/ Most Viewed

BYOD Woes and Worries

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more

The Draw: ICANN and a Severe Case of Virus Infection

I propose calling it Values Disorder Syndrome (VDS). It is a virus affecting groups of people. Though rational as individuals, sufferers acting in groups display an inexplicable addiction to the thrill of impunity. That behavior is totally irrational and unrelated to any perspective of gain or purpose... It is certainly a virus, and we know it goes around in ICANN circles. The proof is that the ICANN board has caught it. more

Ransomware Attacks on US Hospitals Trigger Significant Ripple Effects on Neighboring Facilities

In a study published in the JAMA Network, evidence indicates that ransomware attacks on healthcare delivery organizations (HDOs) lead to substantial disruptions in patient care and emergency department workflows. more

Major Russian Banks Under a Multi-Day Cyberattack

The attack began Tuesday afternoon, and continued for two days straight, according to a source close to Russia’s Central Bank quoted by RIA Novosti. Sberbank confirmed the DDoS attack on its online services. more

Unintended Benefits of Trump’s Twitter Tantrum

Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more

Today’s Internet: More BRICS Than Westerners

Something over 55% of landline broadband users are in the "Global South," about 500M. The South is about 65% if you include "wireless-only" many of which are 4G LTE at ten megabits or more. The gap is widening rapidly and will increase by well over 70M in 2018. Six large developing countries are growing 5% or more in the last year, compared to only one in the developed world. China is adding ~30M more each year. Most developed countries are between 75% and 95% connected. That leaves little room for growth. more

WordPress Parent Company Automattic, and .Blog Operator Switches Registry From Nominet to CentralNic

The operator of .blog top-level domain, Knock Knock WHOIS There, LLC, which is a subsidiary of Automattic, the parent company of WordPress.com and Jetpack, announced on Wednesday that it is "moving into the next phase of .blog." more

Russian Internet Traffic Redirected Due to Routing Errors by China

Doug Madory, Director of Internet Analysis at Dyn, is reporting that the Russian Internet traffic (including domestic traffic) was re-routed out of the country due to routing errors by China Telecom. more

Google Unleashes Domain Name Registration Service

Kieren McCarthy reporting in the Register: "Google has launched its new domain-name management system, providing a clean and simple interface that will put it in direct competition with market leader GoDaddy." more

Industry Structure at the Core of WCIT Problems

At the WCIT in Dubai it is interesting to follow the debates surrounding the many issues being addressed at this world congress. There are the issues of internet governance in the broadest sense of the word - these have received widespread attention. But if we look at the core issues that an organisation such as the ITU can address then the scope widens - to topics such as the rules for the International Telecommunications Regulations (ITRs), and particularly those in relation to the rules for rates and charges. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

A Journey Into the Surreal: The GOP Protecting “Internet Freedom” With 25 Friends

Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more

Why This Domain Expert Has Stopped Talking About Domain Names

I'm lucky enough to spend my working life helping some of the world's largest brands drive their .brand TLD projects. The excitement and the challenges of this space stem largely from the fact that this is a new innovation; and when you're working with something truly groundbreaking, naturally there's an element of "learning as you go." And I'm not afraid to admit, sometimes we get things wrong. more

IGF-USA Teaser. Laura DeNardis: The Internet in Everything

Dr. Laura DeNardis, Professor and Interim Dean of the School of Communication at American University and a Faculty Director of the Internet Governance Lab, is a featured panelist at this week's IGF-USA conference. In advance of the event, I would like to draw attention to her sixth book: The Internet in Everything. Freedom and Security in a World with no Off Switch. This treatise is one of those "should/must-reads" that come along from time-to-time as it focuses on a critical issue that is overlooked by either design or neglect: how digital infrastructure determines policy. more

FCC Plans to Order States Not to Impose Laws Regulating Broadband Service, Senior Officials Revealed

In a phone briefing with reporters on Tuesday, Senior FCC officials revealed plans whereby state and local governments will not be able to impose local laws regulating broadband service.

 more