/ Most Viewed

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India

A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. more

Comcast Says FCC has no Authority to Prohibit Pay-for-Privacy Model by ISPs

Amidst debates concerning privacy rules for ISPs, Comcast in an FCC filing on Monday has urged the Commission to not interfere with business models offering discounts or other value to consumers in exchange for allowing ISPs to use their data. more

ICANN Report Shows Few Trademark Holders Using gTLD Sunrise Period

ICANN has released Draft Report of an Independent Review of the Trademark Clearinghouse. Key findings include the fact that "across eligible trademark holders, fewer than 20 percent have used the Sunrise period to date." more

ITU Putting Global Cyber Security on Top of Its Agenda

Lisa Schlein of the Voice of America reports: "A new system for tackling the growing number of Global Cyber Attacks has been unveiled at ITU Telecom World 2009, a mammoth exhibition, which showcases the latest advances in ICT or information and communications technology. The International Telecommunications Union, which is sponsoring the event, has put global cyber security at the heart of its agenda. 'As you well know, the next world war could happen in the cyber space and that would be a catastrophe,' said ITU secretary-general, Hamdoun Toure." more

U.S. Court Urged to Reverse Net Neutrality Rules, FCC Chair Says Petition ‘No Surprise’

Several wireless, cable and broadband trade associations today called on the U.S. Court of Appeals for the District of Columbia to reverse the net neutrality ruling that passed last month in a 2-1 decision by a three-judge panel. more

WiFi QoE Assurance with TR-069 - Part 1: The Toolbox

Subscribers today expect to be connected at all times with exceptional service quality. For communication service providers operating in urban environments, multi-dwelling units (MDUs) are a big cause for concern. Delivering consistently high WiFi service quality in high-density environments is a challenge. The sheer number of nearby access points, electronics, and outside influences can result in a host of WiFi service quality issues... more

Libya Using a Different Internet Strategy than Egypt

In a Renesys blog post, James Cowie writes: "Why did Libya put its Internet in 'warm standby mode' instead of just taking it down, as Egypt did? Perhaps because they're learning from Mubarak's experience. Cutting off the Internet at the routing level (powering down the Internet exchange point, going after the remaining providers with secret police to enact a low-level shutdown) was a technically unsophisticated desperation move on Egypt's part." more

How to Best Manage the Social Media

The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more

ICG Seeking Public Feedback on Key Internet Governance Proposal

The IANA Stewardship Transition Coordination Group (ICG) on Friday released for public comment the proposal for the transition of the stewardship of the Internet Assigned Numbers Authority (IANA) functions from the U. S. Department of Commerce's National Telecommunications and Information Administration (NTIA) to the global multistakeholder community. The ICG is encouraging the public to review the proposal and share their reactions and comments during the public comment period here. more

Steps on How Service Providers Can Combat CPE Fraud and Protect Network Security

Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices. To combat this problem, device provisioning solutions include mechanisms to prevent loss -- but what do you really need to protect your bottom line? more

The Emotional Cost of Cybercrime

We know more and more about the financial cost of cybercrime, but there has been very little work on its emotional cost. David Modic and I decided to investigate. We wanted to empirically test whether there are emotional repercussions to becoming a victim of fraud (Yes, there are). We wanted to compare emotional and financial impact across different categories of fraud and establish a ranking list (And we did). more

Nauruan Gov’t Says Ban on Facebook and Such Protects Citizens from “Abuse, Harassment and Bullying”

The Nauruan government says ban on websites such as Facebook is to protect its citizens from "abuse, harassment and bullying" as the United Nations urges the island's controversial regime to lift its ban on freedom of expression and human rights. more

How to Combat Counterfeiters on Chinese Marketplaces

Establishing your brand in an effort to combat counterfeiters on the ever growing and incredibly popular Chinese marketplace Alibaba can seem like a daunting task. Alibaba has grown so popular that it now ships over 12 million packages a day, compared the 3 million shipped by Amazon. Additionally, on Cyber Monday, a popular day for online shopping during the holiday season, Amazon processed 37 million orders. In comparison on Singles Day, an annual holiday in China, Alibaba processed 278 million orders. more

Open Web Foundation Launches to Push Data Portability

A new nonprofit organization called the Open Web Foundation (OWF) launched today with a mission to be an independent non-profit dedicated to the development and protection of open, non-proprietary specifications for web technologies. "The Open Web needs Open Data, Open Date needs Open Specifications," is one of the statements used in today's opening presentation. With backing from some of the biggest companies including Google, MySpace, Facebook, and Yahoo, the foundation plans to serve as a placeholder for "all the legal dirty work that needs to happen in order for data portability to become a reality." more

Pokemon Go Server Outage, Hacking Group Claims Credit

OurMine claims credit for DDoS attack on Pokemon Go servers: Several news outlets have reported the hacking group OurMine - also notorious for compromising social media accounts of various celebrities - on Monday took responsibility of hacking the game servers. more