/ Most Viewed

China Unveils Broadband Strategy, Aims to Provide Access to All Urban, Rural Areas By 2020

China aims to provide broadband access to all urban and rural areas by 2020, according to the State Council. It is the first time for the country to announce a specific timetable for the development of broadband as "a national strategy," according to the announcement. By 2015, half of the Chinese households are expected to use fixed broadband, 3G mobile coverage rate is expected to reach 32.5 percent, and fiber-to-home services will cover all urban areas. more

Canadian Energy Firms at Bigger Risk of Cyberattack

The Canadian Security Intelligence Service (CSIS) is reported to have warned companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities. more

Malware Detection Declining, Anti-Phishing Filters Detect Less than 50% of Attacks, Says Report

A study comparing best-of-breed computer security vendors suggests more than half of active malware and phishing threats on the Internet go undetected, with an average detection rate of 37% for malware and 42% for phishing. "Given the dynamic nature of today's online threats and the traditionally reactive approach taken by today's malware and phishing detection technology, conventional signature-based solutions are inherently at a disadvantage to keep up," said Panos Anastassiadis, CEO and Chairman of Cyveillance. "Because the majority of damage occurs during the first 24 hours of an attack, early detection of attacks is crucial." more

Nitro Attacks Target the Chemical Industry

New security report has revealed at least 48 companies involved in research, development, manufacturing of chemicals and advanced materials have been victims of a coordinated cyberattack traced to a source in China. The purpose of the attacks, code named Nitro, appear to be industrial espionage, collecting intellectual property for competitive advantage, according to Symantec. more

The Legal Enforceability of PIR’s Public Interest Commitment

Since Ethos announced its investment in PIR last fall, Ethos has welcomed the opportunity to engage with .ORG registrants and users to hear their ideas and answer their questions. We listened to concerns expressed in the community, and we worked to address them. We announced a number of voluntary commitments that Ethos is prepared to make, and then we listened to feedback from the community on the scope of those commitments, as well as on the enforceability of those commitments. more

Human Rights and the Digital Domain Primer - Part 1

The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The digital domain is not limited to the technologies itself, but it has an important ethical dimension that encompasses the values, principles and instruments that inform and govern it. Created by humans for humans, our beliefs, cultural backgrounds, and biases are reflected in the codes we write and the algorithms we create. more

WikiLeaks: Ecuador Has Cut Off Assange’s Internet Access

WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. more

Using Data to Amplify Your Business

The digital realm is bursting with data. The buzz words of today are "big data," and I know you've heard them. There's a reason why. It can boost business in extraordinary ways. But how? Let's first look at what exactly big data is: enormous collections of information developed either internally from the company itself or from a vast array of new media. At times, this data is so large, it cannot be analyzed using standard means of examination. more

Iran Nears Completion of Internet Kill Switch Amid Protests, Says Iran International

Iran is finalizing a nationwide internet isolation system that would allow authorities to disconnect from the global web, as protests continue and external equipment sources, including Huawei, remain shrouded in secrecy. more

New Research Reveals 56% Rise in Cost of Cybercrime

New research indicates cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness. Conducted by the Ponemon Institute, the Second Annual Cost of Cyber Crime Study revealed that the median annualized cost of cybercrime incurred by a benchmark sample of organizations was $5.9 million per year, with a range of $1.5 million to $36.5 million each year per organization. This represents an increase of 56 percent from the median cost reported in the inaugural study published in July 2010. more

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India

A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. more

How to Best Manage the Social Media

The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more

Open Web Foundation Launches to Push Data Portability

A new nonprofit organization called the Open Web Foundation (OWF) launched today with a mission to be an independent non-profit dedicated to the development and protection of open, non-proprietary specifications for web technologies. "The Open Web needs Open Data, Open Date needs Open Specifications," is one of the statements used in today's opening presentation. With backing from some of the biggest companies including Google, MySpace, Facebook, and Yahoo, the foundation plans to serve as a placeholder for "all the legal dirty work that needs to happen in order for data portability to become a reality." more

Highlights from SCTE Cable-Tec EXPO

As a product manager and engineer, I really enjoy attending the technology-oriented Cable-Tec Expo each year. It has a stronger technology focus than many other industry trade shows and it's always a good opportunity to talk to the engineering teams from all of the operators and vendors. more

If You’re Thinking About Applying to Be the Next ICANN CEO…

ICANN is preparing to search for its next CEO. In the past and again now, each of us has been asked for advice about applying for the job. We have willingly offered our perceptions of what the job requires. The general thrust of our advice is to alert the potential applicant about the complexities and demands of the job so they can assess for themselves whether they might be a viable candidate. Our comments in these situations are, of course, purely our own opinions, and are not connected to the official posture of ICANN. more