January 25, 2017 By Larry Loeb 2 min read

The nonprofit Mozilla Foundation issued its first “Internet Health Report,” detailing notable cybersecurity trends related to hot topics such as government surveillance and the Internet of Things (IoT). The report focused on open innovation, digital inclusion, decentralization, privacy and web literacy on a global scale.

Inside the ‘Internet Health Report’

With the report, Mozilla hopes to popularize the term “internet health” similar to how environmentalists engaged the public with the term “global warming,” Solana Larsen, the editor of the 40-page report, told Threatpost. “We want to work with people and organizations that care about a healthy internet,” she said.

The authors of the report were encouraged by the encryption efforts of companies such as Let’s Encrypt and similar initiatives to democratize what can be a daunting process of issuing encrypted certificates for authentication. They also applauded products such as WhatsApp, which has made secure communications both practical and widely available.

Should the upward trend of government network surveillance continue, the report said, the use of these products should increase accordingly.

Pressuring IoT Manufacturers

The report also examined the increasing threat of malware targeting IoT devices. The authors argued that consumers and organizations must hold manufacturers accountable for embedding security into every stage of the development process. While this effort could increase the cost of IoT products, it would also provide invaluable benefits related to functionality and security.

While this is just the first Mozilla Foundation report, it provides a global narrative for the online ecosystem today. By taking a wide view of the internet as a whole, the authors hope to encourage users to examine more than just one local segment of the system. While local situations can drastically affect local use, the report evaluated how the entire internet functions on a global scale.

The “Internet Health Report” explicitly stated that the internet is a globally connected system — what happens in one segment affects all others. It is a credible first step toward better global cybersecurity practices.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today