/ Most Viewed

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more

Fake Anti-Virus Peddlers Taking Aggressive Steps to Avoid Detection

Over at Krebs on Secrity blog, Brian Krebs reports: "Purveyors of fake anti-virus or 'scareware' programs have aggressively stepped up their game to evade detection by legitimate anti-virus programs, according to new data from Google. In a report being released today, Google said that between January 2009 and the end of January 2010, its malware detection infrastructure found some 11,000 malicious or hacked Web pages that attempted to foist fake anti-virus on visitors." more

Controversial Chinese Cybersecurity Law Gets 3rd Reading

The controversial Chinese cybersecurity law that has been sparking objections amongst foreign governments and business groups reached a step closer to approval today as parliament held the third reading of the draft bill. more

Implications of California Telecom Attack Gone Un-Reported

In an article titled "A Cyber-Attack on an American City", Bruce Perens writes: "Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities..." more

Rethinking Digital Sovereignty: The Pitfalls of an Infrastructured Approach

In an era where our lives are increasingly intertwined with digital technologies, a recent development in the realm of digital sovereignty has sparked a pressing concern for nations and individuals alike. The concept of digital self-determination, once hailed as a great equalizer, has become a battleground for power, privacy, and control, with governments and tech giants vying for dominance in the digital realm. more

NetNeutrality Rules to Be Stifled Under Trump Presidency, Experts Fear

"Donald Trump's presidential election victory has increased the chances that President Barack Obama's landmark net-neutrality rules could be rolled back," John D. Mckinnon and Shalini Ramachandran reporting in the Wall Street Journal today. more

Former New York City Mayor Ed Koch Announces Support for dotNYC Plan

Former New York City Mayor Edward I. Koch announced Thursday he is supporting dotNYC LLC's bid to operate the .NYC web address. City Council Speaker Christine Quinn disclosed during her State of the City speech in February that the City Council and Office of the Mayor will pursue the .NYC top-level domain. The city last month completed a Request for Information about .NYC and is expected to endorse a company to run the .NYC address this summer. more

Study Ranks Riskiest Online Cities in US

A recent study by Symantec Norton and Sperling's Best Places has ranked 50 cities in the United States by "Riskiest Online Cities". The study included investigation of a number of factors including... more

What Trump and Clinton Said About Cybersecurity in the First US Presidential Debate

The Internet and tech got very little mention last night during the first of three presidential debatest. The only notable exception was cybersecurity where moderator Lester Holt asked: "Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who's behind it? And how do we fight it?" The following are the responses provided to the question by the two candidates. more

Can a CDN Help Website and Application Performance?

Before we answer the question, "Can a CDN help your website and application performance," let's take a moment for a short CDN 101. A CDN (content delivery or content distribution network) is a system of computers placed at different network nodes to provide the same content from the shortest distance possible. In other words, a CDN attempts to take pieces of content from your website and pass it to various nodes around the Internet. more

RIPE NCC Announces Launch of IPv6 Act Now! Website

The RIPE NCC today announced the launch of the IPv6 Act Now! website. RIPE NCC, a Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia, calls the website a one-stop destination on IPv6 where everyone can understand and provide a variety of useful information aimed at promoting the global adoption of IPv6. "The site is for anyone with an interest in IPv6, including network engineers, company directors, law enforcement agencies, government representatives and civil society." more

Syria’s Undersea Cable Repairs Will Take Down 60% of Nation’s Internet for Close to 10 days

Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. more

U.S. Officials Asking Cuba to Speed Up Its Internet Infrastructure Build Out

A number of Senior U.S. officials and business leaders visited Cuba last week and urged the government to speed up its build out of Internet infrastructure and to make it more widely available, Mario Trujillo reports in The Hill. more

Facebook In Talks with U.S. Government About Offering Its Free Internet Service

Facebook is talking to the White House about giving US citizens ‘free’ Internet access via its Free Basics program, Brian Fung reporting in the Washington Post today. more

For ICANN to Have a Future, It Needs to Take Human Rights Considerations Seriously

Despite previous attempts1 I think it is safe to say that the discussion about Human Rights in ICANN was, until recently, fairly dead, even taboo. Nowadays, there seems to be a renewed demand for ICANN to have a future, and it needs to take Human Rights considerations seriously. During the ICANN Cancun meeting, representatives from several stakeholder groups mentioned HR and how they might support ICANN by informing its policy-making processes. more