/ Recently Commented

Dark Web Reported to Have Shrunk by 85% Since Freedom Hosting II Downfall

In early February, free hosting provider Freedom Hosting II, known as one of the largest hosting providers for anonymous websites, was compromised along with all the websites it hosted. The takedown was estimated to have impacted 15-20% of all websites on the Dark Web, however, the actual impact is now reported to have been much larger. more

WikiLeaks’ Vault 7: CIA Gives a Free Lesson in Personal Cyber Security

WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more

Agriculture At High-Speed: Project Updates on Bridging California’s Rural/Urban Digital Divide

When farms are connected to the Internet, we all benefit. Agriculture that gains real-time information about plants, soil, atmosphere, and irrigation, dubbed "precision agriculture", can save farmers 20-30% of their water consumption while increasing productivity by 20-70%, according to Valley Vision. The San Francisco-Bay Area Internet Society Chapter is pleased to announce that we have started phase one of our collaborative project, "Bridging California's Rural/Urban Digital Divide with Mobile Broadband"... more

Work in Progress: Preparing the Next Round of New gTLDs

There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more

Verisign Given Approval to Restrict .COM and .NET Domains In Various Countries

"Verisign has been given approval to start restricting who can and cannot register .com and .net domain names in various countries," Kevin Murphy reporting in Domain Incite. more

ICANN Can Help China Secure Cyberspace

Before the righteous too much deride the "International Strategy of Cooperation on Cyberspace" emanating from China's cooperative one-party state, consider what progress it represents: a policy document that begins with principles, speaks often of cooperation, and clearly details the bilateral and multilateral approaches the country intends. By any measure, this is good practice from a keystone of the international system. And it offers a gift to those who would wish the Internet to be governed otherwise. more

Here is the DNSSEC Activity at ICANN 58 in Copenhagen March 12-15, 2017

Want to learn more about the current state of DNSSEC? Want to see demos of new software to secure email? Curious about the potential impact of the Root Key Rollover happening this year? Next week in Copenhagen, Denmark, ICANN 58 will include some great technical info about DNSSEC and DANE happening in several sessions. Here is the plan... more

Large Companies (Un?)knowingly Hire Spammers

This morning, CSO and MacKeeper published joint articles on a massive data leak from a marketing company. This company, River City Media (RCM), failed to put a password on their online backups sometime. This leaked all of the company's data out to the Internet at large. MacKeeper Security Researcher, Chris Vickery discovered the breach back in December and shared the information with Spamhaus and CSO online. The group has spent months going through the data from this spammer. more

Over a Billion Email Addresses of Major Spam Operation Exposed via Unprotected Backups

A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more

Healthy Domains Revisited: The Pharmaceutical Industry

Users scored an exciting victory over copyright-based censorship last month, when the Domain Name Association (DNA) and the Public Interest Registry (PIR), in response to criticism from EFF, both abruptly withdrew their proposals for a new compulsory arbitration system to confiscate domain names of websites accused of copyright infringement. But copyright enforcement was only one limb of the the DNA's set of Registry/Registrar Healthy Practices. more

China Releases Strategy on Cyberspace Cooperation

Ministry of Foreign Affairs and the Cyberspace Administration of China has jointly released a document titled "International Strategy of Cooperation on Cyberspace." more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

FCC Blocks Stricter Broadband Privacy Rules

U.S. regulators on Wednesday blocked some Obama administration rules on the eve of implementation, regulations that would have subjected broadband providers to stricter scrutiny than web sites face to protect customers' private data. more

New Cybersecurity Regulations in New York Go Into Effect

Major financial firms operating in New York will face stiff cybersecurity obligations starting Wednesday under a new regulation introduced in the city. more

Where Do You Start to Mitigate the Latest Destruction-Motivated Cyber Threats?

With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more