/ Most Commented

ICANN President, CEO to Step Down July 2012

Rod Beckstrom announced today that he will be ending his work at the the Internet Corporation of Assigned Names and Numbers (ICANN) by July of next year. Beckstrom, a former U.S. cybersecurity chief, was elected as the President and CEO of ICANN in Jun of 2009 following Paul Twomey who had been serving the position since March 2003. more

Is FttH Future-Proof Infrastructure?

Telecoms engineers from all of the major telecoms services and equipment companies around the world agree that FttH is the only future-proof telecommunications technology. So who should we trust - the technology experts or politicians with different agendas? If there had been a division of opinion among these experts it would have been necessary to investigate it; but if they are all in agreement it is safe to follow their advice. more

Broadband Speeds Will Affect Saleability of Properties in the UK

Paul Budde writes: According to the Office of National Statistics in the UK, 85% of the population are regular internet users. With advances in internet technology, individuals and businesses are becoming increasingly more reliant on having instant access to high speed broadband. Statistics show that 69% of UK internet users would be put off from purchasing a home if it did not have a high speed internet connection. more

Anonymous, LulzSec, and the Option of Internet Security

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

Integrating the GAC More Effectively

We all may have breathed a sigh of relief when the ICANN Governmental Advisory Committee (GAC) and the Board concluded their eleventh-hour negotiations on new generic Top-Level Domains (gTLDs) with some measure of success, but we can all agree that panicked policymaking is, at best, less than optimal. ICANN needs to integrate GAC input more effectively. The Final Report recently issued by the Joint Working Group (JWG) of the ICANN Board and the GAC contains several thoughtful and productive recommendations. more

DDoS Attacks: Don’t Be In Denial of the Risks

Unlike traditional attacks by hackers which breach a business's security systems, resulting in defaced websites, intellectual property theft and/or customer data theft, a DDoS attack focuses on making a business's Internet connected infrastructure (e.g. web servers, email servers, database servers, FTP servers, APIs, etc.) unavailable to legitimate users. A business's brand reputation, which can take years to establish, can be swept away in just a few hours from a single DDoS attack in the same way a natural disaster like a flood or earthquake can impact a traditional brick and mortar business. more

Survey: Public Interest Representation in the Information Society

All civil society organisations and other self-identified public interest representatives in the regime of Internet governance and related areas of information and communications policy are invited to complete a survey titled Public interest representation in the information society. This survey contributes towards the development of a map of Internet governance... more

New Research Reveals 56% Rise in Cost of Cybercrime

New research indicates cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness. Conducted by the Ponemon Institute, the Second Annual Cost of Cyber Crime Study revealed that the median annualized cost of cybercrime incurred by a benchmark sample of organizations was $5.9 million per year, with a range of $1.5 million to $36.5 million each year per organization. This represents an increase of 56 percent from the median cost reported in the inaugural study published in July 2010. more

Google Objects to Hostile Organized Campaign Against Android; Accusing Microsoft, Apple, and Others

Google has accused Microsoft, Oracle, Apple and other companies for waging an organized campaign against Android through "bogus patents". Google's Senior Vice President and Chief Legal Officer, David Drummond, in a blog post yesterday wrote: "I have worked in the tech sector for over two decades. Microsoft and Apple have always been at each other's throats, so when they get into bed together you have to start wondering what's going on. Here is what's happening..." more

ANA “Vigorously” Opposes Implementation of ICANN’s New gTLD Program, Citing Major Flaws

In a letter to Mr. Rod Beckstrom, President, Internet Corporation for Assigned Names and Numbers (ICANN), the Association of National Advertisers (ANA) has expressed major flaws in ICANN's program for introducing new generic Top-Level Domains. A program which ANA warns would allow as many as 1,000 new Top-Level Domains in the first year and the same cap every year thereafter. more

Another Day, Another Set of Hacking Attacks. News At 11.

While reading Reuters I came across a news article indicating that a number of high profile agencies - from the United Nations to the Canadian Government to government of Taiwan - were broken into over a period of the past five years. ... I'll say it right now, even though I haven't been briefed on it. It was China. more

US Department of Transportation Seeking Help for Motor Vehicle Cybersecurity Safeguards

The U.S. Department of Transportation (USDOT), Research and Innovative Technology Administration (RITA) and Volpe National Transportation Systems Center (Volpe Center), today released a Request for Information (RFI) seeking to obtain informed views on the "perceived needs, prevailing practices, and lessons learned concerning the cybersecurity and safety of safety-critical electronic control systems used in various modes of transportation and other industry sectors."
 more

Web.com to Acquire Network Solutions

Internet's oldest domain name registrar, Network Solutions, today announced that it has agreed to be acquired by Web.com. Network Solutions was founded in 1979 and pioneered the domain name registration business. In addition to domain name registration, the company also offers services such as web site design and hosting, e-commerce solutions, online security products, SSL certificates, and search engine marketing and optimization. According to Network Solutions, the company manages over 7 million domains, 3 million email boxes and more than 400,000 web sites. more

Smartphones: Too Smart for Mobile Operators?

In June, the net neutrality debate took an unexpected turn when the Netherlands leap-frogged the USA to became the first country to legislate for mobile net neutrality. Business models for fixed and mobile networks must shift toward volume charges. The net neutrality debate has been seen not having much relevance outside the USA because the plight of carriers there was aggravated by unlimited usage. more