Wi-Fi Alliance, the non-profit entity that oversees implementation of the Wi-Fi standard, officially launches the Wi-Fi 6 certification program. more
As promised, 2016 is off to a busy start at ICANN, with important discussions about Whois/Registration Directory Services, subsequent rounds of the New gTLD Program and internet governance already underway, and more to come. Brand owner concerns will be front and center in the coming months, as community stakeholders set priorities and begin discussions of key challenges and desired results. more
The Internet Society announced today that it has selected Andrew Sullivan as the organization's new President and Chief Executive Officer. more
A study (18-page PDF) from researchers at Georgia Tech and Stony Brook University has attracted attention to what it calls "combosquatting," but the practice has been around since the early days of domain name disputes. The study says combosquatting "refers to the combination of a recognizable brand name with other keywords (e.g., paypal-members.com and facebookfriends.com)." It adds that this practice differs from other types of cybersquatting "in two fundamental ways. more
A study conducted by the Verizon Business RISK team in cooperation with the United States Secret Service has found that breaches of electronic records in 2009 involved more insider threats, greater use of social engineering and the continued strong involvement of organized criminal groups. more
The FCC has granted Alphabet's Project Loon an experimental license to operate in Puerto Rico and the US Virgin Islands for the purpose of helping the islands regain Internet connectivity. more
In most of Europe, mobile network operators (MNOs) have largely completed their 3G network roll outs. During the last year or two their focus has been on upgrading these networks with new technologies, including femtocell and, importantly, HSPA. Following trials expected to be held during 2010, LTE will soon be sufficiently advanced for commercial launches. This will provide significant opportunities for Europe's market for convergent services, adding a new platform for delivering a range of media... more
In a recent post, I argued that the US embargo, the poor state of the Cuban economy and fear of free information had stifled the Cuban Internet at its inception in 1996, but that twenty years later, those constraints were significantly reduced. I suggested that the Cuban Internet was being held back by mundane bureaucracy and political correctness. We got an example of that at the Latin American and Caribbean Network Information Center (LACNIC) conference in Havana this week. more
Does the ICANN Board putting its thumb on the scale, change the status quo assumption of a Policy Development Process (PDP)? The primary assumption of most PDPs is that, in the absence of consensus for change, the status quo remains. Otherwise, Policy would be made by fiat by the PDP's Chair or Co-Chairs and there would be a mad rush to occupy those unpaid, thankless positions. more
A weakness in modern computers allows attackers to steal encryption keys and other sensitive information, according to the latest discovery by cybersecurity firm F-Secure. more
One of the most common questions I've been asked lately is what I think the impact AI will have on the broadband industry. All of the big ISPs in the industry have actively been pursuing the use of AI. For example, AT&T Labs says it is investigating the use of AI to optimize the customer experience and auto-heal the network. Comcast says that it is using AI to help process petabytes of data every day. more
There are thousands of articles perpetuating the claim that China is out to get us on the Internet. And yet, all these discussions are begging the question, is it China attacking? Also, are they even the "usual suspects"?
While I can point to real facts of China making active use of information warfare, cyber warfare, or whatever else you choose to call it (such as the release of 0 days being patched by Microsoft and originally reported by the Taiwanese government, search Microsoft's site), I can also point to Germany (intelligence Trojan horse), the US (The Farewell Dossier) and other countries such as North Korea (without much detail, so questioned)... more
Throughout the second half of 2012 many security folks have been asking "how much is a zero-day vulnerability worth?" and it's often been hard to believe the numbers that have been (and continue to be) thrown around. For the sake of clarity though, I do believe that it's the wrong question... the correct question should be "how much do people pay for working exploits against zero-day vulnerabilities?" more
Google's Threat Intelligence Group reveals that hackers are integrating AI models directly into malware, enabling live code mutation, stealthier operations, and dynamic payload execution while exploiting AI tools through deceptive prompts and underground marketplaces. more
As counterfeit networks grow more elusive, AI-driven clustering could revolutionize brand protection. By linking disparate findings, identifying serial infringers, and enabling bulk enforcement, AI offers a smarter approach to monitoring and takedown efforts. Yet, challenges remain - from data reliability to analyzing complex content. Companies that master AI-driven clustering may gain a significant advantage in the fight against brand abuse. more