/ Most Viewed

EC3, the European Cybercrime Centre, Opened - Challenges All Around

On Friday 11 January 2013 the European Cybercrime Centre, EC3, officially opened its doors at Europol in The Hague. If something shone through from the speeches of the panel participants, it is that there are tight budget restraints and a strong wish to cooperate with the U.S., the Interpol centre in Singapore and Russia. Let me share my thoughts on expectations. more

The TikTok Ban in Context

Donald Trump recently issued an executive order banning TikTok on the grounds that it was necessary to deal with the national emergency he had declared in an earlier executive order. He says he is concerned that TikTok might turn user's "information such as location data and browsing and search histories" over to the Chinese government. Trump does not site evidence of TikTok having shared data with China and TikTok says they have never shared user data with the Chinese government... more

Worldwide Cloud IT Infrastructure Spend Grew 9.2% to $32.6 Billion in 2016, Reports IDC

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew by 9.2% year over year to $32.6 billion in 2016, with vendor revenue for the fourth quarter (4Q16) growing at 7.3% to $9.2 billion. more

Now Is the Time to Act: The Technical Community Must Engage in Support of Multistakeholderism

Over the next two years, several global dialogues about our shared digital future are taking place -- and big changes could be in the cards. An intensive series of negotiations will see United Nations (UN) Member States weigh in on the future of digital cooperation -- and multistakeholderism finds itself under the spotlight. The multistakeholder model allows everyone who has a stake in the internet to meaningfully engage in discussions and decisions about its future on equal footing, but a number of critics are calling for change. more

A Cancerous Computer Fraud and Misuse Act

As I read through multiple postings covering the proposed Computer Fraud and Misuse Act, such as the ever-insightful writing of Rob Graham in his Obama's War on Hackers or the EFF's analysis, and the deluge of Facebook discussion threads where dozens of my security-minded friends shriek at the damage passing such an act would bring to our industry, I can't but help myself think that surely it's an early April Fools joke. more

Popular RSS Reader Feedly Suffers Back to Back DDoS Attacks, Held for Ransom

Popular RSS reader Feedly has been hit by major distributed denial of service (DDoS) attacks beginning 2:04am PST on Wednesday causing the service to be completely down for several hours two days in a row. (Second attack still undergoing as of the time of this post.) more

Google Begins Publicly Sharing National Security Letters

In a note released this week, Google announced that it will begin publicly sharing National Security Letters (NSLs) it receives that have been freed of nondisclosure obligations either through litigation or legislation. more

Oracle Announces Agreement to Acquire Sun Microsystems

Brandon Bailey reporting on Mercury News: "In a surprising twist, Sun Microsystems announced this morning that it will be acquired by Oracle in a deal worth roughly $7.4 billion, or $5.6 billion net after accounting for Sun's cash and debt. The news comes just a few weeks after earlier talks for IBM to buy Sun [link] collapsed..." more

Montreal ICANN Meetings Creating Some Irritations

Two controversial issues which were on the agenda of the Montreal ICANN meetings creating some irritation: the way of planning to create a country code support organization (ccNSO), and the discussions around the purpose and operation of WHOIS – the database of registrants of domains. Without going into the history of the ccTLDs withdrawing from their former role within the DNSO and moving towards a self organized structure, there is an obvious conflict revolving around the term... more

Going Postal

When a service is constructed using diverse components, then the way in which service revenues are distributed to the various suppliers of the components of the service can follow a number of quite distinct models. There are various forms of revenue redistribution models where the revenue per transaction is distributed to the various suppliers according to their inputs to support each transaction. more

Are Google, Microsoft and Apple the Next Utilities in Telecoms?

Over the last few years the increasing amount of discussion about telecoms reveals that the real competition for telecoms companies is not from other telcos, but companies such as Google and others. While I agree with this, obviously it is important to analyse it further. more

Analysis of the US Broadband Stimulus Package

In January 2009 the US Congress began considering the American Recovery and Reinvestment Bill 2009 aimed at kick-starting an economy in deep recession. The package, passed into law on 17 February, comprised $787 billion of mainly tax cuts, unemployment benefits and spending in education, health care, infrastructure and energy. Included in the fiscal stimulus package was a relatively modest $7.2 billion for broadband and wireless in unserved and underserved areas... more

Connectivity as a Vital Consumer Service

Having Comcast et al provide Internet connectivity is like having your barber do surgery because he knows how to use a knife. I was reminded of this when my Comcast connection failed. This is part of the larger topic of consumerization. In the past, we were happy to have products that worked at all. I grew up in the world of consumer products and got my start in software building online services meant for use by non-experts. more

Kelihos Is Dead: Long Live Kelihos

The King is dead. Long live the King! Or, given this week's events, should the phrase now be "Kelihos is dead. Long live Kelihos"? It is with a little amusement and a lot of cynicism that I've been watching the kerfuffle relating to the latest attempt to take down the Kelihos botnet. You may remember that a similar event ("Kelihos is dead") occurred late last year after Microsoft and Kaspersky took it on themselves to shut down the botnet known as Kelihos (or sometimes as Waledac 2.0 or Hlux). more

Three Reasons Why CISOs Need to Know How Their Company Is Managing Their Domains

Companies today manage hundreds or even thousands of domain names that support their organization, their visitors from different countries, and their brands and trademarks. They register misspelling of their names as a defensive strategy to protect their brand from online fraud, or from losing traffic to simple user typos. more