/ Most Viewed

Survey Suggests Strained Budgets Causing Security Cutbacks on Known Threats

A recent survey of security professionals by RSA Conference with regards to critical security threats and infrastructure issues currently faced, revealed budgetary constrains as the top challenge currently faced. According to reports, the study suggests that even though practitioners are most concerned about email phishing and securing mobile devices, technologies addressing these needs are at risk of being cut from IT budgets. 72% percent of respondents indicated a rise in email-borne malware and phishing attempts since Fall 2008, with 57% stating they have seen an increase in Web-borne malware. Concerns about zero-day attacks and rogue employees as a result of layoffs were cited by 28% and 26% of survey respondents, respectively. more

The End of Rural Landlines?

Recent coverage by CBS News on Channel 13 in Sacramento, California documented how AT&T had cut off landline telephone from 80-year-old Patricia Pereira in Camp Seco. She called at the beginning of 2023 to ask if landline service could be transferred from a neighboring home to hers. Instead of transferring the service, AT&T cut the copper lines dead on both properties. more

United States and Britain to Conduct Financial Cyber-Security Test

U.S. and Britain plan to conduct a test later this month to assess how regulators for the world's two biggest financial centers in New York and London would communicate in the event of a major cyberattack or broader IT problems, a spokesman for British government cybersecurity body CERT-UK said on Monday. more

Mysterious Hacker Claims to Have Hacked a Group Linked to the NSA

A mysterious hacker or hackers going by the name 'The Shadow Brokers' claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files. more

The State of Internet Traffic (After Dark)

According to a recent research, European Internet traffic peaks in the early everning and drops off soon after until the next business day hours while in the United States, internet traffic reaches its peak at 11 p.m. EDT and stays relatively high until 3 a.m. in the morning. "The question is what are Internet users doing after dark?" Craig Labovitz of Arbor Networks reportsmore

Unleashing the Potential of Internet Governance Professionals

Internet Governance is a complex and constantly evolving field that touches upon many aspects of the global digital landscape. It encompasses everything from technical standards and protocols, to policy and regulatory issues, to the social, economic, and cultural impacts of the internet. With such a wide range of stakeholders and interests at play, it's no wonder that the community of Internet Governance professionals is so diverse. more

Whither Cyber-Insurance?

When you go to the doctor for a yearly checkup, do you think about health or insurance? You probably think about health, but the practice of going to the doctor for regular checkups began because of large life insurance companies in the United States. These companies began using statistical methods to make risk or to build actuarial tables they could use to set the premiums properly. Originally, life insurance companies relied on the "hunches" of their salesmen, combined with... more

Coronavirus Online Threats Going Viral, Part 2: Marketplaces

In the midst of the coronavirus crisis and the partial or total quarantines happening around the world, more people are turning to eCommerce for their purchases. This, combined with the increased demand for healthcare and healthcare-related products, is causing surges of activity on online marketplaces. Perhaps least surprising is the growth in the number of listings for cleaning and hygiene products (e.g., hand sanitizer), as well as facemasks... more

Can Legislatures Safely Vote by Internet?

It is a well understood scientific fact that Internet voting in public elections is not securable: "the Internet should not be used for the return of marked ballots. ... [N]o known technology guarantees the secrecy, security, and verifiability of a marked ballot transmitted over the Internet." But can legislatures (city councils, county boards, or the U.S. Congress) safely vote by Internet? Perhaps they can. To understand why, let's examine two important differences between legislature votes and public elections. more

The .nyc High-Bid Auctions

There were highs and lows in city hall's rollout of the .nyc TLD last month. Early on we were cheered when we received notification that our application for the JacksonHeights.nyc domain name had been approved. And with the de Blasio Administration committed to putting the city's 350+ neighborhood domain names under the control of local residents, we began to imagine that our decade-old vision of an "intuitive" city Internet might materialize... more

Google Announces Experiment with Post-Quantum Cryptography

Google is experimenting with new cryptography to future-proof Internet communications against quantum computers. Matt Braithwaite, Google Software Engineer in a blog post on Thursday wrote: "Quantum computers are a fundamentally different sort of computer that take advantage of aspects of quantum physics to solve certain sorts of problems dramatically faster than conventional computers can." more

The Role of Cloud Resource Provisioning in Web App CICD Pipelines

Thanks to wide adoption of the Infrastructure as Code (IaC) approach, programmatic provisioning of cloud resources is slowly transforming almost every aspect of computing, with administration of web apps having emerged as a key use case. With IaC, it's possible to streamline resource management tasks, shorten time-to-market, control costs, and scale at will. The adoption of continuous integration and continuous delivery (CICD) pipelines is already making a huge difference in web app deployment and cloud resource management. more

Key Success Factors for Top-Level Domains: An Evaluation Grid

It isn't always easy to explain the whys and wherefores of domain name market trends. Major indicators such as growth are usually generalised, given that they are based on data common to all stakeholders, but the causes behind fluctuations are hard to pin down. And structural causes need to be separated from cyclical ones, which may be the source of major variations, as was the case with the domaining waves in China, without actually reflecting long-term market trends. more

Adding ZONEMD Protections to the Root Zone

The Domain Name System (DNS) root zone will soon be getting a new record type, called ZONEMD, to further ensure the security, stability, and resiliency of the global DNS in the face of emerging new approaches to DNS operation. While this change will be unnoticeable for the vast majority of DNS operators (such as registrars, internet service providers, and organizations), it provides a valuable additional layer of cryptographic security to ensure the reliability of root zone data. more

US Law-Enforcement Agencies Reported to be at Risk in Foreign-Owned Buildings

US law-enforcement agencies are at risk of being spied on and hacked because some of their field offices are located in foreign-owned buildings without even knowing it. more