Moring Post. more
An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards. more
According to a recent study from IBM, mid-sized businesses that embrace cloud technology see nearly double the revenue and increased profit growth compared to their more hesitant peers. The study, which included 800 leading global IT professionals, found that the 20% of organizations that had committed more resources to the cloud were reaping significant cost-cutting advantages and improved levels of efficiency. more