/ Most Viewed

Internet 2008 in Numbers

In a blog post today, Royal Pingdom has posted a variety of statistical answers to questions for 2008 such as: How many websites were added? (A: 31.5 million) How many emails were sent? (A: 210 billion per day) How many blog posts were published? (A: 329 million) Other numbers include total number of Internet users in the world which, according to June 2008 data, is recorded at 1,463,632,361 with Asia having the highest percentage of users (39.5%) followed by Europe as the second largest (26.3%) and North America as the third (17%). Numbers have been gathered using a wide variety of sources from around the Web. more

Security Researchers Uncover Cyber Espionage Network Invloving 103 Countries

A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more

Internet Domain Shutdowns: Ineffective and Risky, Experts Warn

Efforts to curb illegal online content through domain shutdowns are proving ineffective and carry significant risks, according to a new report by eco and its topDNS initiative. more

Can Zero Trust Security Put an End to Human Security Weaknesses?

How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more

Microsoft Data Suggests 1 Out of Every 14 Downloads is Malware

Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more

Schneier: “Someone Is Learning How to Take down the Internet”

"Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet," wrote renowned security expert, Bruce Schneier, in a piece published in Lawfare. more

Mobilizing the Internet Community for Coronavirus Pandemic Communications

The Coronavirus pandemic has profound impact on every aspect of every person's life. We all have turned to the Internet to stay informed on this one subject. Unfortunately, the Internet community is not equipped to organize the Internet around one subject. Governments and businesses are reorganizing their websites daily to make new paths to new coronavirus information on many topics suitable for their many audiences. more

Technology Vendors Must Be Proactive in Dealing With COVID-19 Problems

Early action now on possible performance issues will "flatten the curve" of customer problems in the coming weeks and months. Here are three things technology and software vendors can do right now to get ahead of problems that may appear (if they are not already) with services such as development, implementation and support... Check your contracts to see whether there are any "material assumptions" that have failed or will fail - perhaps because of some governmental action or unavailability of personnel... more

ICANN Releases Call for Public Input for NTIA’s Stewardship Transition of IANA

On 8 April 2014, ICANN released the "Call for Public Input: Draft Proposal, Based on Initial Community Feedback, of the Principles and Mechanisms and the Process to Develop a Proposal to Transition NTIA's Stewardship of the IANA Functions." more

Harvard’s Berkman Center to Study ICANN’s Accountability and Transparency Review Process

The Berkman Center for Internet & Society at Harvard University announced today that it "will conduct an independent, exploratory study analyzing ICANN's decision-making processes and communications with stakeholders." The study is aimed at developing a framework and recommendations for understanding and improving ICANN's accountability and transparency. "The Berkman Center's final report will be made publicly available after ICANN's Accountability and Transparency Review Team has had the opportunity to utilize its findings in recommendations to the ICANN board." more

Canadian Government Used Airport Wi-Fi to Track Travellers, According to Leaked Snowden Documents

A top secret document retrieved by U.S. whistleblower Edward Snowden indicates that Canada's electronic spy agency used information from the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers for days after they left the terminal, according to a report from CBC. After reviewing the document, one of Canada's foremost authorities on cyber-security says the clandestine operation by the Communications Security Establishment Canada (CSEC) was almost certainly illegal...  more

China Shows Positive Attitude Towards IANA Transition

Observers of IANA transition may have found a remarkably interesting fact that both supporters and opponents of the transition like citing China, along with a small number of other countries, as evidence in favor of their arguments. For supporters, take Larry Strickling as an example, blocking transition benefits China in that it will "intensify their advocacy for government-led or intergovernmental management of the Internet via the United Nations." On the contrary... more

Researchers Expose Over 320 Million Hashed Passwords

A group of security researchers have succeeeded in cracking over 320 million passwords which were made public in an encrypted blacklist. more

Net Neutrality Can Be Taken Too Far, Says Zuckerberg in Defense of Internet.org Project

While speaking at a town-hall-style meeting in India on Wednesday, Facebook CEO Mark Zuckerberg defended the company’s controversial Internet.org project, insisting on how the project can help connect parts of the country that otherwise wouldn’t have access to the Internet. more

Unintended Consequences of Satellite Constellations

Astronomy & Astrophysics published a research paper recently that looked at "Unintended Electromagnetic Radiation from Starlink Satellites." The study was done in conjunction with the Low-Frequency Array (LOFAR) telescope in the Netherlands. The LOFAR telescope is a network of over forty radio antennas spread across the Netherlands, Germany, and the rest of Europe. more