The recent heavy news coverage of WannaCry has overshadowed the latest WikiLeaks release of critical CIA malware documentation: user manuals for two hacking tools named AfterMidnight and Assassin. more
I run a business. For years I've been in the ICANN Business Constituency, holding a series of different positions including Chair. Suffice it to say, I'm absolutely ok with making money and generally speaking, letting markets work. I also care about NGOs. For years our firm worked with PIR on the .NGO project. We got to see up close the role PIR has played as a supporter of NGOs online -- encouraging best practice, helping push out DNSSEC to a global audience, working on DNS abuse issues, supporting the sector. more
Last Friday, following three weeks of dazzling diplomacy, the International Telecommunication Union's (ITU) 2014 Plenipotentiary Conference came to a conclusion in Busan, South Korea. For those unfamiliar with the event, the "Plenipot" is the ITU's most significant gathering... At the Plenipot, ITU members elect new office-bearers, set general policies and determine the Union's strategic plans and activities for the next four years. It is this last part that is of most interest to stakeholders in the Internet community... more
In a conference hosted by the Coalition Against Domain Name Abuse (CADNA) on Tuesday, discussions were held concerning ICANN's upcoming new gTLD Program. CADNA President Josh Bourne said: "ICANN has an image problem. Businesses are outright angry with ICANN because of the way that this program has been structured. We are not trying to derail the rollout of new gTLDs altogether, but rather, we are proposing an opportunity for ICANN to make this Program much less detrimental to brands and businesses..." more
The UK's broadband market is one of the most competitive in Europe. The DSL network effectively covers the entire country, while the network of the dominant cable provider Virgin Media covers more than half of all households (about 12.6 million homes). Beginning in 2007, Virgin Media expanded the availability of its services not by increasing the footprint of its cable network but by utilising wholesale LLU services... more
FlyHosting had been open for business since November 2022 and was used for malicious activities such as hosting malware, botnet controllers, and carrying out DDoS attacks. more
A group of academic researchers have revealed a design weakness in the 4G/5G protocol which can be exploited by an attacker to identify the victim's presence in a particular cell area just from the victim's soft-identity such as phone number and Twitter handle. more
Senator Cruz's against the IANA transition will continue next week with a senate hearing next week. The hearing is entitled: Protecting Internet Freedom: Implications of Ending U.S. Oversight of the Internet. While the hearing is being chaired by Cruz, no indication of who else will be speaking has been made public so far. In a press release from Cruz's offices earlier this evening, the Senator continued his almost hysterical and misleading narrative. more
Researchers have been able to successfully demonstrate a commercial aircraft can be remotely hacked. more
I recently followed a webinar session organized by the University of Queensland on the factory of the future. Smart or not, the future will still need factories to make the stuff we humans use every day. One of the discussed questions included: "how will existing production models cope with the staggering and ongoing rate of digital disruption and advanced capabilities?" more
Social and Digital Marketing are two of the fastest growing, and arguably the most important, pieces of branding today. According to eMarketer, 2017 digital marketing expenditures will account for 38.4% of total ad spending and are projected to be almost 45% by 2020. This is double what they were just a few years ago and growth doesn't seem to be slowing down. more
Published today in a scientific journal, Facebook has proposed a new type of optical detector that could simplify the technology behind free-space laser communication and enable high-speed connectivity in areas where traditional infrastructure is difficult to build. more
You can't put the telecom sector into perspective without looking at the performance of the biggest players in the industry. The pandemic has been an interesting year for both big ISPs and telecom vendors. Smaller ISPs should care about big ISP performance for many reasons. For many smaller companies, the big companies are the competition, and the big providers' strength or weakness can foretell stiffened competition or increased opportunity. more
A typical proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) consists of a complaint and, sometimes, a response. UDRP Rule 12 makes clear that "further statements or documents from either of the Parties" are appropriate only if "the Panel... request[s], in its sole discretion." In practice, however, such supplemental or additional filings are not uncommon, with the leading UDRP service providers - WIPO and the Forum - issuing guidance about when they may be appropriate. more
Currently, the process for approving broadband construction projects on federal property varies from agency to agency. Property controlled by the federal government includes roads, about 30 percent of the nation's land and more than 10,000 buildings. The order will require the Departments of Agriculture, Commerce, Defense, Interior, Transportation and Veterans Affairs as well as the Postal Service to develop a single process for approving Internet construction projects. more