According to a new security report released today by SANS Institute, TippingPoint and Qualys, the number of vulnerabilities found in applications in the last few years is far greater than the number of vulnerabilities discovered in operating systems. "On average, major organizations take at least twice as long to patch client-side vulnerabilities as they take to patch operating system vulnerabilities. In other words the highest priority risk is getting less attention than the lower priority risk." more
Following several months of pressure, ICANN has revealed a breakdown of figures under its catch-all term of "professional services," exposing its political expenses, Kieren McCarthy reported today in the Register. more
Iran's nuclear facilities are immune to cyber attack a senior Iranian military official has claimed today according to various reports. "Gholam Reza Jalali, who heads an Iranian military unit in charge of combatting sabotage, was quoted Monday by the official IRNA news agency as saying that Iran and its nuclear facilities possess the technology and knowledge to deal with malicious software." more
Listening to several of the discussions here at the IGF (so far), my post from yesterday seems to be close to what the focus of this meeting is, control and access to resources. Yesterday I highlighted areas of Governance where Governments actually could help, and make difference. Admittedly, that is not all the aspects of governance though. more
China’s mission to put its entire population on the internet is almost complete, as analysts predict full mobile broadband network coverage in the world’s second-largest economy within the next few years. more
Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. more
When it comes to broadband subscriptions, the current global recession is merely a short-term phenomenon according to new research released by TeleGeography. The research group reports that "by the end of 2013 the number of broadband subscribers across the world will have grown by 72% to over 700 million, while wireless subscriptions will have grown by well over two billion, an increase of 60%." TeleGeography's GlobalComms Insight predicts that the Asia-Pacific region will continue to dominate the global market but only in terms of total subscription numbers -- the market value will have a different story. "In 2013 the region's 50% share of global subscribers will account for only 28% of global market value. Conversely, while the relative size and importance of the North American market continues to diminish, in 2013 its 7% of subscribers will still account for 23% of global market value." more
According to a new study by PGP Corporation and Ponemon Institute, data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007. The study is based on 43 organizations across 17 different industry sectors with a range of 4,200 to 113,000 records that were affected. It is also noted that since 2005, the cost component has grown by more than $64 on a per victim basis since -- nearly a 40% increase. more
A number of people have reported on the International Telecommunications Union's (ITU) Plenipotentiary in Guadalajara. Indeed even the Secretary of the ITU Hamadoun Touré felt the need to comment, saying: "The ITU does not have the intention to take over the Internet. We are condemned to live together, so the question is whether we manage that well or not." A very firm statement - but it needs to be. Many still fear that the ITU is waiting for a moment of inattention by business and the Internet community and that it will pounce and attempt to place itself in a position of control. more
It must have been a galling experience for President Trump when his good mate British Prime Minister Boris Johnson failed to step in line with Trump's demand that the UK should also boycott the Chinese firm Huawei by not allowing them to be involved in the rollout of 5G in Britain. However, the involvement of Huawei will be limited. It further proves that boycotting Huawei is a political and not a technical issue. more
Domains enter a mature phase as AI reshapes discovery, security sharpens, and new gTLDs expand. Once simple addresses, they are becoming critical infrastructure for identity, trust, and automated commerce in the evolving web. more
The digital domain encompasses the different spaces and spheres we use to relate and interact with the people and things that surround us using digital technologies. The digital domain is not limited to the technologies itself, but it has an important ethical dimension that encompasses the values, principles and instruments that inform and govern it. Created by humans for humans, our beliefs, cultural backgrounds, and biases are reflected in the codes we write and the algorithms we create. more
Eric Vyncke reporting in the NetworkWorld: "IPv6 exists for more than 15 years and it is rumored to be deployed extensively in Asia and especially in Japan and China with Africa being the last continent to deploy IPv6. Another place where there should be a lot of deployments is of course in the USA with the US Government IPv6 mandates. But, when it comes to measure where web sites are actually deployed over IPv6, the rumor proves to be just a myth..." more
Kicking off the sixth annual National Cybersecurity Awareness Month this October, the Department of Homeland Security (DHS) has urged computer users to practice good "cyber hygiene". The campaign was given a boost Wednesday when the Senate passed resolution 285 to support its goal to make U.S. citizens more aware of how to secure the internet. DHS has also announced that is has been given new authority to recruit and hire up to 1,000 cybersecurity professionals across the department to fill roles such as: cyber risk and strategic analysis; cyber incident response; vulnerability detection and assessment; intelligence and investigation; and network and systems engineering. more
The first round of Initial Evaluation results has been released exactly on schedule. On March 23, ICANN announced that 27 out of 30 new gTLD applications reviewed this round passed Initial Evaluation. The remaining three applicants are still marked as in Initial Evaluation. more