FCC Chairwoman Jessica Rosenworcel has proposed that the US standard for broadband be redefined to a minimum of 100Mbps download and 20Mbps upload speeds, up from the current 25Mbps/3Mbps. more
In an announcement released this morning, Rigtside said its Board of Directors has rejected the unsolicited proposal from Donuts Inc. to acquire Rightside's entire registry of generic top-level domains (gTLDs) and related assets for $70 million in an all-cash deal. more
Early this morning in Syria, the Internet was almost entirely down for four hours. It was the ninth such outage since 31 July 2016 -- each one lasting from approximately 4am to 8am local time. more
In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more
"Money is like muck, not good except it be spread", according to English philosopher Francis Bacon. In these times when everyone is busy with the big questions surrounding the IANA transition and ICANN accountability, I thought we could quickly solve some simple questions. One of them is: What should ICANN do with all that money? What money, you might ask? more
The unveiling of the Global Digital Compact's (GDC) zero draft on April 1, 2024, heralds a critical juncture in the quest to frame a digital future that is equitable, secure, and human-centered. Orchestrated under the leadership of UN Secretary-General António Guterres, the initiative endeavors to forge a consensus-driven framework for global digital cooperation. more
Ed O'Brien, guitarist from the band Radiohead, is the latest musician expressing support for DotMusic's community-based application for the new gTLD .music. more
The Aspen Institute released the IDEA Common Statement and Principles as a do no harm Hippocratic Oath for Internet governance. The Aspen report describes the present moment as an inflection point for "the most robust medium of information exchange in history". Reed Hundt outlined the risks associated with Internet governance changes favored by China and a group of developing nations through the ITU. more
Network security experts from across the U.S. government told a U.S. Senate Armed Services Subcommittee on Tuesday that federal networks have been thoroughly penetrated by foreign spies, and that current perimeter-based defenses that attempt to curb intrusions are outdated and futile. more
The website of Swimming Australia has come under DDoS attack just hours after the Australian Bureau of Statistics went back online following a similar attack bringing the online census initiative to a halt. more
Advanced threat detection company, Damballa has released findings of a new research on Wednesday, detailing the overblown nature of the mobile malware problem. According to the company, the research, based on Big Data (50% of US mobile traffic), was used to determine actual malware infection rates -- not just samples found, or vulnerabilities/theoretical attacks. more
In a joint announcement today, Dutch research institute CWI and Google revealed that they have broken the SHA-1 internet security standard "in practice". more
Brandsight recently concluded their Second Annual Domain Management Survey. Respondents to the survey were corporate domain name professionals. Of those that responded, 35% had portfolios that were between 3,000-10,000 domains and another 30% had portfolios greater than 10,000 domains. Fifty-seven percent of respondents reported that they manage domains out of the legal department, with the remaining respondents' portfolios managed out of IT, marketing and other groups. more
Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more
The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more