/ Most Viewed

In Search of the Killer 5G App

AT&T and Comcast recently joined forces and joined the 5G Open Innovation Lab. This is a venture that has been funding start-ups and others working in 5G research. Along with looking to improve 5G edge technology, a primary goal of the OAI Lab is to search for killer apps for 5G. The two big companies join the other founding members of the effort, which includes Dell, Intel, Microsoft, Deloitte, and Nokia. more

ICANN Submits Transition Plan to US Government

Internet Corporation for Assigned Names and Numbers (ICANN) Board Chair Dr. Stephen D. Crocker today submitted to the U.S. Government a plan developed by the international Internet community that, if approved, will lead to global stewardship of some key technical Internet functions. The news was confirmed today at a press conference finalizing the ICANN 55 meetings in Morocco. more

Pokemon Go Server Outage, Hacking Group Claims Credit

OurMine claims credit for DDoS attack on Pokemon Go servers: Several news outlets have reported the hacking group OurMine - also notorious for compromising social media accounts of various celebrities - on Monday took responsibility of hacking the game servers. more

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India

A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. more

ICANN Report Shows Few Trademark Holders Using gTLD Sunrise Period

ICANN has released Draft Report of an Independent Review of the Trademark Clearinghouse. Key findings include the fact that "across eligible trademark holders, fewer than 20 percent have used the Sunrise period to date." more

The Emotional Cost of Cybercrime

We know more and more about the financial cost of cybercrime, but there has been very little work on its emotional cost. David Modic and I decided to investigate. We wanted to empirically test whether there are emotional repercussions to becoming a victim of fraud (Yes, there are). We wanted to compare emotional and financial impact across different categories of fraud and establish a ranking list (And we did). more

Group Creates International Association for Geographic TLDs

The operators of geographic top-level domains such as .nyc, .london, .berlin and .tokyo have founded an international non-for-profit association in Brussels. more

Brits Targeted by 3.7 Billion Phishing Scams in Past 12 Months

More than 420,000 scam emails are sent every hour in the UK according to a report published by Card Protection Plan Limited (CPP). The study estimates that Britons were targeted by 3.7 billion 'phishing' emails in the last 12 months alone. And a quarter of people admit to falling victim to e-fraudsters, with the average victim losing over £285 each. more

Internet Society Reinforces Need to Connect the Unconnected, Build Trust

The Internet Society's President and CEO, Kathy Brown, has highlighted how connecting the unconnected and building trust are the two most pressing imperatives facing the Internet today. more

Senior U.S. and Chinese Officials Conclude Four-Day Meeting on Cyber Security

Senior U.S. and Chinese officials concluded a four day meeting on Saturday discussing cyber security issues ahead of Chinese President Xi Jinping's visit to Washington later this month. more

The Hidden Costs of Digital Convenience

In today's digital age, the Internet is a ubiquitous presence in our lives, playing a pivotal role in how we communicate, work, learn, and entertain ourselves. However, the convenience and benefits of the Internet come with a hidden cost to the environment, which is often overlooked by end users. This article explores the environmental impact of online activities and highlights the importance of adopting more sustainable digital practices. more

Why the Dot Org Sale Is Failing and How Brooks, Nevett and Sullivan Could Have Wired It

When ISOC, PIR and Ethos announced the sale in November they hoped for a quick transaction. PIR CEO Jon Nevett announced the same week that PIR would be going on a buying spree. This was optimistic. Six months, if at all, is now the more likely outcome. How many times in recent history have companies surprised stakeholders with their best-laid plans, only to discover we no longer live in a world where business has free reign. The glory days of the 2000s died with Lehman Brothers. more

High-Bid Auctions Deflate the .nyc TLD

Our hope for an intuitive and trusted .nyc TLD took a hit today when 20 domain names were sold to 10 bidders in city's first high-bid auction. While the city refers to these as "premium" names, we think of them as heritage names. With our city-TLD's success predicated on its utility and predictability, this first of perhaps 25 auctions bodes poorly on its chances. More on that in a bit, but first some details on the auction. more

C-SPAN Interview: Internet and Cybersecurity

C-SPAN interviews professor Gene Spafford from Purdue University on the topic of cybersecurity and how the current Internet is a conduit for all types of "cybercrime". He also talks about the much discussed article "A New Internet?" by John Markoff in the February 14, 2009, New York Times in which he was quoted. The piece argued for a new type of Internet that is more secure with the trade-off of users giving up more of their anonymity. Professor Spafford talks about alternative solutions and he responded to questions via telephone calls and email. more

Malware Production Continues at Record-Setting Pace; 6000 Unique Pieces Per Day

Security researches report seeing as much unique malware in the first half of 2009 as seen in all of 2008. "This is quite something when you consider that in 2008 we saw the greatest ever growth in malware," says David Marcus of McAfee Avert Labs. More specifically, Marcus in a blog post writes that the numbers add up to an average of 200,000 unique pieces malware monthly or more than 6,000 a day. "Bear in mind these are malware we consider unique (something we had to write a driver for) and does not count all the other malware we detect generically or heuristically... When you add in the generic and heuristic detections the number becomes truly mind boggling," writes Marucs. more