/ Most Viewed

US Broadband Speed 15 Years Behind South Korea at Current Rate of Growth

According to research by the Communications Workers of America (CWA), from 2007 to 2009, the average download Internet speed in the United States has increased by only 1.6 megabits per second (mbps), from 3.5 mbps in 2007 to 5.1 mbps in 2009. At this rate, CWA says it will take the U.S. 15 years to catch up with current Internet speeds in South Korea, the country with the fastest average Internet connections. "People in Japan can upload a high-definition video in 12 minutes, compared to a grueling 2.5 hours at the US average upload speed," says the report. more

Ted Cruz May Have a Point

As the time ticks away on Senator Cruz's ersatz Doomsday clock, possibly accompanied by the fat sound of Mic Michaeli's analog synthesiser riff, it is easy to dismiss all his arguments as the ravings of a disappointed Cecil Underwood. Some in the ICANN community have described Cruz as a skilled orator. This isn't precisely accurate. He is certainly a competent orator but his outstanding skill is that he is a brilliant courtroom advocate. more

IGF 2015 Tackling the Next Billion Online Challenge

Just two weeks ago, the United Nations hosted the Sustainable Development Summit (SDS) where the international community embraced a new global agenda. I was very pleased that ICTs were recognized as a crucial platform for the implementation of this agenda, which sets an ambitious goal to "significantly increase access to information and communications technology and strive to provide universal and affordable access to the Internet in least developed countries by 2020" (paragraph 9c of the text for the new Sustainable Development Goals). more

Internet Three Strikes Laws Violate International Law, Says UN Report

Michael Geist reporting in his blog: "The United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression has released an important new report that examines freedom of expression on the Internet. The report is very critical of rules such as graduated response/three strikes, arguing that such laws may violate the International Covenant on Civil and Political Rights. Moreover, the report expresses concerns with notice-and-takedown systems, noting that it is subject to abuse by both governments and private actors." more

U.S. Nuclear Power and Other Energy Companies Hacked by Russians According to Government Officials

Russian government hackers are reported to be behind latest cyber-intrusions into the business systems of U.S. nuclear power and other energy companies with efforts to assess networks. more

Kathryn C. Brown Named Internet Society’s New CEO

The Internet Society announced today the appointment of Kathryn C. Brown as its new Chief Executive Officer effective 1 January 2014. Ms. Brown succeeds Lynn St. Amour, who will be stepping down after 15 years with Internet Society. Ms. Brown most recently served as a Senior Advisor at Albright Stonebridge Group, an international consulting firm, and as Senior Vice President, Public Policy and Corporate Responsibility at Verizon. more

Geneva Discussion to Include India’s Proposal for Government Control of Internet

Shalini Singh reporting in the Hindu: "The raging controversy over possible excessive state regulation of the internet based on the IT Rules 2011 is now likely to be dwarfed by discussions in Geneva later this week over India's proposal to the United Nations General Assembly, for government control of the Internet... In its proposal submitted to the General Assembly in New York on October 26, 2011, India has argued for a radical shift from the present model of multi-stakeholder led decision-making, to a purely government-run multilateral body..." more

Building a More Secure Routing System: Verisign’s Path to RPKI

At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more

Phishers Using New Web-Based Technique ‘In-Session Phishing’ to Steal User Data, Researchers Warn

Security researchers have identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on to an online banking, brokerage, or other sensitive website. The technique, called In Session Phishing, can be used to inject into all major browsers legitimate looking Pop Up messages using malicious JavaScript that request passwords, account numbers, etc., on behalf of the trusted website. more

LEO Broadband Will Create Millions of Jobs

Earlier this month, Elon Musk tweeted an invitation to a job fair at the new SpaceX production and launch facility near Boca Chica, Texas. As shown here, the tweet says they want hard-working, trustworthy people with common sense. They are not looking for specific skills or education, but certain character traits – "the rest we can train." That tweet reminded me of hiring practices when I graduated from college. more

Yellow Parking Violation Fliers on Windshields Get Drivers to Visit Malicious Website

Security expert and malware analyst, Lenny Zeltser has examined a creative malware distribution method in the real world where fliers placed on windshield of cars scare drivers into visiting a malicious website. Zeltser writes: "Several days ago, yellow fliers were placed on the cards in Grand Forks, ND. They stated: 'PARKING VIOLATION This vehicle is in violation of standard parking regulations. To view pictures with information about your parking preferences, go to website-redacted' ... If you went to the website, you'd see several photos of cars on parking lots in that specific town..." more

ICANN Can Help China Secure Cyberspace

Before the righteous too much deride the "International Strategy of Cooperation on Cyberspace" emanating from China's cooperative one-party state, consider what progress it represents: a policy document that begins with principles, speaks often of cooperation, and clearly details the bilateral and multilateral approaches the country intends. By any measure, this is good practice from a keystone of the international system. And it offers a gift to those who would wish the Internet to be governed otherwise. more

Cable Customers Plummet in 2019

The final numbers are in for 2019 and the largest cable providers collectively lost over 5.9 million customers for the year - a loss of almost 7% of customers. The numbers below come from Leichtman Research Group which compiles these numbers from reports made to investors, except for Cox which is estimated. The numbers reported are for the largest cable providers, and Leichtman estimates that these companies represent 95% of all cable customers in the country. more

Massive Data Breach Hits HCA: 11 Million Records Compromised

In what is currently the largest healthcare industry data breach, Hospital Corporation of America (HCA) has confirmed the theft of 11 million patient records. HCA, one of the country's most prominent healthcare providers, believes the breach originated from an external storage system used for email automation. more

The True Effect of Corona on the DNS

In recent weeks we've seen a range of press articles, security blogposts and public statements addressing real or perceived issues with network capacity and the domain name system (DNS) in particular. These range from concerns about the resilience of the DNS with questions on the impact of the number of registrations to news indicating that a tidal wave of fraud and abuse is hitting the world. more