The Internet Association today released a policy roadmap detailing a roadmap for the incoming administration and Congress. more
A number of Congressional Republicans today questioned National Telecommunications and Information Administration (NTIA) for apparent violation of federal law in using federal funds to relinquish U.S. oversight of the Internet. more
In a landmark move that may pave the way for enhanced online data protection in the United States, key congressional committee leaders are on the brink of finalizing a national framework to safeguard Americans' personal data on the Internet. more
The latest issue of Policy Review from the Hoover Institution, a public policy research center -- focused on advanced study of politics, economics, and political economy -- has an essay titled eWMDs – electronic weapons of mass destruction. The Policiy Review readers are warned that botnets should be considered a serious security problem and that "cyber attacks present a grave new security vulnerability for all nations and must be urgently addressed." more
Anti-Phishing Working Group (APWG) released its latest Phishing Activity Trends Report today warning that the number of unique phishing websites detected in June rose to 49,084, the highest since April, 2007's record of 55,643, and the second-highest recorded since APWG began reporting this measurement. "The number of hijacked brands ascended to an all-time high of 310 in March and remained, in historical context, at an elevated level to the close of the half in June," says the report. more
According to a leaked US intelligence report, China is developing capabilities to "deny, exploit or hijack" enemy satellites as a core part of its goal to control information. more
"Hackers infect army of cameras, dvrs for massive internet attacks," reports Drew Fitzgerald in the Wall Street Journal. more
In a recently released paper by the Council of European National Top-level Domain Registries (CENTR), authored in collaboration with Chris Buckridge, the spotlight is once again on the multistakeholder approach to Internet governance. more
ICANN needs to strengthen conflict-of-interest policies for its board of directors, said Rod Beckstrom, CEO, in his opening remarks during the organizations 43rd public meeting in San Jose, Costa Rica. "It is time to further tighten up the rules that have allowed perceived conflicts to exist within our board. ... ICANN must place commercial and financial interests in their appropriate context," said Beckstrom, who plans to step down in July. "How can it do this if all top leadership is from the very domain name industry it is supposed to coordinate independently?" more
"Sen. Ted Cruz (R-Texas) called on Congress to stop the Obama administration from giving away control of the Internet with congressional authorization -- a move Cruz said is likely illegal," Nicholas Ballasy reporting today in PJ Media. more
On Monday, 09 November 2015, the Global Internet Governance Academic Network (GigaNet) will hold its 10th Annual Symposium on Internet Governance Research in João Pessoa, Brazil. The symposium will take place as a pre-event of the United Nations Internet Governance Forum (IGF) which starts on Tuesday in the same location. During their symposium researchers from several parts of the world will address various topics including privacy, infra-structure, trust, security and more. more
The satellite television provider, Dish Network is currently dealing with a cybersecurity incident that has affected its internal networks, customer support systems, and websites such as boostinfinite.com and dish.com. It is currently investigating the incident and has confirmed certain data was extracted from its IT systems as a result. more
Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more
Today X-Force, IBM's security research and development arm, released its 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. more
The Internet Corporation for Assigned Names and Numbers (ICANN) has adopteda 98 recommendations in the New gTLD subsequent procedures policy development process. This sets in motion the start of the implementation process for the next round of new generic top-level domains (gTLDs). more
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com