/ Most Viewed

Illusory Correlation and Security

Fear sells. Fear of missing out, fear of being an imposter, fear of crime, fear of injury, fear of sickness ... we can all think of times when people we know (or worse, people in the throes of madness of crowds) have made really bad decisions because they were afraid of something. Bruce Schneier has documented this a number of times. For instance: "it's smart politics to exaggerate terrorist threats" and ... more

EFF: Net Neutrality Not Dead Yet

A number of news sources marked Monday, April 23, as the day Net Neutrality died. EFF in response posted a blog clarifying that the case is not true. more

Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation

Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more

Opposition Mounts in Europe to Three-Strikes Proposals

Multiple reports today indicate that opposition is growing in Europe to plans for three-strikes policies that could lead to the termination of Internet access for some subscribers. In the U.K., protests are mounting over those plans in the recently introduced Digital Economy Bill. The BBC reports that thousands of people have signed a petition urging the government to reconsider its approach, while the Open Rights Group says it has seen a big spike in membership. more

Notorious Hacker Group XENOTIME Expands Its Targeting Beyond Oil and Gas to Electric Utility Sector

XENOTIME, the notorious group behind what is regarded as the most dangerous malware targetting industrial control systems has expanded its targeting beyond oil and gas to the electric utility sector. more

Join InterCommunity 2015 on July 7/8 to Talk Future of Internet Governance, Security, Access

What are the most pressing Internet governance issues in the next 2-5 years? What are the biggest priorities in terms of making the Internet more secure and trusted? What are the best ways to bring the next 3 billion people online? Those will all be topics of discussion at the "InterCommunity 2015" meeting taking place this week on July 7 and 8. The meeting will not take place at any one physical location... more

Spam Volumes In 2010

I started hearing various people comment about lower spam volumes sometime in mid December. This isn't that unusual, spam volumes are highly variable and someone is always noticing that their spam load is going up or going down. The problem is extrapolating larger trends from a small selection of email addresses. more

IPv4: Business As Usual

This year, we expect that the RIPE NCC's pool of unallocated IPv4 addresses will reach the "last /8", meaning that we have 16,777,216 IPv4 addresses left in the available pool. At that point it will no longer be possible for RIPE NCC members to obtain the amount of IPv4 addresses they will require to expand their current and future networks. When we hit the last /8, the RIPE NCC will only be able to distribute IPv6 addresses and a one-off allocation of IPv4 address space... Has this caused a last minute rush? more

ICANN-JPA Coverage

At the end of this month, September 30th, the Joint Project Agreement (JPA) between the Internet Corporation for Assigned Names and Numbers (ICANN) and the U.S. Department of Commerce (DoC) will come to an end. While ICANN has affirmed its commitment in maintaining a long-term, formal relationship with the United States, talks of new changes and a more independent ICANN is intensifying as the expiration date is quickly approaching. For the next upcoming days, this page will be frequently updated with related news and updates. more

EU CRA: Regulatory Extremism and Exceptionalism

European Union (EU) legislators, like most of the world, are troubled about the increasing number and severity of cybersecurity incidents. However, unlike most of the world, which is taking a flexible, adaptive Zero Trust Model approach of continuous controls for cyberdefense, the EU government is pursuing a vastly expanded version of the failed Common Criteria certification model coupled with regulatory extremism and exceptionalism strategies. more

Several Major Tech Companies File Suit Against FCC Over Net Neutrality Repeal

Several major tech companies, including Kickstarter, Foursquare and Etsy, filed a lawsuit today against the Federal Communications Commission in an effort to preserve net neutrality rules. more

Book Review: Forks in the Digital Road - Key Decisions in the History of the Internet

At first glance, this book looks like another history of the Internet, but it is much, much more. The authors use their engineering and scholarly understanding of what constitutes Internet history to identify forks in the digital road and key past decisions that shaped the Internet's path. The first part of the book maps out the core technical and policy decisions that created the Internet.  more

The Hidden Value of IPv4 Addresses

All devices that connect to the internet need unique addresses. The number of IP addresses is limited, creating a demand for addresses worldwide, particularly from the cloud computing industry. This demand has raised the value of IPv4 to levels that the internet's original developers didn't predict, in part because the internet was considered an experiment at the time. Of course, use - and so demand -- has exceeded anyone's realistic expectations. more

ICANN SSAD Proposal Poised to Succeed?

The GNSO Council and the ICANN Board both seem poised to grant sufficient runway to the community to refine an idea for a simple ticketing system designed to centralize requests for registrant information disclosures and provide meaningful data that is likely to help ICANN staff enhance its assessment of the SSAD proposal. This is very good news for those who advocate for consumer safety and trust on the Internet, and it is very good news for the ICANN multistakeholder model. more

China Betting on IPv6 and First Mover Advantage

The United States' reluctance to invest in IPv6 makes it more likely that China will be in a position to gain the first-mover advantage it seeks. ...Liu Dong, president of the Beijing Internet Institute sums it up succinctly: "We think we can develop the killer applications," he says. China plans to show the rest of the world just how advanced its Internet is at the 2008 Olympics in Beijing. CNGI will control the facilities -- everything from security cameras to the lighting and thermostats -- at the Olympic venues, and events will be broadcast live over the Internet. Even the taxis in Beijing's snarled traffic will connect to CNGI via IPv6 sensors so that dispatchers will be able to direct their drivers away from congestion. more