/ Most Viewed

IPv6 Security Myth #6: IPv6 is Too New to be Attacked

Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools. more

Rise of the Caribbean Mobile Market

It is no secret that in the Caribbean people are crazy about their cell phones. In fact, the Caribbean has one of the highest levels of mobile phone penetration in the world. According to a report from BuddeComm, an Australia-based telecom research firm, mobile phone penetration in Latin America and the Caribbean reached an estimated 80% in early 2009, well above the world average which was about 58%. The report stated that Latin America and the Caribbean together now account for an estimated 12% of the world's 3.97 billion mobile subscribers. more

Domain Seizures for Copyright Infringement Likely to Move Beyond U.S. Based Registries

Efforts to take down websites for copyright infringement are likely to move beyond U.S.-based domain name registries, with ICANN promising to more closely cooperate with global law enforcement agencies and governments. During an open session with the Government Advisory Committee (GAC), the ICANN board confirmed that it will enforce its contracts with registrars more effectively in order to meet expectations from governments and law enforcement authorities. more

The ENISA Botnet Report: Thoughts on the State of Play in Smart Phones

At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come home with was: we can still count the numbers of mobile viruses manually, <600; the problem will never be the same as on a fixed network as traffic is monitored and metered: We detect it straight away. We are studying the problem seriously. Are mobile operators really prepared for what is coming? more

Working Group on Internet Governance Releases Report

The Working Group of Internet Governance has released its final report [PDF]. As I wrote this week in my Law Bytes column, the report comes on the heels of the U.S. statement that it has no intention of surrendering control of root zone file. The WGIG report developed a working definition of Internet governance that states: "Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet."... more

Whois: If You Want Privacy, Pay For It

Netchoice, a lobbying group for the e-commerce industry had a strange reaction on the failure of the GNSO working group on Whois to reach a consensus. After all, they say, "Privacy concerns with Whois that were identified years ago have already been addressed by in the marketplace"... more

Which Domains Stand the Strongest Against Phishing Attacks?

The latest Anti-Phishing Working Group (APWG) Global Phishing Survey, which analyzed over 100,000 phishing attacks in the first half of 2014, examines the progress that top level domains (TLDs) are making in responding to phishing attacks that use their TLDs. The report finds the .INFO domain has the lowest average phishing uptimes as compared to other TLDs, such as .COM and .NET. more

Snowshoe Spam: What It Is, and How Not to Look Like You Send It

Have you ever found yourself blocked by a snowshoe spam filter or listed on a snowshoe blacklist? Or perhaps you've been told that one of your mailing practices makes you look like a snowshoe spammer? If so, you're probably wondering what snowshoe spam is, what you're doing to earn this reputation and what you should be doing differently. Here's a brief overview of the history of snowshoe and some suggestions on how to avoid being mistaken for a snowshoe spammer. more

The Highest Threat TLDs - Part 2

In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual top-level domains (TLDs) or domain extensions, using data from CSC's Fraud Protection services, powered by our DomainSecSM platform. In this second article, we analyze multiple datasets to determine the highest-threat TLDs, based on the frequency with which the domains are used egregiously for a range of cybercrimes. more

New Research from CSC on the Impact of COVID-19 on Internet Security and Safety

Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. more

Netflix Becomes Largest Source of Internet Traffic in North America

Netflix has become the largest source of Internet traffic in North America, according Sandvine's Spring 2011 Global Internet Phenomena Report. Company further reports that currently, Real-Time Entertainment applications consume 49.2% of peak aggregate traffic, up from 29.5% in 2009 -- a 60% increase [see figture]. Sandvine forecasts that the Real-Time Entertainment category will represent 55-60% of peak aggregate traffic by the end of 2011. more

How the Internet Can Be Enormously Accelerated Without Fiber-Optic Cables or LEO Satellites

We got used to it: if we open a website, it's always like stop and go on a high-traffic highway or city traffic jam. At some point, we will reach the destination. The constant stalling is due to a traffic rule for the Internet called TCP (Transmission Control Protocol). The TCP/IP protocol family comes from the American defense industry. It was introduced by DARPA (Defence Advanced Research Projects Agency) in the early 1970s. At that time, no one had the Internet as the need of the masses on the screen. more

Internet Stewardship Transition Critical to Internet’s Future

This article was co-authored by Ambassador Daniel A. Sepulveda, serving as U.S. Coordinator for International Communications and Information Policy at the U.S. Department of State, Christopher Painter, serving as Coordinator for Cyber Issues at the U.S. Department of State and Scott Busby, serving as Deputy Assistant Secretary of State for Democracy, Human Rights and Labor. ... The growth of the global Internet as an open platform for innovation and economic and social development has succeeded in large part because of its multistakeholder system of governance. more

The Digital Decade – A Look Ahead

As 2019 wrapped up, we took some time to reflect on some of the most impactful digital developments of the past decade and how they helped change our digital lives, including: the rise of mobile and tablet usage; the importance of mobile apps; the explosion of social media and online gaming; cloud computing; domain names, brand protection and the impact of GDP. Now that we've passed the New Year, it's time to look forward. more

IDN Introduction Biggest Technical Change to Internet in Its 40-Year History, Says ICANN Chairman

The Internet is on the verge of undergoing one of its most significant changes in its 40-year history. The Internet Corporation for Assigned Names and Numbers (ICANN) is finalizing plans to introduce non-Latin characters such as Arabic, Korean, Greek, Hindi, Japanese and Cyrillic. Non-Latin domain names -- commonly referred to as Internationalized Domain Names or IDNs -- could be up and running as early as middle of next year according to ICANN. Peter Dengate Thrush, chairman of the ICANN board, told reporters: "This is the biggest change technically to the Internet since it was invented 40 years ago... [a] fantastically complicated technical feature." more