/ Most Viewed

New Study Revealing Behind the Scenes of Phishing Attacks

The following is an overview of the recent Honeynet Project and Research Alliance study called 'Know your Enemy:Phishing' aimed at discovering practical information on the practice of phishing. This study focuses on real world incidents based on data captured and analyzed from the UK and German Honeynet Project revealing how attackers build and use their infrastructure for Phishing based attacks. "This data has helped us to understand how phishers typically behave and some of the methods they employ to lure and trick their victims. We have learned that phishing attacks can occur very rapidly, with only limited elapsed time between the initial system intrusion and a phishing web site going online..." more

Massive Spam and Malware Campaign Following Boston Tragedy

On April 16th at 11:00pm GMT, the first of two botnets began a massive spam campaign to take advantage of the recent Boston tragedy. The spam messages claim to contain news concerning the Boston Marathon bombing, reports Craig Williams from Cisco. The spam messages contain a link to a site that claims to have videos of explosions from the attack. Simultaneously, links to these sites were posted as comments to various blogs. more

Susan Crawford, Kevin Werbach Named Obama’s FCC Review Team Leads

We'd like to congratulate our long time CircleID participants, Susan Crawford and Kevin Werbach for being named today as Obama-Biden FCC Transition Team Leads. Susan Crawford, is a professor at the University of Michigan Law School who recently ended her term as a member of the Board of Directors of ICANN and is the founder of OneWebDay. Kevin Werbach, is an Assistant Professor of Legal Studies at The Wharton School, University of Pennsylvania. He is also the founder of the Supernova Group and the organizer of Supernova, a leading executive technology conference. more

Oklahoma Spammer Fighter Loses Even Worse

Last December I wrote about Mark Mumma, who runs a small web hosting company in Oklahoma City and his battle with Omega World Travel a/k/a cruise.com. Mumma lost his CAN SPAM suit agains them in December, but Omega's countersuit for defamation went to trial last week, and I hear that the jury awarded Omega $2.5 million in damages, which Mumma is not likely to be able to pay. This may be painted in some circles as a huge defeat for anti-spam activists, but it's not... more

U.S. Military Is Buying Location Data of People Around the World Through Ordinary Apps

The U.S. military is buying the granular movement data of ordinary people worldwide, harvested from innocuous-seeming apps, reports Motherboard. Among the apps connected to this type of data sale is a Muslim prayer and Quran app with more than 98 million downloads worldwide. more

IPv4 Market Heats Up While Supply Dwindles

Doug Madory, Director of Internet Analysis at Dyn reports that while the available supply of IPv4 addresses is in sharp decline, the market for these virtual commodities is heating up. In recent months, the pace of the address transfers has greatly accelerated as evidenced by RIPE's table of IPv4 transfers, as well as the increasing number of IPv4 brokers facilitating the exchange of IPv4 address space. more

Internet Governance Back in the Limelight

In my special role as adviser to the UN Broadband Commission I reported extensively in 2013 on the WCIT-12 conference in Dubai. Unfortunately the world disagreed on a way forward in relation to internet governance. However, despite all the grandstanding of the USA and its western allies, simply ignoring it and saying "there is no room for governments to be involved in internet governance" - will not make the issue go away. more

Spectrum Crisis: Wireless Auctions Preferred Method

Talk, conjecture and analysis have predicted a wireless spectrum crisis for years. The official word seems to project a culmination of dropped calls, slow loading of data, downright network access denials as impending by 2015. If so, then we should look at the current argument about how that additional spectrum can be disseminated to wireless carriers in a fair and balanced fashion. more

Internet Governance Forum USA 2016 on Thursday, July 14

IGF-USA full day conference at the Center for Strategic and International Studies (CSIS) in Washington DC to be held on Thursday, July 14, 2016 from 8:00 AM - 7:00 PM. Key forum topics include IANA transition, ICANN accountability, broadband access, online privacy, Internet of Things, and digital trade. more

ICANN Board Appoints 2015 NomCom Chair

During its September 9, 2014 meeting, the ICANN Board selected the Chair of the 2015 Nominating Committee (NomCom). The 2015 NomCom will begin its work In Los Angeles, immediately after the close of ICANN's 51st International Meeting due to be held in mid-October. ICANN's Nominating Committee is charged with identifying, recruiting and selecting nominees of the highest possible quality for key leadership positions at ICANN. more

The Risk Factors of CDNs and Centrality

On the afternoon of June 17 of this year, there was a widespread outage of online services. In Australia, it impacted three of the country's largest banks, the national postal service, the country's reserve bank, and one airline operator. Further afield from Australia, the outage impacted the Hong Kong Stock Exchange and some US airlines. The roll call of affected services appeared to reach some 500 serv more

Corporate Email Phishing Scams Result in $3.1B Loss, Near 1300% Increase in 18 Months

Total number of Business Email Compromise (BEC) related crimes have reached epidemic levels, at nearly $3.1 billion in losses and involving 22,143 victims worldwide since January 2015, according to a new FBI report. more

DNS Reflection/Amplification Attack: Proved

Last year there was a "threat" by anonymous group to black out Internet by using DNS Reflection/Amplification attack against the Internet DNS Root servers. I even wrote a little article about it: "End of the world/Internet". In the article I was questioning if this was even possible and what was needed as general interest and curiosity. Well, looking at the "stophaus" attack last week, we are getting some answers. more

Industry Insights: RDAP Becomes Internet Standard

Earlier this year, the Internet Engineering Task Force’s (IETF’s) Internet Engineering Steering Group (IESG) announced that several Proposed Standards related to the Registration Data Access Protocol (RDAP), including three that I co-authored, were being promoted to the prestigious designation of Internet Standard. Initially accepted as proposed standards six years ago, RFC 7480, RFC 7481, RFC 9082 and RFC 9083 now comprise the new Standard 95. RDAP allows users to access domain registration data and could one day replace its predecessor the WHOIS protocol. more

China Favouring Digits Over Letters When It Comes to Internet Addresses

When it comes to Internet addresses in China, use of digits have been preferred over letters for various reasons including ease of memorization. Christopher Beam from New Republic explains. more