/ Most Viewed

US-NL Cybercrime Treaty Signed

On Wednesday 22 February the United States and The Netherlands signed a "declaration of intent" on the cooperation on fighting cybercrime. This event was reported by the press as a treaty. At least that is what all Dutch postings I read wrote, with exception of the official website of the Dutch government. So what was actually signed? Reading the news reports some thoughts struck me. more

Facts & Tips for Consumers About the Epsilon Breach

There has been a lot of talk, blogging, tweeting and press reportage about the Epsilon breach, but little in the way of concrete information to consumers as to where they stand, if their personal information (PII) such as their name and email address has been lost to criminals. The CAUCE Board of Directors have developed the following FAQ that provides facts and guidance for those affected by the breach. more

Massive Iberian Power Outage Raises Cybersecurity Questions

On April 28th, a widespread blackout plunged millions across Spain, Portugal, and parts of south-west France into darkness, disrupting homes, transit systems, and even sporting events like the Madrid Open. more

Starlink vs. Kuiper: The Satellite Broadband Race for Space and Subscribers

Strand Consult published an article on its website that makes numerous predictions for broadband and related industries in 2025 and compares them to the company's 2024 predictions. It's fascinating and well worth reading. There is one prediction in particular that got me thinking. In its 2024 predictions, Strand Consult compared Elon Musk's Starlink to Jeff Bezos' Kuiper and said that Bezos had opened a burger bar while Musk runs an interstellar McDonald's. The 2025 observation agrees with that assessment. more

Do “brandsucks.com” Names Really Have a “Destructive Potential”?

"'Sucks.com is the rightmost anchor of nearly 20,000 domains registered today. Two thousand domains have 'stinks.com' on the right and about the same number of domains begin with the term 'boycott'," write the authors of the recently released paper The Power of Internet Gripe Sites. According to their (interesting) study, 35% of the "brandsucks" domains are owned by the brand while 45% are available for registration. They thus advise brand owners "to take a serious look at the traffic that these names garner and the kind of unique marketing opportunity they can afford." ...I do not fully agree with their conclusions... more

Frustrations with VoIP Phone Services

I ought to explain why I've suddenly gone cold on VoIP. It's just I've watched my own behaviour. I've grown tired of the inconsistency of PC VoIP calls, and instead I've reverted to using landlines, mobiles and Jajah (for callback). But I'm still using IM to set up many of those calls! The problem isn't unique to any one client - they're all proving unsuitable for business use with clients (which is most of my telephony needs covered). The worst of all seems to be Skype conference calling... more

Leaving it to the Last Second - The Leap Seconds Conundrum

Thanks to the moon, the earth's rate of rotation is slowing down. It's a subtle interaction and the modeling of planetary dynamics predicts that the earth's rotation should be slowing down by an average of 2.3 milliseconds per century. But this is not quite so uniform... So what? Maybe we can start by looking at how we've defined time over history... It's only been in recent decades that we've turned our attention to timekeeping with an obsessive level of detail that rivals, and maybe even surpasses, train spotting. more

The Sysadmin’s Guide to Securing Your SaaS Apps

As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more

Wrap-up: ICANN 46 in Beijing

Earlier this April, the largest ICANN meeting ever -- more than 2,500 attendees -- kicked off in Beijing. Given the imminent addition of hundreds of "dot Brands" to the Internet, the topic of new gTLDs was at the top of the discussion list for all attendees. So far, well over 100 new gTLD applications have passed the Initial Evaluation stage, meaning they're on their way to becoming live domains. more

Ending Cyber-Hubris

Hurricane Katrina will lead the endless finger pointing about what should have been done to strengthen the levees before the storm. However, as a former senior FEMA official under the Clinton Administration explained, "There's only two kinds of levees. Ones that have failed and those that will fail." The same is true for cyber-levees.  more

Colombian Government Releases Action Plan for the Selection of .CO Domain Registry Operator

In light of the approaching expiration of the .CO top-level domain registry operator contract, Columbia's Ministry of Information Technology and Communications (MinTIC) today released an action plan for the .co operator selection process. more

Starlink Will Be Priced to Be Affordable

SpaceX is now serving customers (aka beta testers) in the northern United States. They will soon be doing so in Southern Canada and recently announced that Germany, where they have applied for permission and have begun construction on two ground stations, will probably be next. Early customers in the US are paying $499 for their user terminals and $99 per month for Internet service. more

Lawyer-Impersonator Pleads Guilty over False C&Ds

As if there weren't enough problems with lawyers sending out improper cease-and-desists, Wired News reports that a Nevada man has pleaded guilty to impersonating a lawyer to extort domain registrants to turn over their domain names. "A Nevada man pleaded guilty Thursday to his plotting to steal domain names from their legitimate owners by impersonating a California intellectual property lawyer and send threatening letters to domain name owners in hopes of convincing them to turn over the domains to him..." more

ICANN Doubles Down on Technical Internet Governance Label: What Are the Implications?

Back in September of 2020, ICANN CEO Göran Marby wrote a blog post discussing the implementation of "a common strategy for Internet governance (IG) and technical Internet governance (TIG)", raising the question of whether the ICANN org. intended to pursue this distinction moving forward, as debated in a previous article. This was proven to be the case during the 2020 IGF's Open Forum #44: "ICANN Open Forum - Technical Internet Governance", organized by ICANN itself... more

Microsoft Disrupts the Zeus Infrastructure

Over the weekend and this morning, Microsoft, working in conjunction with others, issued civil lawsuits to sinkhole numerous domains associated with the Zeus botnet. When I say "botnet", I use the term loosely because Zeus is not a botnet in the sense that Rustock or Waledac is (or was). Rather, Zeus is a tool kit that online criminals can buy that lets them create phishing pages, perform fast fluxing, host drive-by downloads in addition to spamming. It's more like infrastructure than a botnet, although it does have a large botnet under its control. more