/ Most Viewed

WhatsApp Suspension Called ‘Sad day for Brazil’ by Facebook

Facebook chief executive Mark Zuckerberg has called it a "sad day for Brazil" after a court there ordered a two-day shutdown of the popular messaging app WhatsApp, owned by the social media company. more

Domain Name Registrations Up 22% from Last Year, Totaling 168 Million

VeriSign today released the Domain Report for the second quarter of 2008, highlighting a continued growth of the Internet globally. At the midpoint of 2008, according to the report, there were 168 million domain name registrations across all Top Level Domain Names (TLDs) -- repersenting a four percent increase over the first quarter of 2008 and 22 percent growth over the same quarter last year. The base of Country Code Top Level Domain Names (ccTLDs) totaled 65 million domain names, a four percent increase quarter over quarter and a 27 percent increase year over year. VeriSign also reports on processing peak loads of more than 48 billion Domain Name System (DNS) queries per day in the second quarter of 2008. more

ANA: Concerns About ICANN’s New gTLD Plans Growing and Very Serious

In a recent blog post, Dan Jaffe, Association of National Advertisers' Executive VP of Government Relations, shares some concerns about ICANN's "overly rapid Top Level Domain rollout". more

ISOC: Global Internet Community Must Unite to Support Open Internet Access, Freedom, and Privacy

The Internet Society Board of Trustees during its meeting in Berlin, Germany today called on the global Internet community to stand together in support of open Internet access, freedom, and privacy. Recently exposed information about government Internet surveillance programs is a wake-up call for Internet users everywhere -- the fundamental ideals of the Internet are under threat. The Internet Society Board of Trustees believes that government Internet surveillance programs create unacceptable risks for the future of a global, interoperable, and open Internet. more

Expect More Malware Threats Exploiting the Financial Crisis, Warn Experts for 2009

Continued exploitation of the financial crisis to scam users with fake financial transactions services, fake investment firms, and fake legal services is the top trend to emerge for 2009 according threat predictions by McAfee. "Computer users face a dangerous one-two punch today," said Jeff Green, senior vice president of McAfee Avert Labs, McAfee's research group. "The current economic crisis is delivering a blow to our financial well-being, while malware authors are taking advantage of our distraction to deliver a roundhouse strike." more

Google’s Lighthouse Lawsuit - Disrupting the Cybercrime Supply Chain

Google's lawsuit against the Lighthouse phishing syndicate exposes the industrial scale of cybercrime, highlighting how criminals exploit easy access to digital infrastructure to scam millions. The broader supply chain enabling such operations demands urgent reform. more

WiMAX Has Early Lead Over LTE, Says New Report

Mobile WiMAX will outpace LTE over the next few years due to its head start on deployments, reports In-Stat. While WiMAX and LTE will take very different paths, the report suggests Mobile WiMAX already has commercial deployments where as LTE won't be commercially available until late 2009. more

Leased, Not Owned: Why the Future of the Internet Is Likely Subscription-Based

From software to network architecture, the internet is shifting from ownership to on-demand access. Subscription models now underpin the digital economy, offering scalability and agility while raising fresh questions about control, cost and compliance. more

Internet Society Board of Trustees Issues Statement on IANA Transition

In a statement released today, the Internet Society says during its Board meeting 14-15 February, the Board of Trustees praised the progress made by the global Internet community on the IANA stewardship transition and emphasized that a successful transition will reinforce the value of the collaborative, multistakeholder model. more

Google and Facebook Join Forces to Directly Connect Los Angeles to Hong Kong via Undersea Cable

TE SubCom, leading provider of undersea communications technology and marine services, along with Facebook, Google, and PLDC (Pacific Light Data Communication Co. Ltd.), have announced that they will co-build the Pacific Light Cable Network (PLCN), a 12,800 km transpacific submarine cable system that will provide the first direct undersea route between Hong Kong and Los Angeles, California (USA) with ultra-high capacity transmission. more

US Senators Push Bill to Boost Internet, Communication Channels for Iranians

Voice of America reporting: "U.S. lawmakers say they plan legislation that would fund efforts to help Iranians receive and send information despite government restrictions. Independent Senator Joe Lieberman said Thursday that the bill intends to help the Iranian people stay 'one step ahead of the Iranian regime.'" Also a related report by AFP. more

German IPv6 Council Starts Contest, Looking for Fresh IPv6 Ideas

Last week the German IPv6 Council initiated a contest for new ideas related to IPv6 where the council invited submissions of applications which are based on the new internet protocol. The council hopes the contest will be a helpful step towards an efficient and large deployment of IPv6. The IPv6 Council, founded in late 2007 in Potsdam, will award prices of up to 10,000 Euros to the best developers' ideas for concepts, applications, and implementations. The winners will be announced and receive their awards at the 2nd German IPv6 Summit on May 14th, 2009 in Potsdam. more

China Developing Cyber Weapons to Gain Control of Enemy Satellites

According to a leaked US intelligence report, China is developing capabilities to "deny, exploit or hijack" enemy satellites as a core part of its goal to control information.  more

Can Zero Trust Security Put an End to Human Security Weaknesses?

How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more

Broadband Speed and Market Signaling: Strategic Constraints in U.S. ISP Policy

Despite early dismissals from cable giants, consumer demand and real-world use cases proved the value of gigabit broadband. Today, slow uploads and strategic pricing continue to signal an industry reluctant to embrace speed. more