/ Most Viewed

Survey Suggests Strained Budgets Causing Security Cutbacks on Known Threats

A recent survey of security professionals by RSA Conference with regards to critical security threats and infrastructure issues currently faced, revealed budgetary constrains as the top challenge currently faced. According to reports, the study suggests that even though practitioners are most concerned about email phishing and securing mobile devices, technologies addressing these needs are at risk of being cut from IT budgets. 72% percent of respondents indicated a rise in email-borne malware and phishing attempts since Fall 2008, with 57% stating they have seen an increase in Web-borne malware. Concerns about zero-day attacks and rogue employees as a result of layoffs were cited by 28% and 26% of survey respondents, respectively. more

Australian Government Opposed to Creation of Adult-Themed TLDs

Andrew Colley of Australian IT reports the AusRegistry, the operator of Australia's Top-Level Domain (.au), has revealed that it has been approached by various groups planning to submit applications to ICANN for the creation of adult-themed generic Top-Level Domains (gTLDs) such as .xxx and .sex. According to the report, the Australian Communications Minister Stephen Conroy has opposed the idea syaing: "The government does not support the creation of the .xxx TLD." As it has been reported extensively on CircleID, previous attempts to create adult related TLDs (such as .xxx) have so far been rejected by ICANN. more

Whither Cyber-Insurance?

When you go to the doctor for a yearly checkup, do you think about health or insurance? You probably think about health, but the practice of going to the doctor for regular checkups began because of large life insurance companies in the United States. These companies began using statistical methods to make risk or to build actuarial tables they could use to set the premiums properly. Originally, life insurance companies relied on the "hunches" of their salesmen, combined with... more

Mysterious Hacker Claims to Have Hacked a Group Linked to the NSA

A mysterious hacker or hackers going by the name 'The Shadow Brokers' claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking for 1 million bitcoin (around $568 million) in an auction to release more files. more

Can Legislatures Safely Vote by Internet?

It is a well understood scientific fact that Internet voting in public elections is not securable: "the Internet should not be used for the return of marked ballots. ... [N]o known technology guarantees the secrecy, security, and verifiability of a marked ballot transmitted over the Internet." But can legislatures (city councils, county boards, or the U.S. Congress) safely vote by Internet? Perhaps they can. To understand why, let's examine two important differences between legislature votes and public elections. more

The .nyc High-Bid Auctions

There were highs and lows in city hall's rollout of the .nyc TLD last month. Early on we were cheered when we received notification that our application for the JacksonHeights.nyc domain name had been approved. And with the de Blasio Administration committed to putting the city's 350+ neighborhood domain names under the control of local residents, we began to imagine that our decade-old vision of an "intuitive" city Internet might materialize... more

Iranians Outsmart Internet Blackout to Broadcast Airstrikes

After US and Israeli strikes, Iran imposed a near-total internet blackout, yet citizens used satellite links and decentralized tools to share footage, undermining state control and exposing a growing contest over information in wartime. more

The State of Internet Traffic (After Dark)

According to a recent research, European Internet traffic peaks in the early everning and drops off soon after until the next business day hours while in the United States, internet traffic reaches its peak at 11 p.m. EDT and stays relatively high until 3 a.m. in the morning. "The question is what are Internet users doing after dark?" Craig Labovitz of Arbor Networks reportsmore

Adding ZONEMD Protections to the Root Zone

The Domain Name System (DNS) root zone will soon be getting a new record type, called ZONEMD, to further ensure the security, stability, and resiliency of the global DNS in the face of emerging new approaches to DNS operation. While this change will be unnoticeable for the vast majority of DNS operators (such as registrars, internet service providers, and organizations), it provides a valuable additional layer of cryptographic security to ensure the reliability of root zone data. more

Remote Learning and Preschoolers

A recent article in the MIT Technology Review described the benefits that remote learning can bring to preschoolers. The article described a study by the MacArthur Foundation that has not yet been peer-reviewed. The research described the results of bringing preschool to Syrian refugees. more

NIS2: Act Now - Practical Solution for Article 28 Successfully Established

With the NIS2 Directive now in effect, a new annex to ICANN contracts offers registries and registrars a practical, flexible path to Article 28 compliance. Early adoption has drawn international praise. more

White House Appoints Retired Air Force General as First Cyber Security Chief

As part of its effort to improve defenses against hackers, the White House today named a retired U.S. Air Force Brigadier General Gregory J. Touhill as the first Federal Chief Information Security Officer (CISO) -- the position was announced eight months ago as part of Cybersecurity National Action Plan (CNAP). more

Key Success Factors for Top-Level Domains: An Evaluation Grid

It isn't always easy to explain the whys and wherefores of domain name market trends. Major indicators such as growth are usually generalised, given that they are based on data common to all stakeholders, but the causes behind fluctuations are hard to pin down. And structural causes need to be separated from cyclical ones, which may be the source of major variations, as was the case with the domaining waves in China, without actually reflecting long-term market trends. more

Google Announces Experiment with Post-Quantum Cryptography

Google is experimenting with new cryptography to future-proof Internet communications against quantum computers. Matt Braithwaite, Google Software Engineer in a blog post on Thursday wrote: "Quantum computers are a fundamentally different sort of computer that take advantage of aspects of quantum physics to solve certain sorts of problems dramatically faster than conventional computers can." more

Broadband Deserts

Perhaps it's because the death of Queen Elizabeth has been everywhere in the news, but somebody sent me an article from the BBC from 2008 where then Prince Charles warned that the lack of rural broadband in the UK was going to eventually result in broadband deserts. The now King Charles III was quoted as saying that lack of broadband puts too much pressure on the people who live without broadband and that if a solution wasn't found... more