/ Most Viewed

ICANN and DOC Announce New Three-Year Agreement

The Internet Corporation for Assigned Names and Numbers (ICANN) and the United States Department of Commerce (DoC) today announced that they agreed to extend their joint Memorandum of Understanding (MoU) for three additional years until September 30, 2006. more

Internet Society Releases Internet of Things (IoT) Overview: Understanding the Issues and Challenges

Near the end of the first decade of this century, the world reached an Internet milestone. The number of Internet-connected devices surpassed the number of people alive on planet Earth. At the time, seven billion devices had already been connected to the Internet, and this went completely unnoticed by most people. This moment represented an important sign of the rapid pace in which we are adopting technology and embracing Internet connectivity. more

Who Is Going to Dominate the Internet?

While the internet has brought about the transformation of whole industry sectors and generated thousands of business models, as well as changing social behaviour, it is at the same time creating its own giants and dominant players. Does this mean that while certain vested interests are demolished, and others transform themselves into smaller sectors and organisations, new conglomerates will surface? Only time will tell more

Anonymous, LulzSec, and the Option of Internet Security

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. more

An Investigative Analysis of the Silent Librarian IoCs

The Silent Librarian advanced persistent threat (APT) actors have been detected once again, as the academic year started in September. With online classes increasingly becoming the norm, the group's phishing campaigns that aim to steal research data and intellectual property could have a high success rate. Dozens of phishing domain names have been reported, although some may have already been taken down. more

Don’t Fall for This Domain Name ‘Expiration’ Scam

If, like me and my clients, you ever receive an email about a domain name expiration, proceed with great suspicion -- because many of these "notices" are a sham. They're designed to sell you services you don't need or to trick you into transferring your domain name to another registrar. Usually, the emails can safely be ignored. Here's an example: As shown, an important-looking email from "Domain Service" refers to a specific domain name in the subject line. more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

Google to Release Chrome Operating System in 2010

Last night, Google's VP of Product Management, Sundar Pichai and Engineering Director, Linus Upson announced via the company's official blog that it is planning to launch it's own operating system called Google Chrome OS. In the blog post the authors write: "It's been an exciting nine months since we launched the Google Chrome browser. Already, over 30 million people use it regularly. We designed Google Chrome for people who live on the web -- searching for information, checking email, catching up on the news, shopping or just staying in touch with friends. However, the operating systems that browsers run on were designed in an era where there was no web. So today, we're announcing a new project that's a natural extension of Google Chrome -- the Google Chrome Operating System. It's our attempt to re-think what operating systems should be." According to the company the new operating system will initially be targeted at netbooks and planned to be available for consumers in the second half of 2010. more

Studying .BRAND New gTLDs

Many participants in the latest ICANN meeting in Copenhagen asked that same question: "when is the next round of the ICANN new gTLD program?". If the question came from new gTLD service providers, I also noticed that it was different from "the first round": now the question focuses more on .BRANDs rather than Generic TLDs dedicated to selling domain names. The question also comes more from representatives of certain Trademarks who want to acquire a .BRAND domain name extension. more

CAN SPAM Applies Even Within a Single Provider

I recently came across a copy of a ruling in the bizarre case of MySpace vs. theglobe.com. Theglobe.com was the ultimate dot.com bubble company. It started up here in Ithaca, and went public at the peak of dot.com hysteria with one of the the greatest one-day price runups ever. Since then they bought and sold a variety of busineses, none of which ever made any money, including the Voiceglo VoIP service which appears to be what the spam was promoting. more

NORDUnet’s Brilliant Internet Peering Strategy

NORDUnet, the R&E network connecting the Nordic countries has recently undertaken a brilliant Internet peering strategy that will have global significant ramifications for supporting research and education around the world. NORDUnet is now emerging as one of the world's first "GREN"s -- Global Research and Education Network. NORDUnet is extending their network infrastructure to multiple points of presence throughout the USA and Europe to interconnect to major Internet Exchange Points (IXPs). more

The Pros and Cons of BYOD (Bring Your Own Device)

At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. more

IRMA Threatens Irish ISPs

I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more

IPv6 Inside Everything and Everybody

With the market for connected humans reaching saturation in advanced economies, mobile operators now see connected devices as the next growth opportunity. 'Everything that can benefit from being connected will be connected', according to Ericsson's CTO (source). In the meantime, Intel dreams of embedding processors into everything that can gain something from communicating. more

Cyber Crime: It’s All About Data (Part 1)

Cyber crime = crime. How do we make police forces understand this and how to get it prioritized? In this series of blogs I am looking into whether aggregating data can change the way cyber crime is approached and prioritized. At a seminar at the IT Security trade fair in Utrecht detective super intendant Charlie McMurdie, head of the cyber crime unit of the London Metropolitan police, said that cyber crime was recently prioritized by the UK government. She also said the following and I'm allowed to quote this... more