/ Most Viewed

Good Samaritans with Network Visibility

In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more

Lawrence Lessig’s Reaction to McCain’s Technology Plan

In reaction to U.S. republican presidential candidate John McCain's release of his technology policy statement on August 14, Lawrence Lessig has released a video presentation criticizing the tech plan for lack of change to important issues such as broadband penetration declines in the country. Early during the video presentation, Lessig has this to say: "...the single most important fact about internet's development in last decade has been the extraordinary decline United States has faced with respect to our competitive partners. We started the Bush administration at no. 5, we will end at no. 22. And the question anybody should be asking about internet policy here, is why we did so poorly and what change there might be to reverse that decline..." more

Brand Protection Beyond the “Whack-a-Mole” Approach

I recently shared at a conference how a seasoned brand and fraud expert from one of the world's largest global financial institutions lamented a major attack where multiple fraudulent websites would pop up every single day. All attacks were launched from the same registrar and web hosting company, and no matter how much they reached out to these providers, they received the same reply: "we will pass on your request to the registrant or site owner," and then nothing happened. more

International Fibre Bandwidth Hubbing, a Lucrative Business

The small West African country of Benin has been working quietly over the past few years to become a regional hub for international fibre bandwidth. The national telco, Benin Telecoms (BT) has been building terrestrial fibre routes to landlocked neighbouring countries such as Burkina Faso and Niger, allowing them to connect to its landing station for the SAT-3/WASC cable, the only one serving the region. more

TelChina, China Mobile Building Mobile Payment Solution With .tel

Telnic Limited, the registry operator for the .tel top level domain (TLD), today announced that its regional partner TelChina and China Mobile, a leading mobile phone company, have entered into a strategic relationship to develop Mobile-Pay services on the .tel platform. ... On this platform, users will not have to log on to various websites for payment, but accomplish it through the clicking of a Mobile-Pay link on a .tel page. more

Teenager Arrested for Launching Accidental DDoS Attack on 911 Systems via Twitter

Cyber Crimes Unit of Maricopa County, Arizona went into full force on October 23, after reports of serious disruptions into the emergency 911 system for the entire Phoenix metro area. more

Vodafone Plans to Create the First 4G Network on the Moon, Appoints Nokia as Technology Partner

Vodafone is working on a project to create the first 4G network on the Moon to support a mission by PTScientists in 2019. Nokia is chosen as the company's technology partner, according to a press release issued today. more

Explaining the Legal Enforceability of the PIC Proposed by Ethos for .ORG

Ethos Capital has recently announced that it has voluntarily proposed to add an amendment to Public Interest Registry's (PIR) .ORG Registry Agreement with ICANN in the form of a Public Interest Commitment, also known as a "PIC." In the press release Ethos indicated that the PIC would become "legally binding" and "enforceable" both by ICANN and by members of the community. I anticipate that some would ask a number of logical questions: How would that work in practice? more

Experts Predict Mobile as Main Online Access by 2020, Voice-Recognition, Internet Structure Advances

The Pew Internet Project has just released its third report on its "The Future of the Internet" series where it has surveyed experts about the future social, political, and economic impact of the Internet. In this latest web-based survey, 578 leading Internet activists, builders, and commentators and 618 additional stakeholders (1,196 respondents) were asked to assess thought-provoking proposed scenarios for the year 2020, which include the following quantitative results... more

ICANN, Ukraine and Leveraging Internet Identifiers

Ukraine's representative to ICANN's Governmental Advisory Committee (GAC) has sent a letter to the Internet Corporation for Assigned Names and Numbers (ICANN) to remove Russian-administered top level domains (.RU, .SU and .рф) from the DNS root zone. In a separate letter, Ukraine's representative also asked RIPE NCC to withdraw the right to use all IPv4 and IPv6 addresses by all Russian members of the regional IP registry for the European region. more

Bug Bounty Programs: Are You Ready? (Part 1)

The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organization's web applications or consumer products sounds compelling to many. What's not to like with the prospect of "many eyes" poking and prodding away at a corporate system for a minimal reward -- and preemptively uncovering flaws that could have been exploited by hackers with nefarious intent? more

US-CERT Says They Are Aware of DNS Exploit Code, Emphasizes Urgent Patching

The United States Computer Emergency Readiness Team (US-CERT) has acknowledged that they are aware of the publicly available exploit code for a cache poisoning vulnerability in common DNS implementations. US-CERT is re-emphasizing the urgency of patching vulnerable DNS systems. more

.ORG and Change

The .ORG domain is at a crossroads: What will it be? A simple registry offering domain names for organizations, individuals and others? Or something bigger, as Ethos Capital and the Public Internet Registry propose? Will proposed changes make .ORG better? Or worse? There are valid points on both sides, but as an Internet safety advocate who for two decades has worked to teach children how to be safe online, stop the next young girl from being sex trafficked, and... more

Cybercrime Losses Overestimated, Say Researchers

Cybercrime losses may be erroneously overestimated as most information available on cybercrime losses are derived from surveys, argue two researchers in a recent paper titled, "Sex, Lies and Cybercrime Surveys". Dinei Florencio and Cormac Herley from Microsoft Research examine some of the difficulties of forming an accurate cybercrime estimate by survey. more

A Look at Internet’s Growth in the Past Decade

Royal Pingdom has a post on the Growth of the Internet in the past decade. From the post: "There were only 361 million Internet users in 2000, in the entire world. For perspective, that's barely two-thirds of the size of Facebook today. The chart really says it all. There are more than five times as many Internet users now as there were in 2000. And as has been noted elsewhere, the number of Internet users in the world is now close to passing two billion and may do so before the end of this year." more