/ Most Viewed

Extreme Cyberattack Could Cost as Much as Superstorm Sandy, Says Insurer Lloyd’s of London

A global cyberattack has the potential to cost $120bn in economic losses, roughly the equivalent of a catastrophic natural disaster like 2012’s Superstorm Sandy, a scenario described in new research by Lloyd’s of London and Cyence, a cyber-risk analytics modeling firm. more

Governments Pushing for Greater Control Over Geographic TLDs

Governments are toying with the idea of asking ICANN for greater powers over gTLDs that match their geographic features," Kevin Murphy reporting in Domain Incite. more

Independent Show 2015: Out-of-the-Box Lessons in the Digital Age

This year's Independent Show summer conference was held in Boston, a place where the accents are strong and you hear great quotes like... If I had to sum up this year's conference with one phrase, it would have to be: out-of-the-box thinking. The keynote speech was given by Professor Bharat Anand of the Harvard School of Business, whose expertise is in the areas of digital strategy, corporate strategy, and media strategy -- in other words, digital marketing. The title was "Lessons from the Digital Transformation of Media". more

Virtualizing the Gateway - How CSPs Are Revolutionizing the Network Edge

Software-defined networking (SDN) itself represents a deconstructed view of current switching and routing architectures providing the abstractions of control from dataplane. With this newfound control, the industry is leveraging multiple virtualization strategies to build out public, private, and hybrid cloud architectures, delivering multiple new application services to the market. more

Decoding Internet Governance Stakeholders, Part 2: Private Sector

The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations", as well as to "make full use of the expertise of the academic, scientific and technical communities". more

Will the UN Step Up Transparency on the Tech Envoy Selection Process?

A few weeks ago, a new vacancy was added to the UN Webpage for Senior Leadership Positions, inviting applications to become the new Tech Envoy. This position has a long and unfortunate backstory. It was created in 2019 as a new role, as an outgrowth of the UN's High-Level Panel on Digital Cooperation and the UN Secretary General's Roadmap for Digital Cooperation -- with a vague remit to "advise senior leadership of the United Nations on key trends in technology and... more

Internet Society Applauds Plan to Transition Oversight of Key Internet Resources

The Internet Society (ISOC) Board of Trustees today passed a resolution to strongly support the plan developed by the global Internet community presented to the U.S. National Telecommunications and Information Administration to transition oversight of key Internet resources. more

What’s Happening With Aug. 13 Applicant Auction to Resolve gTLD Contention?

The second Applicant Auction is coming up on August 13, and after a great round of workshops at the ICANN Conference in Durban, we've started to finalize all of the details. Any applicants who haven't indicated their intention to participate can still do so! more

Malware Production Continues at Record-Setting Pace; 6000 Unique Pieces Per Day

Security researches report seeing as much unique malware in the first half of 2009 as seen in all of 2008. "This is quite something when you consider that in 2008 we saw the greatest ever growth in malware," says David Marcus of McAfee Avert Labs. More specifically, Marcus in a blog post writes that the numbers add up to an average of 200,000 unique pieces malware monthly or more than 6,000 a day. "Bear in mind these are malware we consider unique (something we had to write a driver for) and does not count all the other malware we detect generically or heuristically... When you add in the generic and heuristic detections the number becomes truly mind boggling," writes Marucs. more

Google’s Project Zero Team Discovers Critical Vulnerabilities in Symantec and Norton

"These vulnerabilities are as bad as it gets," says Google's Information Security Engineer, Tavis Ormandy, in reference to multiple critical vulnerabilities discovered affecting Symantec, a popular vendor in the enterprise security market. more

Brits Targeted by 3.7 Billion Phishing Scams in Past 12 Months

More than 420,000 scam emails are sent every hour in the UK according to a report published by Card Protection Plan Limited (CPP). The study estimates that Britons were targeted by 3.7 billion 'phishing' emails in the last 12 months alone. And a quarter of people admit to falling victim to e-fraudsters, with the average victim losing over £285 each. more

Turkey Blocks Access to Facebook, Twitter, YouTube and WhatsApp

Access to multiple social media services including Facebook, Twitter and YouTube have been reported throughout Turkey beginning Friday Nov 04 2016 1:20AM local time – ongoing as of Friday noon. more

Third Round of Evaluation Results for New TLDs

Mary Iqbal writes to report that ICANN has released the third round of initial evaluation results, bringing the total number of applicants to pass Initial Evaluation to 93. ICANN has now completed the initial evaluation of all but 13 IDN Top Level Domains. more

Why the IGF Now Sits at the Fault Line

The UN's move to grant permanence to the Internet Governance Forum reframes legitimacy in digital policy. As states accelerate action, multistakeholder processes risk becoming ceremonial, with speed replacing consent as the arbiter of influence. more

Broadband and Food Safety

I recently saw a presentation that showed how food safety is starting to rely on good rural broadband. I've already witnessed many other ways that farmers use broadband like precision farming, herd monitoring, and drone surveillance, but food safety was a new concept for me. The presentation centered around the romaine lettuce scare of a few months ago. The food industry was unable to quickly identify the source of the contaminated produce and the result was a recall of all romaine nationwide. more