/ Most Viewed

Energy Industry Number One Target by Cyber Criminals, According to New Study

Web security company, ScanSafe reports that, in the past quarter, companies in the Energy industry faced the greatest risk of Web-based malware exposure, at a 196% heightened risk compared to other verticals. The Pharmaceutical and Chemicals industry faced the second highest risk of exposure at 192% followed by the Construction & Engineering industry at 150%. The Media and Publishing industry were also among those at highest risk, with a 129% heightened risk compared to other verticals. more

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more

.ORG Stewardship Council Will Ensure .ORG’s Commitment to Freedom of Expression Continues

The .ORG Stewardship Council is, in a lot of ways, a natural progression or evolution from our current PIR Advisory Council. The Advisory Council is made up of independent .ORG community members from around the world that provide advice to PIR on policy issues affecting them. The "AC," or the Advisory Council, has been a key part of PIR's work since its inception. more

US Senators Move to Shield Undersea Internet Cables from Global Threats

A bipartisan Senate bill seeks to strengthen U.S. oversight and global coordination to protect undersea fiber-optic cables, vital infrastructure increasingly targeted by geopolitical adversaries, natural disasters, and cyber or physical sabotage. more

Controversial Chinese Cybersecurity Law Gets 3rd Reading

The controversial Chinese cybersecurity law that has been sparking objections amongst foreign governments and business groups reached a step closer to approval today as parliament held the third reading of the draft bill. more

Fake Anti-Virus Peddlers Taking Aggressive Steps to Avoid Detection

Over at Krebs on Secrity blog, Brian Krebs reports: "Purveyors of fake anti-virus or 'scareware' programs have aggressively stepped up their game to evade detection by legitimate anti-virus programs, according to new data from Google. In a report being released today, Google said that between January 2009 and the end of January 2010, its malware detection infrastructure found some 11,000 malicious or hacked Web pages that attempted to foist fake anti-virus on visitors." more

NetNeutrality Rules to Be Stifled Under Trump Presidency, Experts Fear

"Donald Trump's presidential election victory has increased the chances that President Barack Obama's landmark net-neutrality rules could be rolled back," John D. Mckinnon and Shalini Ramachandran reporting in the Wall Street Journal today. more

Implications of California Telecom Attack Gone Un-Reported

In an article titled "A Cyber-Attack on an American City", Bruce Perens writes: "Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities..." more

The History of Broadband Price Competition

It's sometimes easy to forget that the broadband business is just over twenty-five years old. The telephone companies had a monopoly on copper-based technologies until Congress passed the Telecommunication Act of 1996, which forced the big telephone companies to allow competition for copper-based broadband services. more

What Trump and Clinton Said About Cybersecurity in the First US Presidential Debate

The Internet and tech got very little mention last night during the first of three presidential debatest. The only notable exception was cybersecurity where moderator Lester Holt asked: "Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who's behind it? And how do we fight it?" The following are the responses provided to the question by the two candidates. more

Can a CDN Help Website and Application Performance?

Before we answer the question, "Can a CDN help your website and application performance," let's take a moment for a short CDN 101. A CDN (content delivery or content distribution network) is a system of computers placed at different network nodes to provide the same content from the shortest distance possible. In other words, a CDN attempts to take pieces of content from your website and pass it to various nodes around the Internet. more

Former New York City Mayor Ed Koch Announces Support for dotNYC Plan

Former New York City Mayor Edward I. Koch announced Thursday he is supporting dotNYC LLC's bid to operate the .NYC web address. City Council Speaker Christine Quinn disclosed during her State of the City speech in February that the City Council and Office of the Mayor will pursue the .NYC top-level domain. The city last month completed a Request for Information about .NYC and is expected to endorse a company to run the .NYC address this summer. more

Syria’s Undersea Cable Repairs Will Take Down 60% of Nation’s Internet for Close to 10 days

Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. more

Study Ranks Riskiest Online Cities in US

A recent study by Symantec Norton and Sperling's Best Places has ranked 50 cities in the United States by "Riskiest Online Cities". The study included investigation of a number of factors including... more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more