/ Most Viewed

‘Avalanche’ Network Dismantled in an International Cyber Operation Including Europol and the FBI

After over four years of investigation, the international criminal infrastructure platform known as 'Avalanche' is reported to have been dismantled via a collaborative effort involving Public Prosecutor's Office Verden and the Lüneburg Police (Germany) in close cooperation with the United States Attorney's Office for the Western District of Pennsylvania, the Department of Justice and the FBI, Europol, Eurojust and global partners. more

2010 Data Breach Report from Verizon, US Secret Service

A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service has found that breaches of electronic records in 2009 involved more insider threats, greater use of social engineering and the continued strong involvement of organized criminal groups. more

What is ‘On-Tap’ at ICANN 38 - Brussels (There’s More to Belgium than Beer!)

As the shorter of the ICANN interregnums comes to a close and the ICANN faithful finalize their dinner reservation agendas for Brussels, it is time again for a preview of what will be 'on-tap' at next week's ICANN meeting. While, as always, there is a lot going on in ICANN Land, a scan of the blogosphere and ICANN list serves suggests that the four most discussed topics will be... more

FCC Open Internet Rules

At the Mobile World Congress in Barcelona, Tom Wheele, the FCC Chairman, gave a range of spirited responses to a grilling from the Director of the GSMA, Anne Bouverot. She was following the line of the telcos and questioned if the FCC intervention would stifle growth and investments in the market; however she had problems reconciling her position with the fact that, despite these regulatory changes, the American industry was still prepared to invest a whopping $45 billion in new spectrum. more

Go Only for Big Bang gTLD Rebranding

If you're considering rebranding under a new gTLD, go with a comprehensive big bang. A recent study by professors Dale Miller, Bill Merrilees, and Raisa Yakimova ("Corporate Rebranding: An Integrative Review of Major Enablers and Barriers to the Rebranding Process") finds that success comes when senior management makes an unweaving commitment based on proactive analyses of the entire value-chain, with buy-in and input from employees and suppliers. more

New gTLD Application Monitoring? Now?

Why in the world would any company sign-up for a "New gTLD Application Monitoring Service" when ICANN intends to publicly post all applications on May 1st? Domain Name Watching and Trademark Watching Services make perfect sense when new registrations and applications are being submitted and granted on a daily basis. I think that we can all easily agree that trying to understand new domain name and trademark registrations without an automated service would be nearly impossible. more

Qualcomm’s Licensing Practices Are Illegal, U.S. Judge Rules

A U.S. district court judge rules that Qualcomm violated anti-trust laws and has ordered the chip maker to change some of its licensing and negotiation practices. more

Connectivity Policy and the Open Internet

The goal of public policy for connectivity should be to assure access to our common facilities as a public good by adopting sustainable business models that don't put owners and users at odds with each other. Such balances are typically difficult to achieve which is what makes connectivity so unusual - we can achieve both once we fund the facilities as a public good apart from the particular applications such as telephone calls and cable content. more

Study Assesses Potential Impact of DNSSEC on Broadband Consumers, Results Not Good

Recent collaborative test by Core Competence and Nominet have concluded that 75% of common residential and small SOHO routers and firewall devices used with broadband services do not operate with full DNSSEC compatibility "out of the box". The report presents and analyzes technical findings, their potential impact on DNSSEC use by broadband consumers, and implications for router/firewall manufacturers. Included in its recommendations, the report suggests that as vendors apply DNSSEC and other DNS security fixes to devices, consumers should be encouraged to upgrade to the latest firmware. more

China Tightens Cybersecurity Rules to Curb AI and Infrastructure Threats

China is revising its cybersecurity laws to include faster reporting requirements and stricter oversight of AI-related incidents, reflecting growing concerns about national security and the unchecked expansion of digital infrastructure. more

DNS Bug Disclosure: ICANN Releases New Guidelines

The Internet Corporation for Assigned Names and Numbers (ICANN) has released new guidance concerning the reporting and disclosure of bugs that affect the Domain Name System, including information of how ICANN itself will behave in response to vulnerabilities. Until recently, ICANN, which is responsible for maintaining the root domain servers at the heart of the DNS system, had no specific guidelines for the reporting of vulnerabilities, leaving responsible disclosure protocols up to the researchers who discovered the bug. more

Google’s Loon Announces First Commercial Deal With Telkom Kenya to Provide Internet-by-Balloon

Google's sister-company Loon has announced its first commercial agreement with Telkom Kenya in order to deliver connectivity to the region using a network of giant balloons. more

Is Internet Part of the Curriculum of Universities?

Recently I joined my son, who is in his final high school year, to visit the open day of the newly founded Leiden University College in The Hague. The school focuses on Liberal Arts & Science and offers a broad education on (international) politics, philosophy and economy. The idea is to prepare the next generation internationally oriented public servants and leaders of the future. Among others they have former Dutch Minister of Foreign affairs and Secretary General of NATO Jaap de Hoop Scheffer as a college professor. more

Uncertain Knowledge

The establishment media frequently attack the Internet as spreading inaccurate, unchecked rumors as news. While that is certainly true, the Internet is also demonstrating that the establishment media is no better. In the past weeks we have been told that the Stuxnet virus was written by US and Israeli intelligence. The evidence? Some un-named Israeli intelligence officers grinned broadly at reporters when the subject was mentioned. Is that what it has come to? more

US Launches Cyberattack Against Iran’s Military IT Systems

The United States in retaliation to the growing Iranian cyber-activity and the shooting of an unarmed US drone last week has launched a series of cyberattacks against Iran's military IT systems. more