Cyber Security

ICANN Study on Whois Privacy & Proxy Service Abuse

Cyber Security
ICANN is seeking Public Comments solicitation represents an opportunity for the community to consider the study results detailed in this report, provide feedback and request further clarifications. In parallel, ICANN and NPL will conduct Webinars to facilitate feedback by summarizing this study’s purpose, methodology, key findings, and conclusions. Purpose (Brief): This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes gTLD domain names to measure whether the percentage of privacy/proxy use among domains engaged in illegal or harmful Internet activities is significantly greater than among domain names used for lawful Internet activities. Furthermore, this study compares these privacy/proxy percentages to other methods used to obscure identity –

ICANN Study on Whois Privacy & Proxy Service Abuse

Cyber Security
ICANN is seeking Public Comments solicitation represents an opportunity for the community to consider the study results detailed in this report, provide feedback and request further clarifications. In parallel, ICANN and NPL will conduct Webinars to facilitate feedback by summarizing this study’s purpose, methodology, key findings, and conclusions. Purpose (Brief): This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes gTLD domain names to measure whether the percentage of privacy/proxy use among domains engaged in illegal or harmful Internet activities is significantly greater than among domain names used for lawful Internet activities. Furthermore, this study compares these privacy/proxy percentages to other methods used to obscure ident

UK Cryptographers Call For Outing of Deliberately Weakened Protocols, Products

Cyber Security, Governance
A group of cryptographers in the UK has published a letter that calls on authorities in that country and the United States to conduct an investigation to determine which security products, protocols and standards have been deliberately weakened by the countries’ intelligence services. The letter, signed by a number of researchers from the University of Bristol and other universities, said that the NSA and British GCHQ “have been acting against the interests of the public that they are meant to serve.” The appeal comes a couple of weeks after leaked documents from the NSA and its UK counterpart, Government Communications Headquarters, showed that the two agencies have been collaborating on projects that give them the ability to subvert encryption protocols and also have been working with

Africa.com Now Selling Subdomains From $40 – $5,000 Per Year

Cyber Security
Africa.com has become the latest site to sell Subdomains and according to the registry trademark holders have already grabbed a bunch. According to Ope Odusan, Managing Director, Africa.com: “The world’s largest and most high profile brands have been among the first to acquire domain names ending with the new extension .africa.com. “In the first few weeks since we started offering domains, trademarks owners have quickly picked up their domains including twitter.africa.com, starbucks.africa.com, ibm.africa.com, evian.africa.com, standardbank.africa.com, lego.africa.com, marksandspencer.africa.com, emirates.africa.com, philips.africa.com, miele.africa.com, and the list goes on and on” In addition to trademark domains, according to Mr. Odusan generic premium subdomains have been sold

Africa’s cloud solution pundits urge market to ‘try it out’

Business, Cyber Security
Although business leaders and analysts within Africa’s growing ICT sector agree that a sense of hesitancy hovers over the increased adoption of cloud solutions, there is consensus that there is benefit in the application of the technology. At ITNewsAfrica’s Innovation Dinner on the topic of Real-world Cloud Adoption, hosted on Thursday 05 September in Johannesburg, experts acknowledged that issues like security, cost of investment and control over data has hampered the uptake of cloud – at the same time they urged the market to ‘try it out’. “Try it out… try it in a non-mission critical production-type environment, in those grudge purchase areas like disaster recovery, like test and development. You will soon realise that the cash injection to your budget becomes so much more compell