/ Most Viewed

Submarine Cable Resiliency in the Face of Disruptions

I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more

Twitter Worker Who Disabled Trump Account Likely Violated Computer Fraud and Abuse Act, Says Lawyer

A prominent attorney for cybersecurity issues says the unnamed Twitter worker who deactivated President Trump's Twitter account not to say anything and get a lawyer. more

Global Law Enforcement Strikes Major Blow Against LockBit Ransomware Operation

In a significant global operation, law enforcement agencies from 10 countries have severely disrupted the LockBit ransomware group, recognized as the most prolific and harmful cyber threat worldwide. more

Net Neutrality Alternative: Effective Interpretation, Oversight and Enforcement of Existing Rules

The US government is proposing broad new regulations for telecommunications and cable internet service providers. The new proposals appear to target specific providers for regulation and government oversight. Specifically, Massachusetts Senator Ed Markey has proposed the Internet Freedom Preservation Act of 2009, or the "Net Neutrality" bill, outlining government policies to impose new governance and restrictions targeting telecommunications and cable providers AT&T, Verizon, Time Warner and Comcast. more

Reduce Churn with Better Visibility Over Your Service Activation Processes

How much visibility do you have over service activation processes? For many service providers, the answer to that question is bleak. The sad truth is that visibility over service activation processes, including errors and misconfigurations, is lacking in many Tier 3, Tier 2, and even Tier 1 organizations. Today's operators often turn to multiple siloed systems when attempting to ensure that services are activated accurately, on time, and are working as promised. more

Report Looks at Humanitarian Futures for Messaging Apps

To develop responsible, effective and safe ways to use messaging apps, organizations need to better understand the opportunities and risks they present - new research report released by The Engine Room in partnership with International Committee of the Red Cross (ICRC) and Block Party. more

Cyptech Needs You!

In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more

FCC Pushing for Free Internet Plan, Called Most Controversial Issue in December

Outgoing Federal Communications Commission Chairman Kevin Martin is pushing for action in December on a plan to offer free, pornography-free wireless Internet service to all Americans, despite objections from the wireless industry and some consumer groups. The proposal to allow a no-smut, free wireless Internet service is part of a proposal to auction off a chunk of airwaves. The winning bidder would be required to set aside a quarter of the airwaves for a free Internet service. more

What Will 2021 Have Install for the ICT Industry?

While 2021 will remain a year with lots of uncertainties, at the same time, we can say that the pandemic has not affected the information and communications technology (ICT) industry in any significant way. Yes, there has been a slowdown, for example, in the sale of smartphones. Shortages in both materials and expertise are slowing fiber deployment, and the recovery over 2021 will be slow and uncertain because of the many lockdowns and travel restrictions. more

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more

New Cyber Security Bill Could Increase Power of President and DHS

Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more

First .emarat Arabic Script Domain Name is Live!

The .emarat Arabic script Internationalised Domain Name (IDN) ccTLD for the United Arab Emirates has been entered into the DNS Root Zone and is therefore now resolving. This is a truly historic moment in the development of the Internet in the United Arab Emirates and the wider Arabic-speaking world as it removes the last hurdle preventing people without English-language skills from enjoying the full benefits that the Internet has to offer. more

4% of Americans Online Use Location-Based Services, According to Pew Survey

In its first report on the use of "geosocial" or location-based services, the Pew Research Center's Internet & American Life project finds that 4% of online adults use a service such as Foursquare or Gowalla that allows them to share their location with friends and to find others who are nearby. On any given day, 1% of internet users are using these services. more

Don’t Let Patent Wars Widen Digital Divide

For generations, large pockets of Africa were isolated from things many of us take for granted: access to medical treatment and advances that can make the difference between a healthy, productive life or debilitating illness -- or even an early death. These problems still persist, but over the last two decades technology has helped break through and enable medical professionals to reach the poorest and most remote populations and offer some hope. more

Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more