/ Most Viewed

Is Digital Democracy an Option – and What Is Involved in It?

Celebrating the 30th anniversary of the internet Berners-Lee, the father of the internet, reiterated his suggestion for a radical change, which would improve the functionality of the internet for the benefit of society. He suggests a sort of refoundation of the web, creating a fresh set of rules, both legal and technical, to unite the world behind a process that can avoid some of the missteps of the past 30 years. While this most certainly would be an excellent development, I am rather pessimistic about a rapid implementation of such a radical change more

ICANN Warns of Governance Crisis at AFRINIC Amid Allegations and Legal Challenges

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a stern open letter to the Government of Mauritius and the court-appointed receiver of AFRINIC, the Regional Internet Registry (RIR) for Africa and the Indian Ocean. The letter, dated July 16th, expresses grave concern over AFRINIC’s governance failures, opaque election practices, and recent attempts by a controversial resource member to dissolve the organization. more

NTAG Chair Blog: What Is the Next GAC Advice?

Last week, New gTLD Applicant Group (NTAG) members - who account for over half of the applications submitted to ICANN in this round - issued a unanimous letter to ICANN's New gTLD Program Committee (NGPC) urging decisive action on Government Advisory Committee (GAC) Category 1 Advice at their upcoming February 5th meeting. The NGPC has been committing to address outstanding items of the GAC Advice in a manner that allows the largest possible number of applicants to proceed since last September. more

Cloud Marketplaces Help Cut Through Confusing IaaS Pricing

A recent study from 451 Research reveals some interesting facts about the nature and complexity of cloud pricing. In theory, one of the major benefits of using the cloud is that on-demand pricing makes it easy to know exactly how much a company will be spending and avoid large-scale capital expenditure. That's certainly true, but the cloud space has yet to develop into a fully mature market, which means that companies have to tangle with wildly different pricing models and the cost itself can vary between vendors. more

Cybercrime Losses Overestimated, Say Researchers

Cybercrime losses may be erroneously overestimated as most information available on cybercrime losses are derived from surveys, argue two researchers in a recent paper titled, "Sex, Lies and Cybercrime Surveys". Dinei Florencio and Cormac Herley from Microsoft Research examine some of the difficulties of forming an accurate cybercrime estimate by survey. more

The FBI and the iPhone: Important Unanswered Questions

As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more

Return to Singapore: From Chili Crabs to Names, Numbers and Protocol Parameters

Almost a year ago, the National Telecommunications and Information Administration (NTIA) announced its intent to transition key Internet domain name functions to the global multistakeholder community. The process was officially kicked off at the ICANN 49 meeting. That was March 2014. And the place? Singapore. Fast-forward a year later and we are again on our way to Singapore for an ICANN meeting. more

The Fibre Optic Path

In August 1858, Queen Victoria sent the first transatlantic telegram to U.S. President James Buchanan. The cable system had taken a total of four years to build and used seven copper wires, wrapped in a sheath of gutta-percha, then covered with a tarred hemp wrap and then sheathed in an 18-strand wrap, each strand made of 7 iron wires. It weighed 550kg per km, with a total weight of over 1.3Mkg. more

Mega International DNS Malware Operation Dismantled, Reports FBI

FBI today announced six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised -- or that the malicious software rendered their machines vulnerable to a host of other viruses. more

Watch Live Tonight – 2019 Internet Hall of Fame Ceremony

Tonight (27 Sep 2019) you can watch the 2019 Internet Hall of Fame induction ceremony streaming live out of Costa Rica. Eleven individuals from six countries will be inducted into the Internet Hall of Fame (IHOF) today. The 2019 class of inductees have expanded the Internet's reach into new regions and communities, helped foster a greater understanding of the way the Internet works, and enhanced security to increase user trust in the network. more

The End is Nearly in Sight for New gTLDs

A little over two weeks from now the ICANN meeting in Cartagena de Indias will be over and, if ICANN has the courage of its convictions, the new generic top-level domain (gTLD) program should be on the home stretch, heading towards its official May 30 launch. The ground rules will be clear, the process predictable, and applicants will be able to begin to implement their strategies with confidence. As Elvis Presley once sang, it will be a time for "a little less conversation, a little more action, please". more

Trump Administration Says US Will Start Using Offensive Strategy Towards Cyberattacks

The Trump administration today announced that the U.S. will begin a new strategy to deter and respond to cyberattacks with offensive actions against foreign adversaries. more

Good Samaritans with Network Visibility

In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more

M3AAWG Offers Some Sensible Password Advice

M3AAWG is a trade association that brings together ISPs, hosting providers, bulk mailers, and a lot of infrastructure vendors to discuss messaging abuse, malware, and mobile abuse. (Those comprise the M3.) One of the things they do is publish best practice documents for network and mail operators, including two recently published, one on Password Recommendations for Account Providers, and another on Password Managers Usage Recommendations. more

FIFA and the Perils of No Accountability

Forgive me if you can, but I am about to say something blindingly obvious. The arrests made by the US Government and Swiss authorities of senior FIFA officials should remind us of a deep truth. Organizations must be accountable: to members, to users, to superiors, to markets, to someone who can say "stop what you are doing and amend your ways". When we consider the transfer of authority from the USG over the IANA function, let us keep in mind... more