/ Most Viewed

Chinese Hackers Exploit U.S. Telecom Systems, Eviction Efforts Lag

American officials have revealed an ongoing struggle to expel Chinese hackers from telecommunications networks, months after the espionage was first discovered. The campaign, attributed to a group called "Salt Typhoon," has infiltrated major telecom carriers, particularly in the Washington region. more

Can Cellphones Capture the Broadband Market?

Linda Hardesty wrote an interesting article in FierceNetwork that asks the question, "What if, in ten years, young people don't subscribe to fixed broadband at all?" Her story is based on a U.K. research group that predicts that within ten years, there will be a lot of young people who will never have subscribed to a landline broadband product. more

Humans’ Best Defense Against Cybersecurity

At regular intervals, I have discussed the cybersecurity situation in Australia. In those assessments, I wrote about my frustration that the previous government policies more or less resembled a fire brigade approach. Trying to address individual incidents with regulations and legislation rather than coming up with a holistic strategy. more

AusRegistry Celebrates 30th Anniversary of .au

It's been 30 years since the .au country code top-level domain was first deployed to give Australians their own national TLD. Over 3 million .au domain names have since been registered. more

Escalating Violence in Iraq Leads to Internet Shutdown

The escalating violence in Iraq has resulted in government shutting the the local Internet access according to a report by Renesys today. From the report: "Renesys has observed two large Internet outages this week that our sources confirmed to be government-directed outages. These interruptions appear to coincide with military operations, amid concerns that ISIL forces are using Internet websites to coordinate their attacks." more

Internet Three Strikes Laws Violate International Law, Says UN Report

Michael Geist reporting in his blog: "The United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression has released an important new report that examines freedom of expression on the Internet. The report is very critical of rules such as graduated response/three strikes, arguing that such laws may violate the International Covenant on Civil and Political Rights. Moreover, the report expresses concerns with notice-and-takedown systems, noting that it is subject to abuse by both governments and private actors." more

Antigua to Host CaribNOG 18 in September

Antigua and Barbuda will host the eighteenth regional meeting of the Caribbean Network Operators Group (CaribNOG) from September 25 to 27. CaribNOG is a vibrant community of professionals committed to improving the region’s networks, expanding the technical capacity of those who build and secure them, and strengthening the interconnections among all actors in the Internet space. more

Google Fiber Expanding to Four More Cities

According to news sources Google's fiber-to-the-home service is expanding to four additional cities: Atlanta; Nashville, Tennessee; Charlotte and Raleigh-Durham, North Carolina. Google Fiber currently is available in Kansas City, Austin, Texas and Provo, Utah. At a price tag of $80 per month, the service offers speeds around 10 times greater than that of the average Internet connection. more

New Ways Cybercriminals are Thwarting Security

M86 Security today released it's bi-annual security report for the first half of 2010, highlighting the evolution of obfuscation through combined attacks. From the report: "This threat trend is the latest to emerge as cybercriminals seek new ways to limit the effectiveness of many proactive security controls. Because existing techniques for 'covering their tracks' are becoming less effective, cybercriminals have begun using combined attacks, which are more complex and difficult to detect. By splitting the malicious code between Adobe ActionScript language - built into Adobe flash - and JavaScript components on the webpage, they limit the effectiveness of many of the the proactive security detection mechanisms in place today." more

ICANN Releases 5th Round of Initial Evaluation Results - 169 TLDs Pass

Mary Iqbal writes to report that ICANN has released the fifth round of Initial Evaluation results, bringing the total number of applications that have passed the Initial Evaluation phase to 169. ICANN is targeting completing Initial Evaluation for all applicants by August 2013. more

Canada Becoming the New Cybercrime Hub, Quickly Replacing China, Eastern Europe

A recently conducted analysis of Canada's cyber security risk profile by Websense has detected trends indicating Canada is becoming the new launchpad for cybercriminals. Sr. Manager, Security Research at Websense in a blog post writes: "Cybercriminals are on the move again. And, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense evaluation. So hackers are on a quest to move their networks to countries, like Canada, that have better cyber reputations." more

10 Years of ICANN

ICANN, the Internet Corporation for Assigned Names and Numbers, was officially incorporated on 30 September 1998 as a nonprofit public benefit corporation. Headquartered in Marina Del Rey, California, United States, ICANN was assigned to oversee a number of Internet-related tasks originally performed directly on behalf of the U.S. government by other organizations, such as the Internet Assigned Numbers Authority (IANA). Back in 1998, there was only one domain name registrar; now there are over 900 ICANN-accredited registrars in the world and over 168 million domain names registered. more

Hacking Group Anonymous Claims Responsibility for Massive Cyberattack on Turkey

The hacking group Anonymous has claimed responsibility for a massive cyberattack on Turkish internet servers over the past week, saying it will continue its assault if Turkey "doesn't stop supporting" Islamic State in Iraq and the Levant (Isil). more

Back to the Future Part IV: The Price-Fixing Paradox of the DNS

GenX-ers may remember spending a summer afternoon at the movie theater and seeing the somewhat corny but beloved antics of Marty McFly and Doc as they used a souped-up Delorean to travel the space-time continuum. In Back to the Future Part II, Doc and Marty travel into the future, where the bullying, boorish Biff causes a time-travel paradox when he steals the Delorean and takes a joyride into the past to give his younger self a sports almanac containing the final scores of decades worth of sporting events. more

Duqu Reported as Precursor to a Future Stuxnet-Like Attack

Virus researchers at Symantec Corp. have revealed a variant of the Stuxnet worm, named Duqu, that is found to be stealing information about industrial control systems. Symantec reports: "Duqu's purpose is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility... Parts of Duqu are nearly identical to Stuxnet, but with a completely different purpose." more