January 25, 2017 By Larry Loeb 2 min read

The nonprofit Mozilla Foundation issued its first “Internet Health Report,” detailing notable cybersecurity trends related to hot topics such as government surveillance and the Internet of Things (IoT). The report focused on open innovation, digital inclusion, decentralization, privacy and web literacy on a global scale.

Inside the ‘Internet Health Report’

With the report, Mozilla hopes to popularize the term “internet health” similar to how environmentalists engaged the public with the term “global warming,” Solana Larsen, the editor of the 40-page report, told Threatpost. “We want to work with people and organizations that care about a healthy internet,” she said.

The authors of the report were encouraged by the encryption efforts of companies such as Let’s Encrypt and similar initiatives to democratize what can be a daunting process of issuing encrypted certificates for authentication. They also applauded products such as WhatsApp, which has made secure communications both practical and widely available.

Should the upward trend of government network surveillance continue, the report said, the use of these products should increase accordingly.

Pressuring IoT Manufacturers

The report also examined the increasing threat of malware targeting IoT devices. The authors argued that consumers and organizations must hold manufacturers accountable for embedding security into every stage of the development process. While this effort could increase the cost of IoT products, it would also provide invaluable benefits related to functionality and security.

While this is just the first Mozilla Foundation report, it provides a global narrative for the online ecosystem today. By taking a wide view of the internet as a whole, the authors hope to encourage users to examine more than just one local segment of the system. While local situations can drastically affect local use, the report evaluated how the entire internet functions on a global scale.

The “Internet Health Report” explicitly stated that the internet is a globally connected system — what happens in one segment affects all others. It is a credible first step toward better global cybersecurity practices.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today