In early February, free hosting provider Freedom Hosting II, known as one of the largest hosting providers for anonymous websites, was compromised along with all the websites it hosted. The takedown was estimated to have impacted 15-20% of all websites on the Dark Web, however, the actual impact is now reported to have been much larger. more
WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more
When farms are connected to the Internet, we all benefit. Agriculture that gains real-time information about plants, soil, atmosphere, and irrigation, dubbed "precision agriculture", can save farmers 20-30% of their water consumption while increasing productivity by 20-70%, according to Valley Vision. The San Francisco-Bay Area Internet Society Chapter is pleased to announce that we have started phase one of our collaborative project, "Bridging California's Rural/Urban Digital Divide with Mobile Broadband"... more
There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more
"Verisign has been given approval to start restricting who can and cannot register .com and .net domain names in various countries," Kevin Murphy reporting in Domain Incite. more
Before the righteous too much deride the "International Strategy of Cooperation on Cyberspace" emanating from China's cooperative one-party state, consider what progress it represents: a policy document that begins with principles, speaks often of cooperation, and clearly details the bilateral and multilateral approaches the country intends. By any measure, this is good practice from a keystone of the international system. And it offers a gift to those who would wish the Internet to be governed otherwise. more
Want to learn more about the current state of DNSSEC? Want to see demos of new software to secure email? Curious about the potential impact of the Root Key Rollover happening this year? Next week in Copenhagen, Denmark, ICANN 58 will include some great technical info about DNSSEC and DANE happening in several sessions. Here is the plan... more
This morning, CSO and MacKeeper published joint articles on a massive data leak from a marketing company. This company, River City Media (RCM), failed to put a password on their online backups sometime. This leaked all of the company's data out to the Internet at large. MacKeeper Security Researcher, Chris Vickery discovered the breach back in December and shared the information with Spamhaus and CSO online. The group has spent months going through the data from this spammer. more
A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more
Users scored an exciting victory over copyright-based censorship last month, when the Domain Name Association (DNA) and the Public Interest Registry (PIR), in response to criticism from EFF, both abruptly withdrew their proposals for a new compulsory arbitration system to confiscate domain names of websites accused of copyright infringement. But copyright enforcement was only one limb of the the DNA's set of Registry/Registrar Healthy Practices. more
Ministry of Foreign Affairs and the Cyberspace Administration of China has jointly released a document titled "International Strategy of Cooperation on Cyberspace." more
Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more
U.S. regulators on Wednesday blocked some Obama administration rules on the eve of implementation, regulations that would have subjected broadband providers to stricter scrutiny than web sites face to protect customers' private data. more
Major financial firms operating in New York will face stiff cybersecurity obligations starting Wednesday under a new regulation introduced in the city. more
With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more