Web

Web / Most Commented

World Anti Counterfeiting Day… Staggering Costs Fueled by the Web

Established in 1998 by the Global Anti-Counterfeiting Group (GACG), "World Anti Counterfeiting Day" is held annually in June to raise awareness of the international impacts of counterfeiting and piracy. According to the International Chamber of Commerce (ICC), the cost of counterfeiting is a $600 billion a year problem. MarkMonitor estimates the cost of online counterfeit trade at $200 billion annually. more

Research Detects Spammers Using Fake URL-Shortening Services

New research has uncovered evidence of spammers establishing their own fake URL-shortening services for the first time. According to the latest MessageLabs Intelligence report, shortened links created on these fake URL-shortening sites are not included directly in spam messages; instead, the spam emails contain shortened URLs created on legitimate URL-shortening sites. "Rather than leading directly to the spammer's final Web site, these links actually point to a shortened URL on the spammer's fake URL-shortening Web site, which in turn redirects to the spammer's final Web site." more

Internet Usage by Time Zone, China Biggest Contributor

Pingdom has conducted a study on how today's two billion internet users around the world are spread over different time zones. Study found two time zones stand head and shoulders above the others in terms of the amount of Internet users they contain: UTC+8, which passes through eastern Asia, and UTC+1, which passes through Europe and Africa. more

Microsoft Data Suggests 1 Out of Every 14 Downloads is Malware

Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more

Netflix Becomes Largest Source of Internet Traffic in North America

Netflix has become the largest source of Internet traffic in North America, according Sandvine's Spring 2011 Global Internet Phenomena Report. Company further reports that currently, Real-Time Entertainment applications consume 49.2% of peak aggregate traffic, up from 29.5% in 2009 -- a 60% increase [see figture]. Sandvine forecasts that the Real-Time Entertainment category will represent 55-60% of peak aggregate traffic by the end of 2011. more

Chromebooks, Google’s Long-Waited Laptop, to Ship Next Month

Google yesterday dove deep into its Chrome notebook project at its annual Google I/O conference. The company has had the notebook operating system in beta for almost two years now. Google announced the first market-ready Chromebooks from partners Samsung and Acer. The Chrome OS is dependent on the cloud for storage and various web-based applications. The result is a machine that boots in a matter of seconds and carries very little in the line of native hardware. more

Defending the Network Several Times Over

Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more

China Sets Up Internet Oversight Body, Has Authority to Investigate and Punish

Caixin reports that the State Council, China's cabinet, has set up an office to regulate internet activity, according to an announcement released on May 4 via an official website. The new department, called the State Internet Information Office, will supervise online content management and process approvals of businesses involved in online news reporting, according to the state-run news agency Xinhua. The new agency is reported to have the authority to investigate and punish online content-providers if necessary. more

EU launches Future Internet Public Private Partnership

Wout de Natris writes to report: "EU Commissioner for the Information Society Neelie Kroes today launched the EU co-funded project for the Internet of the future in which everything will be connected to everyone in the cloud. Here's the link to Mrs. Kroes' speech." more

TelChina, China Mobile Building Mobile Payment Solution With .tel

Telnic Limited, the registry operator for the .tel top level domain (TLD), today announced that its regional partner TelChina and China Mobile, a leading mobile phone company, have entered into a strategic relationship to develop Mobile-Pay services on the .tel platform. ... On this platform, users will not have to log on to various websites for payment, but accomplish it through the clicking of a Mobile-Pay link on a .tel page. more

IFTF Tribute to Paul Baran: Forecasted Online Shopping, News and Banking in 1971

With the recent passing of Paul Baran, IFTF is releasing an excerpt of a 1971 report in tribute, entitled "Brief descriptions of potential home information services." The excerpts are from the report titled, Toward a Study of Future Urban High-Capacity Telecommunications Systems, which included a handbook of forecasts for what was then called "broadband telecommunication and information services," later known as the Internet. more

Death of the PKI Dragons?

The recent attack on the Comodo Certification Authority has not only shown how vulnerable the current public key infrastructure is, but also that the protocols (e.g., OSCP) used to mitigate these vulnerabilities once exploited, are not in use, not implemented correctly or not even implemented at all. Is this the beginning of the death of the PKI dragons and what alternatives do we have? more

Old Cloud vs. New Cloud

Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more

Transparency Comes to Load Testing via the Cloud

The importance of online presence continues to grow exponentially. More and more of our personal and professional endeavors are conducted online. Because of this, the ability to ensure a good experience for our online friends and customers also is increasing rapidly. At its core, load testing is nothing more than ensuring your online presence is ready for the number of visitors you expect. It's simple to explain, but historically it's been anything but simple, or easy to afford. more

Google to Let Users Block Sites Based on Domain Names

In pursuit of its efforts to improve Google search results, the company on Thursday announced the release of a new feature that enables users to block specific search results based on domain names. more