/ Most Viewed

Facebook Proposes New Optical Detector to Enable Free-Space Laser Communication

Published today in a scientific journal, Facebook has proposed a new type of optical detector that could simplify the technology behind free-space laser communication and enable high-speed connectivity in areas where traditional infrastructure is difficult to build. more

Competing Processes Obfuscate Internet Policy-Making in India

Net Neutrality has become a hot topic in India, following a brief but high-profile national debate instigated by a consultation paper from the Telecom Regulatory Authority of India (TRAI) that solicited views on what net neutrality is, and whether regulations protecting it are needed in India. The paper also hinted at possible regulation of all kinds of online services (like Skype, Uber, or Google) in the future. But no-one could have predicted what happened next... more

Shaping the Future of ICP-2: Community Input Extended to December 2024

In October 2023, the Number Resource Organization initiated a process to undertake a significant update to Internet Coordination Policy 2 (ICP-2); the policy which specifies the criteria for establishing new Regional Internet Registries (RIRs). The Address Supporting Organization Address Council (ASO AC) has been tasked with managing the revision process, emphasizing community engagement and transparency. more

GDPR Fine Enough or More Disclosure?

The UK cares about its citizens' privacy to the tune of a $229 million (US) fine of British Airways for a breach that disclosed information of approximately half a million customers. It's exciting -- a significant fine for a significant loss of data. I think GDPR will lead to improved security of information systems as companies scramble to avoid onerous fines and start to demand more from those who provide information security services and products. more

European ccTLDs Have Reached 66.5 Million Registrations, CENTR Reports

According to the latest DomainWire, CENTR's quarterly report, european ccTLDs closed August 2014 with 66.5 million registrations -- a net growth of 0.3% over the past 3 months. Chart below shows growth rates (3m averages) for both European ccTLDs and legacy gTLDs over the past 12 months. It suggests a continued trend downward of both TLD types with a stabilization observed since July. more

The Real White Spaces Debate: To Create or Abolish a Market in the Airwaves

I've been following the "white spaces" for as long as it has been happening -- four, maybe five years -- and I must admit that I am surprised by FCC Chairman Kevin Martin's sudden fondness for them. Until the last days of his chairmanship, Martin never cared for this somewhat radical notion: allowing techies and community activists to spew electromagnetic frequencies in zones currently occupied (at least ostensibly) by the broadcasters. more

The .ORG Debate Should be About What Its Users Want

I watch the controversy over the proposed sale of the .ORG domain with a mixture of bemusement and concern. Some in the ICANN community – mostly those who resent that the Internet ever became commercialized – oppose the sale of the Public Interest Registry to the for-profit company Ethos for $1.1 billion. The basis of their concern is that the domain for non-profits should be in the hands of a non-profit and that the new owners might increase the current $9.93 fee PIR charges for a domain. more

Terahertz WiFi

While labs across the world are busy figuring out how to implement the 5G standards, there are scientists already working in the higher frequency spectrum looking to achieve even faster speeds. The frequencies that are just now being explored are labeled as the terahertz range and are at 300 GHz and higher spectrum. This spectrum is the upper ranges of radio spectrum and lies just below ultraviolet light. more

Researchers Detail Faster Methods to Defeat Botnets Like Conficker and Kraken

Michael Cooney reporting in NetworkWorld: "Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. The detection system, called Pleiades, monitors traffic below the local DNS server and analyzes streams of unsuccessful DNS resolutions..." more

Addressing Recent Media Mischaracterizations of the .ORG Acquisition

Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more

Kansas System Hacked, Social Security Numbers of Millions Accessed Spanning 10 States

Hackers breached a Kansas Department of Commerce data system used across multiple states and gained access to more than 5.5 million Social Security Numbers, according to local news sources. more

3 Steps for Managing ICANN Registry Compliance

If you are like the majority of Registry Operators we have spoken to, you may now be thinking that compliance with your new gTLD Registry Agreement is much more difficult than first envisaged -- especially if you are one of the lucky operators which have been chosen for ICANN's latest round of registry audits! You may also be surprised at the number of questions and requests that you need to respond to. more

SANS Develops Small-Scale City to Train Cyber Warriors

SANS has announced NetWars CyberCity, a small-scale city located close by the New Jersey Turnpike complete with a bank, hospital, water tower, train system, electric power grid, and a coffee shop. NetWars CyberCity was developed to teach cyber warriors from the U.S. Military how online actions can have kinetic effects. more

Threat Intelligence Platform in Action: Investigating Important Use Cases

As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more

Airplanes Vulnerable to Hacking, Says U.S. Department of Homeland Security

Researchers have been able to successfully demonstrate a commercial aircraft can be remotely hacked. more