/ Most Viewed

Greater Caribbean Cooperation Needed to Combat Cyber Crimes

The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats." more

Europe and North America Energy Sector Targeted by Sophisticated Cyberattack Group

The Western energy sector is being targeted by a new wave of cyberattacks capable of providing attackers ability to severely disrupt affected operations, according to reports on Wednesday. more

A Diversity Success Story from the Apps for Ag Hackathon Competition

Deema Tamimi had one plan for the 2016 California Apps for Ag hackathon: get in and get out. She thought the weekend-long event would be a good opportunity to meet people, but she didn't feel ready to launch a new app, and so she planned on stealing away soon after the hackathon began. This, despite the very impressive resume she'd accrued and the fully-formed idea for a gardening-based app that had been brimming for half a year. But something magical can happen when so many engineers, experts, change-makers, and creatives converge at a hackathon. more

Tech Heavyweights to Congress: Transition Has Our Support, Do Not Delay It

Earlier today some of the biggest names in the tech industry sent a letter to Congress in support of the IANA transition and urging Congress not to delay it. The IANA transition relies on the expiry of the contract between the US Government's Department of Commerce and ICANN which is scheduled for the end of this month. As has previously been noted, some conservative politicians, most notably Senator Ted Cruz, have been very vocal in their criticism of the move and want to block it in Congress. more

Busting 3 Popular and Misleading Terms in Telecom

"Philosophy is a battle against the bewitchment of our intelligence by means of our language." (-Ludwig Wittgenstein) The words we use to describe telecoms networks often contain hidden metaphors and meanings that lead us into wrong thinking. Here are three examples... Why misleading? The word "best" implies both benevolent and optimal intentionality: the network is going to do the "right" thing for its users, and it will maximise the "rightness" in some way. more

Report on Possibly the Largest Data Breach Ever

Amidst all the recent reports of data breaches, Gunter Ollmann of IBM Internet Security Systems, has reported today about one particular case which may be the largest data breach to date. Ollmann wirtes: "The media has been full of analysis concerning data breaches over the last couple of weeks, mostly related to the uptick in 2008 reports. While much of this increase can be accounted for by the wider adoption of state legislation that mandates companies to publicly disclose their data breaches, I think it is worth pointing out today's latest disclosure -- which is quite probably the largest breach ever." more

The Future Looks Bright for New gTLDs!

The ICANN Board meeting undertaken recently in Nairobi was indeed eventful and there were many vital topics on the agenda, in particular for the new gTLD program that kept many interested parties on the edges of their seats as the meeting unfolded. ... One of the more controversial decisions was in regard to the Expression of Interest (EOI), a program intended to allow potential new gTLD applicants to pre-register for their desired TLD and provide ICANN and the community with invaluable information regarding likely volumes of applications. more

Leveraging DNS for Subscriber Loyalty

There has been a lot of talk about how the DNS can provide network-based security, and how DNS is in the best position to detect malware traffic before it does any harm. But what does this mean for end users? How does it make their online lives easier and more secure? DNS servers that are aware of sites that host malware, perform phishing activities (harvesting bank details, for instance) and other nefarious misbehaviors, can prevent end users from ever going to those sites. more

Internet Shutdowns On The Rise Worldwide, Says Report

From the Middle East to South Asia to Africa, shutdowns are becoming a norm of authoritarianism -- an accepted means of silencing criticism, stifling dissent, and controlling the population. Governments are increasingly using digital tools to surveil, censor, and manipulate information, as well as amplify their own propaganda. more

SpaceX Files Application with FCC to Offer Internet Access Via Satellite Constellation

SpaceX, the private space company headed by Elon Musk, has filed an application with the US FCC (Federal Communications Commission) as part of a preliminary plan to launch a network of satellites providing Internet access around the globe. The application submitted last week (May 29th), outlines two satellites initially to be launched by Space Exploration Technologies Corporation (SpaceX), and later expanding to 6-8 trial satellites that will be in orbit for 6-12 months. more

How Should I Present .Brand Domains in Advertising? (Part 2)

Part 2: How do I choose the right option for my brand? In my previous article, I discussed the question of how to represent .brand domains in advertising. As you can imagine, it's a balancing act -- stimulating awareness of the domain, creating the desired customer behavior of the future using .brands, whilst ensuring that we are considerate to the fact that .brands are yet to hit mainstream awareness. Sounds simple right? more

A Brief History and Recent Developments in the Co-Existence of Web2 and Web3 Domains

The Domain Name System (DNS, aka Web 2) and Web3 platforms are two different naming systems available to internet users. While the DNS (Web2) has been a reliable and trusted internet standard for decades, Web3 platforms (such as ENS, Handshake and Unstoppable) are a relatively new technology deployment that presents unique and different features. more

A Reality Check on 5G in Rural America

FCC Chairman Ajit Pai recently told the crowd at CES that 5G would be a huge benefit to rural America and would help to close the rural broadband divide. I have to imagine he's saying this to keep rural legislators on board to support that FCC's emphasis on promoting 5G. I've thought hard about the topic, and I have a hard time seeing how 5G will make much difference in rural America – particularly with broadband. more

Study on Improving Internet Usability: A Framework for Domain Name Policy Evaluation

A domain name is a unique alphanumeric designation that facilitates reference to sets of numbers which actually locate a particular computer on the Internet. Domain names are a fundamental part of the Internet's user interface. Improving the usability of the Internet depends upon effective domain name policy. This study is intended to contribute to improvement in Internet usability for the end users of domain names. Benefits of more usable domain names include: higher sales, customer satisfaction and productivity, and reduced support costs. more

Defense Science Board Urges Obama to Take Immediate Cybersecurity Measures

According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders... Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek." more