Cyber Security

ICANN Study on Whois Privacy & Proxy Service Abuse

Cyber Security
ICANN is seeking Public Comments solicitation represents an opportunity for the community to consider the study results detailed in this report, provide feedback and request further clarifications. In parallel, ICANN and NPL will conduct Webinars to facilitate feedback by summarizing this study’s purpose, methodology, key findings, and conclusions. Purpose (Brief): This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes gTLD domain names to measure whether the percentage of privacy/proxy use among domains engaged in illegal or harmful Internet activities is significantly greater than among domain names used for lawful Internet activities. Furthermore, this study compares these privacy/proxy percentages to other methods used to obscure ident

UK Cryptographers Call For Outing of Deliberately Weakened Protocols, Products

Cyber Security, Governance
A group of cryptographers in the UK has published a letter that calls on authorities in that country and the United States to conduct an investigation to determine which security products, protocols and standards have been deliberately weakened by the countries’ intelligence services. The letter, signed by a number of researchers from the University of Bristol and other universities, said that the NSA and British GCHQ “have been acting against the interests of the public that they are meant to serve.” The appeal comes a couple of weeks after leaked documents from the NSA and its UK counterpart, Government Communications Headquarters, showed that the two agencies have been collaborating on projects that give them the ability to subvert encryption protocols and also have been working with Now Selling Subdomains From $40 – $5,000 Per Year

Cyber Security has become the latest site to sell Subdomains and according to the registry trademark holders have already grabbed a bunch. According to Ope Odusan, Managing Director, “The world’s largest and most high profile brands have been among the first to acquire domain names ending with the new extension “In the first few weeks since we started offering domains, trademarks owners have quickly picked up their domains including,,,,,,,,,, and the list goes on and on” In addition to trademark domains, according to Mr. Odusan generic premium subdomains have been sold

Africa’s cloud solution pundits urge market to ‘try it out’

Business, Cyber Security
Although business leaders and analysts within Africa’s growing ICT sector agree that a sense of hesitancy hovers over the increased adoption of cloud solutions, there is consensus that there is benefit in the application of the technology. At ITNewsAfrica’s Innovation Dinner on the topic of Real-world Cloud Adoption, hosted on Thursday 05 September in Johannesburg, experts acknowledged that issues like security, cost of investment and control over data has hampered the uptake of cloud – at the same time they urged the market to ‘try it out’. “Try it out… try it in a non-mission critical production-type environment, in those grudge purchase areas like disaster recovery, like test and development. You will soon realise that the cash injection to your budget becomes so much more compell

Cybercriminals developing more malware

Cyber Security
According to the report, mobile malware was the most significant statistical category for the second quarter, in both quantity and complexity. Not only are cybercriminals developing more malware targeting mobile platforms, they are also advancing the programmes’ capabilities and behaviours. In addition to mobile malware, cybercriminals’ focused heavily on implementing campaigns designed for illegal bitcoin mining and theft as the digital currency’s value rapidly increased during the second quarter. Q2 2013 Malware Statistics: The following data was obtained using the cloud-based Kaspersky Security Network (KSN). All statistics were compiled with the full consent of users participating in KSN. Kaspersky Lab products detected and neutralised a total of 983,051,408 threats in the