/ Most Viewed

What Happened to IPv5, IPv7, IPv8 and IPv9?

The IPv4 market has created serious interest in the protocol far beyond the natural confines of networking professionals. These assets are worth a lot. Marketplaces, IPv4.Global's especially, have grown to be large centers of asset transfer by buyers and sellers of IPv4 addresses. IPv4.Global has helped transfer over $1 billion in IPv4 blocks. more

Republicans Barreling Toward a September Showdown Over IANA Transition

Republicans gear up for fight against internet transition," Ashley Gold and Tony Romm reporting in the POLITICO today. more

Neighbours Create Their Own Internet Service on Orcas Island

Faced with slow and outage-prone Internet access, residents of Orcas Island, one of the San Juan Islands in Washington state, decided to design their own network and built it themselves. more

Escalating US, Chinese Silent War on the Internet

Jason Mick reporting in DailyTech: "In the definitive cyberpunk novel Neuromancer, published in 1984, author William Gibson prophetically envisioned that wars of the future would be fought over the internet -- a new construct at the time. Today that prediction appears on the verge of coming true as we stand on the threshold of a vast digital battle. Agents in China, believed to be working for, or endorsed by the Chinese federal government are carrying out a secret cyberwar against the U.S. government and U.S. businesses. And that war appears to be escalating." more

FBI, Apple Hearing Over iPhone Encryption Halted

FBI says it may have found a way to unlock Syed Rizwan's iPhone without Apple's help and while exploring this option, a federal judge has postponed tomorrow's hearing. more

Happy OneWebDay: Celebrations are Underway Around the World

Today marks the third annual OneWebDay (Earth Day for the Internet) and communities around the world are holding events to learn about and advocate the Internet. Gatherings are being held in major U.S. cities as well as Melbourne, London, Paris, Berlin, Brussels, Copenhagen, Singapore, Tunisia and elsewhere. more

The State of Internet Traffic (After Dark)

According to a recent research, European Internet traffic peaks in the early everning and drops off soon after until the next business day hours while in the United States, internet traffic reaches its peak at 11 p.m. EDT and stays relatively high until 3 a.m. in the morning. "The question is what are Internet users doing after dark?" Craig Labovitz of Arbor Networks reportsmore

RIPE NCC Announces Launch of IPv6 Act Now! Website

The RIPE NCC today announced the launch of the IPv6 Act Now! website. RIPE NCC, a Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia, calls the website a one-stop destination on IPv6 where everyone can understand and provide a variety of useful information aimed at promoting the global adoption of IPv6. "The site is for anyone with an interest in IPv6, including network engineers, company directors, law enforcement agencies, government representatives and civil society." more

US Law-Enforcement Agencies Reported to be at Risk in Foreign-Owned Buildings

US law-enforcement agencies are at risk of being spied on and hacked because some of their field offices are located in foreign-owned buildings without even knowing it. more

Mysterious Hacker Claims to Have Hacked a Group Linked to the NSA

A mysterious hacker or hackers going by the name 'The Shadow Brokers' claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files. more

Latvian ISP Closure Dents Cutwail Botnet ...for a Whole 48 Hours

From MessageLabs' latest report: "Real Host, an ISP based in Riga, Latvia was alleged to be linked to command-and-control servers for infected botnet computers, as well as being linked to malicious websites, phishing websites and 'rogue' anti-virus products. Real Host was disconnected by its upstream providers on 1 August 2009. The impact was immediately felt, where spam volumes dropped briefly by as much as 38% in the subsequent 48-hour period. Much of this spam was linked to the Cutwail botnet, currently one of the largest botnets and responsible for approximately 15-20% of all spam. Its activity levels fell by as much as 90% when Real Host was taken offline, but quickly recovered in a matter of days." more

Consumer Reports: U.S. Consumers Lost Nearly $8.5 Billion to Viruses, Spyware, and Phishing

U.S. consumers lost almost $8.5 billion over the last two years to viruses, spyware, and phishing schemes according to latest projections from the Consumer Reports State of the Net survey. Additionally, report estimates that American consumers have replaced about 2.1 million computers over the past two years because of online threats. Survey has also reveals some hopeful signs such as declining chances of becoming a cybervictim -- consumers have 1 in 6 chance of becoming a cybervictim, down from 1 in 4 in 2007. more

Survey Suggests Strained Budgets Causing Security Cutbacks on Known Threats

A recent survey of security professionals by RSA Conference with regards to critical security threats and infrastructure issues currently faced, revealed budgetary constrains as the top challenge currently faced. According to reports, the study suggests that even though practitioners are most concerned about email phishing and securing mobile devices, technologies addressing these needs are at risk of being cut from IT budgets. 72% percent of respondents indicated a rise in email-borne malware and phishing attempts since Fall 2008, with 57% stating they have seen an increase in Web-borne malware. Concerns about zero-day attacks and rogue employees as a result of layoffs were cited by 28% and 26% of survey respondents, respectively. more

Information Warfare Publicly Admitted, No Longer Just a Tool for Espionage

Gadi Evron reporting today on Dark Reading: "A National Journal Magazine article called "The Cyberwar Plan" has been making waves the last few days in our circles -- it's about how cell phone and computer attacks were used against Iraqi insurgents by the National Security Agency (NSA). Its significance is far more than just what's on the surface, however. The article describes several issues and that in my opinion confuses what matters..." more

Building Resilient Broadband Networks: Lessons from the Power Industry’s Transformation

It's almost impossible to talk about broadband at the community level without talking about resiliency and redundancy. It's hard to find rural communities that haven't experienced a broadband outage due to a fiber being cut somewhere. The issue hits the news when there are reports of regional or national broadband outages. more