/ Most Viewed

Google Serving 25 Percent of Consumer Internet Traffic Through North American ISPs

Google is now serving close to 25 percent of all consumer internet traffic running through North American ISPs, according to a report from Wired. "That's a far larger slice of than previously thought, and it means that with so many consumer devices connecting to Google each day, it's bigger than Facebook, Netflix, and Instagram combined. It also explains why Google is building data centers as fast as it possibly can. Three years ago, the company's services accounted for about 6 percent of the internet's traffic." more

The Christmas Goat and IPv6 (Year 14)

A new year and a new goat with new conditions, the goat was slowly eaten by jackdaws, and in the end, almost only the frame remained. This was really slow TV for the devastation… You can read more on Wikipedia about the devastating jackdaws and the straw... 36% IPv6 is equal to last year, and I had high hopes as Telia (AS3301) has made great progress in IPv6 and that Sweden should be the dominant country.  more

FBI’s Chabinsky Defines and Describes Cybercriminal Operations at FOSE

Neil Schwartzman writes: Steven R. Chabinsky, Deputy Assistant Director, Cyber Division of the Federal Bureau of Investigation gave a keynote at the GovSec/FOSE Conference in Washington, D.C., March 23, 2010. Full text of the speech heremore

Canadian Government Proposes Mandated Surveillance Capabilities at ISPs

Government of Canada has introduced a new bill that could allow the police to access ISP's user data without warrant. According to Michael Geist, a law professor at the University of Ottawa, "the Government has taken another shot at lawful access legislation today, introducing a legislative package called the Investigative Powers for the 21st Century (IP21C) Act that would require mandated surveillance capabilities at Canadian ISPs, force ISPs to disclose subscriber information such as name and address, and grant the police broad new powers to obtain transmission data and force ISPs to preserve data." more

Berners-Lee: Ted Cruz Wrong About How Free Speech Is Censored on the Internet

"Sen. Ted Cruz wants to engineer a United States takeover of a key Internet organization, ICANN, in the name of protecting freedom of expression," said Tim Berners-Lee and Daniel Weitzner in a co-op piece today in the Washington post. more

Escalating Violence in Iraq Leads to Internet Shutdown

The escalating violence in Iraq has resulted in government shutting the the local Internet access according to a report by Renesys today. From the report: "Renesys has observed two large Internet outages this week that our sources confirmed to be government-directed outages. These interruptions appear to coincide with military operations, amid concerns that ISIL forces are using Internet websites to coordinate their attacks." more

ICANN Releases 5th Round of Initial Evaluation Results - 169 TLDs Pass

Mary Iqbal writes to report that ICANN has released the fifth round of Initial Evaluation results, bringing the total number of applications that have passed the Initial Evaluation phase to 169. ICANN is targeting completing Initial Evaluation for all applicants by August 2013. more

Lawrence Strickling on NTIA and the Upcoming ICANN Meeting Next Week

In preparation for the upcoming ICANN 53rd meeting in Argentina, Lawrence Strickling, Assistant Secretary for Communications and Information and NTIA Administrator, reminds the community that "one of NTIA's top priorities continues to be the transition of NTIA's role related to the Internet Domain Name System." more

What Steps Can Africans Take and Lead in Internet Governance and Social Justice?

Almost three years ago, I published a blog post on CircleID titled "Internet Governance: Why Africa Should Take the Lead." I argued that African Internet stakeholders use a 'wait and see approach' in matters as critical as Internet governance," and that African voices are missing in key Internet governance discussion fora. Additionally, I suggested that some reasons for this approach, including that Africa lacks well-trained Internet governance experts and Africans see foreign affairs and international relations as an East versus West dynamic. more

Major U.S. ISPs Say They Will Not Sell Customer Browsing Histories

Amidst U.S. Congress approval of legislation reversing Internet privacy rules, Major U.S. Internet providers, Comcast, Verizon and AT&T, said they would not sell customers’ individual internet browsing information. more

Spring Clean Your House of Domains, DNS and Digital Certificates

At the start of the year, many responsible for managing domain name portfolios may be considering spring cleaning! Traditionally, such a task consists of a review to check that all domains in the portfolio serve a purpose either from a commercial or defensive perspective. The aim is to ensure budget isn't wasted on domains of little to no value. It's fair to say that for many organizations, this is a difficult process - almost as feared as actually spring cleaning our own homes. more

A Storm in a Teacup or a Perfect Storm?

We've had snow storms recently in the UK, so there is much talk about storms. It strikes me that some might view the current issues at Nominet as a storm in a teacup – a small event that has been exaggerated out of all proportion. Not unsurprisingly, I don't agree. I think that the storm has already had a significant effect on Nominet... more

Unregistered Gems Part 3: Keeping Your -ize on the Prize

The previous two articles in this series have outlined techniques for 'mining' brandable domain names -- that is, domain names of potential interest to entities looking to launch a new brand name and associated website -- from the enormous dataset of unregistered names (determined via zone file analysis). The key element of the identification process is the implementation of filtering techniques to identify... more

New Ways Cybercriminals are Thwarting Security

M86 Security today released it's bi-annual security report for the first half of 2010, highlighting the evolution of obfuscation through combined attacks. From the report: "This threat trend is the latest to emerge as cybercriminals seek new ways to limit the effectiveness of many proactive security controls. Because existing techniques for 'covering their tracks' are becoming less effective, cybercriminals have begun using combined attacks, which are more complex and difficult to detect. By splitting the malicious code between Adobe ActionScript language - built into Adobe flash - and JavaScript components on the webpage, they limit the effectiveness of many of the the proactive security detection mechanisms in place today." more

The Global Digital Compact and the Future of Digital Governance

The unveiling of the Global Digital Compact's (GDC) zero draft on April 1, 2024, heralds a critical juncture in the quest to frame a digital future that is equitable, secure, and human-centered. Orchestrated under the leadership of UN Secretary-General António Guterres, the initiative endeavors to forge a consensus-driven framework for global digital cooperation. more