/ Most Viewed

FCC’s Ignorant Extraterritorial Jurisdiction Bravado

The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more

Why the Republican Policy Brief on Copyright Should Have Been Withdrawn

On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more

ICANN Accountability Proposal Enhances Power of Governments Over Internet, Risks IANA Transition

While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more

5G Security – Metrics of the Engaged

This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more

Paris Cyber Agreement Has Grown to More Than 450 Signatories

The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more

Luddites of the 21St Century Unite? (Revisited)

In the winter of 2014 I wrote a blogpost under the title 'Luddites of the 21st century unite?' (read here). In the post I wondered where the 21st century Luddites were. ICT, automation, artificial intelligence all threatened jobs, yet all those affected embraced smartphones and the Internet in droves. It seems I found them, but what to do? Brexit and Luddites Fast forward to early summer 2016. more

Experienced a Breach? Here Are Four Tips for Incident Response

The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. more

Security as a Major Factor for Online Consumers

There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more

How to Tame Network Complexity

In a previous article, I discussed how telecoms is facing a growing complexity crisis. To resolve this crisis, a new approach is required. Here I explore how that complexity can be tamed... 'Invariants' are things that are meant to be 'true' and stay true over time. Some invariants are imposed upon us by the universe... Others are imposed by people. As engineers, we aim to establish these abstract 'truths' about the system. more

ICANN Released Its Draft for New Top-Level Domains, 45 Day Comment Period Now Open

In follow up to its earlier announcement this year regarding the relaxation of rules for the introduction of new Top-Level Domains, the Internet Corporation for Assigned Names and Numbers (ICANN) yesterday released a draft version of the Applicant Guidebook for those interested in applying for a new generic Top-Level Domain (gTLD). Although application comes with a hefty entry fee of close to $200,000, the development of new gTLD introductions will be of particular interest to trademark owners as well as any other company involved with domain names. Among various issues, the guidebook aims at addressing concerns such as who would qualify for '.apple' or '.amazon' gTLDs. more

War-Torn Syrian City Aleppo Gets New Fiber Link

The northern Syrian city of Aleppo is one of the key battlegrounds of that country's on-going civil war as well as the epicenter of the European refugee crisis. The most appropriate United States response to events in Aleppo has become a major foreign policy question among the candidates in this year's U.S. presidential election. Experts are now predicting that forces loyal to President Bashar al-Assad, backed by the Russian military, will take control of rebel-held eastern Aleppo within weeks. more

Syrian Internet Shutdown

James Cowie from Renesys reports: "Starting at 3:35 UTC today (6:35am local time), approximately two-thirds of all Syrian networks became unreachable from the global Internet. Over the course of roughly half an hour, the routes to 40 of 59 networks were withdrawn from the global routing table." more

European Airports Still Reeling from Ransomware Attack as Software Fix Nears

European air travel remains disrupted today following a ransomware attack on Friday that crippled automated check-in and boarding systems across several major airports. The culprit appears to be malicious code targeting Muse, a system developed by Collins Aerospace, a subsidiary of RTX, which provides critical software to airlines. more

New Research Reveals Over 340 Million Accounts Compromised in the First Four Months of 2023

Recent research conducted by the Independent Advisor reveals that a significant number of accounts, exceeding 340 million, have been compromised due to business data breaches within the first four months of 2023. Notably, Twitter experienced the largest breach this year, impacting approximately 235 million user accounts. more

Cybersecurity Continues to Be the US Securities and Exchange Commission’s Top Priority for 2019

For the fourth year, the U.S. Securities and Exchange Commission's Office continues to include cybersecurity as one of the top enforcement priorities for 2019. more