/ Most Viewed

Pro-Trump Russians Accused for Democratic National Committee Email Hack, FBI Investigating

"DNC Hack Prompts Allegations of Russian Involvement," Damian Paletta and Devlin Barrett reported in the Wall Street Journal today: "U.S. authorities said they are still investigating who perpetrated the hack, but cybersecurity experts said the email release resembled past examples of political interference that other countries have tied to Russia." more

Republicans Barreling Toward a September Showdown Over IANA Transition

Republicans gear up for fight against internet transition," Ashley Gold and Tony Romm reporting in the POLITICO today. more

Neighbours Create Their Own Internet Service on Orcas Island

Faced with slow and outage-prone Internet access, residents of Orcas Island, one of the San Juan Islands in Washington state, decided to design their own network and built it themselves. more

Australian Government Opposed to Creation of Adult-Themed TLDs

Andrew Colley of Australian IT reports the AusRegistry, the operator of Australia's Top-Level Domain (.au), has revealed that it has been approached by various groups planning to submit applications to ICANN for the creation of adult-themed generic Top-Level Domains (gTLDs) such as .xxx and .sex. According to the report, the Australian Communications Minister Stephen Conroy has opposed the idea syaing: "The government does not support the creation of the .xxx TLD." As it has been reported extensively on CircleID, previous attempts to create adult related TLDs (such as .xxx) have so far been rejected by ICANN. more

Escalating US, Chinese Silent War on the Internet

Jason Mick reporting in DailyTech: "In the definitive cyberpunk novel Neuromancer, published in 1984, author William Gibson prophetically envisioned that wars of the future would be fought over the internet -- a new construct at the time. Today that prediction appears on the verge of coming true as we stand on the threshold of a vast digital battle. Agents in China, believed to be working for, or endorsed by the Chinese federal government are carrying out a secret cyberwar against the U.S. government and U.S. businesses. And that war appears to be escalating." more

ICANN Is Violating Its Legal Agreements with the U.S. Government – Who’s Next?

In April, I published an article, The Multistakeholder Moment of Truth: Will Stakeholders Hold ICANN Accountable?, alerting stakeholders that ICANN is violating its legal agreements with the U.S. Government -- namely the InterNIC licensing agreement and merged Memorandum of Understanding. At that time, I warned that it is essential for stakeholders not to remain silent in the face of this transgression, "hoping that such behavior left unchecked will end of its own accord." more

Latvian ISP Closure Dents Cutwail Botnet ...for a Whole 48 Hours

From MessageLabs' latest report: "Real Host, an ISP based in Riga, Latvia was alleged to be linked to command-and-control servers for infected botnet computers, as well as being linked to malicious websites, phishing websites and 'rogue' anti-virus products. Real Host was disconnected by its upstream providers on 1 August 2009. The impact was immediately felt, where spam volumes dropped briefly by as much as 38% in the subsequent 48-hour period. Much of this spam was linked to the Cutwail botnet, currently one of the largest botnets and responsible for approximately 15-20% of all spam. Its activity levels fell by as much as 90% when Real Host was taken offline, but quickly recovered in a matter of days." more

The State of Internet Traffic (After Dark)

According to a recent research, European Internet traffic peaks in the early everning and drops off soon after until the next business day hours while in the United States, internet traffic reaches its peak at 11 p.m. EDT and stays relatively high until 3 a.m. in the morning. "The question is what are Internet users doing after dark?" Craig Labovitz of Arbor Networks reportsmore

Survey Suggests Strained Budgets Causing Security Cutbacks on Known Threats

A recent survey of security professionals by RSA Conference with regards to critical security threats and infrastructure issues currently faced, revealed budgetary constrains as the top challenge currently faced. According to reports, the study suggests that even though practitioners are most concerned about email phishing and securing mobile devices, technologies addressing these needs are at risk of being cut from IT budgets. 72% percent of respondents indicated a rise in email-borne malware and phishing attempts since Fall 2008, with 57% stating they have seen an increase in Web-borne malware. Concerns about zero-day attacks and rogue employees as a result of layoffs were cited by 28% and 26% of survey respondents, respectively. more

Whither Cyber-Insurance?

When you go to the doctor for a yearly checkup, do you think about health or insurance? You probably think about health, but the practice of going to the doctor for regular checkups began because of large life insurance companies in the United States. These companies began using statistical methods to make risk or to build actuarial tables they could use to set the premiums properly. Originally, life insurance companies relied on the "hunches" of their salesmen, combined with... more

US Law-Enforcement Agencies Reported to be at Risk in Foreign-Owned Buildings

US law-enforcement agencies are at risk of being spied on and hacked because some of their field offices are located in foreign-owned buildings without even knowing it. more

Google Announces Experiment with Post-Quantum Cryptography

Google is experimenting with new cryptography to future-proof Internet communications against quantum computers. Matt Braithwaite, Google Software Engineer in a blog post on Thursday wrote: "Quantum computers are a fundamentally different sort of computer that take advantage of aspects of quantum physics to solve certain sorts of problems dramatically faster than conventional computers can." more

Can Legislatures Safely Vote by Internet?

It is a well understood scientific fact that Internet voting in public elections is not securable: "the Internet should not be used for the return of marked ballots. ... [N]o known technology guarantees the secrecy, security, and verifiability of a marked ballot transmitted over the Internet." But can legislatures (city councils, county boards, or the U.S. Congress) safely vote by Internet? Perhaps they can. To understand why, let's examine two important differences between legislature votes and public elections. more

The .nyc High-Bid Auctions

There were highs and lows in city hall's rollout of the .nyc TLD last month. Early on we were cheered when we received notification that our application for the JacksonHeights.nyc domain name had been approved. And with the de Blasio Administration committed to putting the city's 350+ neighborhood domain names under the control of local residents, we began to imagine that our decade-old vision of an "intuitive" city Internet might materialize... more

United States and Britain to Conduct Financial Cyber-Security Test

U.S. and Britain plan to conduct a test later this month to assess how regulators for the world's two biggest financial centers in New York and London would communicate in the event of a major cyberattack or broader IT problems, a spokesman for British government cybersecurity body CERT-UK said on Monday. more