/ Most Viewed

Coronavirus Online Threats Going Viral, Part 4: Phishing

In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done so by sending phishing emails that play on the fears surrounding the spread of the illness. A number of reports have emerged of emails purporting to provide advice or assistance relating to COVID-19... more

T-Mobile Gives Free Unlimited Data for Pokemon Go - Raising Net Neutrality Concerns

T-Mobile announced today that as a part of its "T-Mobile Tuesdays" promotion it will give its customers unlimited data to play Pokemon Go until August 2017. Move called Net Neutrality violation. more

3 Steps for Managing ICANN Registry Compliance

If you are like the majority of Registry Operators we have spoken to, you may now be thinking that compliance with your new gTLD Registry Agreement is much more difficult than first envisaged -- especially if you are one of the lucky operators which have been chosen for ICANN's latest round of registry audits! You may also be surprised at the number of questions and requests that you need to respond to. more

Researchers Detail Faster Methods to Defeat Botnets Like Conficker and Kraken

Michael Cooney reporting in NetworkWorld: "Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. The detection system, called Pleiades, monitors traffic below the local DNS server and analyzes streams of unsuccessful DNS resolutions..." more

Privacy Polls v. Real-World Trade-Offs

A recent telephone poll conducted by professors at Berkeley and the University of Pennsylvania concluded, "Contrary to what many marketers claim, most adult Americans (66%) do not want marketers to tailor advertisements to their interest." The study's authors claim that their poll is the "the first nationally representative telephone (wireline and cell phone) survey to explore Americans' opinions about behavioral targeting by marketers." ... But what is most surprising about this poll is not that 66% of users said they do not want tailored online ads, but that 34% of users said they did! more

US Government to ICANN - Move Quickly

David Redl has written to ICANN in relation to the ongoing work around whois and GDPR. The letter, which was shared with the GNSO Council last night, is a mixed bag. On the one hand, it offers the carrot in relation to what's been done so far, but then there's the not so veiled threat, which isn't a revelation by any means, of "domestic legislation." more

From Subscribers to Connections

The global telecoms industry numbers remain impressive: By 2020 there will be 6 billion mobile subscribers -- of which, according to Nokia, 95% will have access to wireless broadband by 2015, and by 2020, there will also be 3 billion fixed broadband subscribers. However the relevance of these numbers will decline. By 2020 there will be 50 billion fixed and mobile connections. more

US House Hearing Scheduled on Internet Stability, IANA Transition

The Subcommittee on Communications and Technology has scheduled a hearing for Wednesday, April 2, 2014 on "Ensuring the Security, Stability, Resilience, and Freedom of the Global Internet." more

Encryption and Child Sexual Abuse Prevention

Just over one week ago, the New York Times published a major investigation into the intractable problem of illegal sexual images of minors being exchanged online. Despite flaws in the story and its companion pieces, the main take-away that Internet companies have failed to adequately address the problem has resonated widely. Prostasia Foundation too has been critical of some of the Internet platforms called out in the article. But at the same time, we need to be realistic about how much responsibility we can (or should) place on tech firms to solve this problem. more

The .ORG Debate Should be About What Its Users Want

I watch the controversy over the proposed sale of the .ORG domain with a mixture of bemusement and concern. Some in the ICANN community – mostly those who resent that the Internet ever became commercialized – oppose the sale of the Public Interest Registry to the for-profit company Ethos for $1.1 billion. The basis of their concern is that the domain for non-profits should be in the hands of a non-profit and that the new owners might increase the current $9.93 fee PIR charges for a domain. more

Free Broadband: The Shape of Things to Come

The UK's broadband market is one of the most competitive in Europe. The DSL network effectively covers the entire country, while the network of the dominant cable provider Virgin Media covers more than half of all households (about 12.6 million homes). Beginning in 2007, Virgin Media expanded the availability of its services not by increasing the footprint of its cable network but by utilising wholesale LLU services... more

Prime Real Estate in the Cloud

In the physical world of real estate, value is all about location, location, location. In the virtual world of enterprise business, value is all about performance. The catch is that enterprise performance today is often driven by... location, location, location. When it comes to your digital transformation, and the migration of services to the cloud, the location of your data is paramount. To reach a customer looking to complete an on-line purchase or enable a group of employees trying to collaborate on a shared document, data needs... more

ICANN Security Team Reports on Conficker Post-Discovery Analysis

A paper released today by ICANN provides a chronology of events related to the containment of the Conficker worm. The report, "Conficker Summary and Review," is authored by ICANN's Dave Piscitello, Senior Security Technologist on behalf of the organization's security team. more

The .BEST Brand Protection (Interview)

Launching a social network based on a single domain name extension is seriously innovative, but such a concept also implies to give Trademarks a chance to protect themselves. I recently interviewed Cyril Fremont, the new operator of the .BEST Registry and also CEO of "THE.BEST Social Network" on his plan to allow Trademarks to protect their assets prior to the launching of the review network. more

Trump Names Former Bush Aide Thomas Bossert Chief Adviser on Cybersecurity, Counterterrorism Role

President-elect Donald J. Trump has named Thomas P. Bossert, a top national security aide under President George W. Bush, to be his homeland security adviser, the Trump transition team announced Tuesday morning," Michael D. Shear reporting in the New York Times. more