/ Most Viewed

Why Foldering Adds Very Little Security

I keep hearing stories of people using "foldering" for covert communications. Foldering is the process of composing a message for another party, but instead of sending it as an email, you leave it in the Drafts folder. The other party then logs in to the same email account and reads the message; they can then reply via the same technique. Foldering has been used for a long time, most famously by then-CIA director David Petraeus and his biographer/lover Paula Broadwell. Why is foldering used? more

A Study on Public Participation in ICANN

The following is an executive summary from the preliminary study by John Palfrey, Clifford Chen, Sam Hwang, and Noah Eisenkraft at the Berkman Center for Internet & Society at Harvard Law School. This study considers to what extent the Internet Corporation for Assigned Names and Numbers (ICANN) has achieved its stated goal of a "representative" and "open" decision-making process. more

A European Perspective on the Equifax Hack: Encouraging Data Security Through Regulation

The Equifax hack is understood to have compromised the personal data of over 140 million individuals. Although recent hacks of other businesses have affected more individuals, the personal data held by Equifax is significantly more sensitive than the data compromised in other hacks and includes Social Security numbers, birth dates, current and previous addresses and driver licence details... (Co-authored by Peter Davis and Brendan Nixon.) more

ICANN Whois Policies Update

According to an article in the October 15, 2004 INTA Bulletin, several new "Policies Applicable to ICANN-Accredited Registrars" will be implemented by the end of 2004. The new Restored Names Accuracy Policy tales effect November 12 and requires that a domain name that was deleted due to the submission of false contact data or lack of response to a registrar's inquiries...  more

U.S. Critical Infrastructure Will Be Attacked Within 2 Years, According to 2017 Black Hat Survey

According to a 2017 Black Hat Attendee Survey, cyberattacks on U.S. enterprise and critical infrastructure are coming soon, and in most cases defenders are not prepared. more

Google Beats Facebook in Popularity Because it Supports More Languages (For Now)

John Yunker co-founder of Byte Level Research and author of The Web Globalization Report Card writes: "The big story this year is that Facebook and Google finished in a numerical tie. But because Google supports more languages (for now), it edged out as the winner. ... Even as we look across all 225 web sites, the number of languages continues to increase. Although the rate of language growth slowed over the past two years -- due in large part to the global recession -- growth continues. This year, the average number of languages increased to 22, up from 20 languages in 2008." more

ICANN’s 9th Status Report: The Goals Are Good

ICANN has made great strides in implementing steps to improve the organization's transparency, accountability, openness - according to their most recent Status Report [PDF]. The report describes the requirements of their MOU with the Department of Commerce and what the organization has done to toward achieving these goals. However, even though the Report makes it sound as if ICANN is on the right track, some troubling issues lay underneath the surface of the Report.  more

Developing Internet of Things Building Blocks


The Internet is undergoing an evolutionary transformation resulting from the explosive growth of things that are interconnected. From single purpose sensors through wearable technologies to sophisticated computing devices, we are creating, exchanging, and consuming more data at rates that would have been inconceivable just a decade ago. The market suggests the average consumer believes this is the best world possible. As technologists, we have a responsibility to consider if we are building an Internet that is in the best interest of the user. more

ICANN Board Appoints 2015 NomCom Chair

During its September 9, 2014 meeting, the ICANN Board selected the Chair of the 2015 Nominating Committee (NomCom). The 2015 NomCom will begin its work In Los Angeles, immediately after the close of ICANN's 51st International Meeting due to be held in mid-October. ICANN's Nominating Committee is charged with identifying, recruiting and selecting nominees of the highest possible quality for key leadership positions at ICANN. more

SEC Reinforces and Expands Its Cybersecurity Guidance for Public Companies

The Securities and Exchange Commission has issued an updated guidance for public companies in preparing disclosures about cybersecurity risks and incidents. more

Damaging Malware Uncovered in the Google Play Store

Android users can choose from 3.718 million applications in the Google Play Store. When installing applications, the majority of consumers trust Google to keep their devices safe from hackers. However, the reality is different. Just back in May 2023, researchers discovered over 101 infected applications in the Android store. Many of these apps counted over 400 million downloads. more

Is Blockchain Causing More Cybersecurity Attacks in the Financial Industry?

There's a lot of misunderstanding about blockchain. A recent study by HSBC, for example, found that 59 percent of customers around the world had never heard of it. Yet, while that alone is quite telling, it's probably more alarming to consider the fact that very same poll revealed that 80 percent of people who had hard of blockchain did not understand what it is. This level of confusion isn't confined to the general population either. more

Enhanced Cooperation in Internet Governance: From Mystery to Clarity?

After three days of intensive discussion the UNCSTD Working Group on Enhanced Cooperation (WGEC) ended its second meeting last week in Geneva. It discussed the results of a questionnaire, which was send out after the 1st meeting of the WGEC (May 2013) and agreed on procedures how to move forward. The WGEC has to report to the forthcoming UNCSTD meeting in May 2014 in Geneva. more

Banning 5G Equipment is a Foolish Strategy

It has become popular today around Washington and the venues of its coerced allies to issue threats to ban telecommunications equipment from certain countries - especially equipment intended for 5G use. The guise is vague assertions of "national security." It is an old tactic dating back to the turn of the last century and recurrent for decades. A combination of treaty instruments and collaborative industry standards activity several decades ago largely put an end to the banning tactic - significantly benefitting the entire world. more

The Open Internet?

I'm sure we've all heard about "the open Internet." The expression builds upon a rich pedigree of term "open" in various contexts. For example, "open government" is the governing doctrine which holds that citizens have the right to access the documents and proceedings of the government to allow for effective public oversight, a concept that appears to be able to trace its antecedents back to the age of enlightenment in 17th century Europe. more