"Google, Facebook quietly move toward automatic blocking of extremist videos" report Joseph Menn and Dustin Volz in Reuters: "Some of the web’s biggest destinations for watching videos have quietly started using automation to remove extremist content from their sites, according to two people familiar with the process." more
How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more
It has been 1.5 years since I have started my journey with ICANN. Within this short journey of mine, looking back I remember a nice memory that makes me love ICANN more and forces me to get involved even deeper. I got to know about ICANN in the APNIC conferences. I didn't really get the enormity of ICANN until I attended my first ICANN meeting in Copenhagen, Denmark in March 2017 as a fellow. more
Bangladesh's central bank governor has resigned today amidst theft of $81 million from the bank's U.S. account, as details emerged in the Philippines that $30 million of the money was delivered in cash to a casino junket operator in Manila. more
In an earlier post, I looked at the use of the Internet by anti-government protesters last month and the government's attempt to block them. Now, a few weeks later, let's see how the Internet changed after my July 18 post. The protesters used messaging and social media services, which the government tried to block, and posted images and videos of protests around the island. more
Today X-Force, IBM's security research and development arm, released its 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. more
A new report from the Fiber Broadband Association details how fiber networks improve public safety and disaster response, offering real-world case studies that highlight the technology's resilience, reliability, and critical infrastructure value. more
Craig Labovitz reporting today on Arbor Networks blog: "In their earnings call last week, Google announced a record 2010 third-quarter revenue of $7.29 billion (up 23% from last year). The market rejoiced and Google shares shot past $615 giving the company a market cap of more than $195 billion. This month, Google broke an equally impressive Internet traffic record -- gaining more than 1% of all Internet traffic share since January. If Google were an ISP, as of this month it would rank as the second largest carrier on the planet..." more
It's becoming clear that we are now deep into a fiber land grab. By that, I mean that companies that overbuild fiber in the United States are moving into markets to build fiber as quickly as possible. The biggest ISPs have publicly discussed their plans for building a lot of fiber in 2023. Following are some of the latest projections for 2023: more
Recent statistics from the Bureau of Labor Statistics' Consumer Expenditure Survey has shown that American have been increasingly spending on mobile phones from 2001 through 2007. BLS data indicates cellular phone expenditures surpassed spending on residential landline phone services beginning in 2007. From the report: "In 2001, the ratio of spending on residential phone services to spending on cellular phone services was greater than 3 to 1. In 2007, cellular phone expenditures accounted for 55 percent of total telephone expenditures compared to 43 percent for residential phone expenditures. The distribution of telephone service expenditures between residential telephone/pay phone services and cellular phone services changed significantly in all age groups since 2001." more
CTIA, the trade association for cellular companies, published a recent blog titled, "The Looming Spectrum Crisis". The blog quotes a study from Accenture that concludes that a lack of spectrum for 5G is reaching a point of crisis. The Accenture study says that cellular networks will be unable to meet nearly one-fourth of peak-period requests for connection as soon as 2027. more
A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more
"The 2016 presidential election is likely to have a major impact on how the US government tries to expand broadband deployment and how it regulates Internet service providers," writes Jon Brodkin in Ars Technica. more
n a report released today by the Free Press, Derek Turner, Research Director argues that, in light of recent FCC ruling against Comcast, it is a "false choice" to believe that "because application blocking is out of bounds, providers now will be forced to use some type of 'metering' to control network congestion." In other words, if ISPs are not allowed to block applications, then usage-based pricing is NOT their only other viable option, asserts Turner. more
"The ability for the government to sanction cybercriminals will last for at least one more year," Martyn Williams reporting form IDG News Service. more