The Virus Bulletin Conference last month had some good presentations, including this one by Fabio Assolini of Kaspersky. He spoke about how Brazil is the the newest up-and-comer on the cyber crime block. The tale begins with the story of Igor and Emily, two cyber criminals operating out of Brazil. Together, the two of them stole $300,000 US from a single Brazilian bank in one year. more
Often when looking at IPv6 deployment statistics, the size of the organisation or the network is not taken into account. In this article, we look at IPv6 deployment of Local Internet Registries (LIRs) per country in correlation to the size of the LIR. When looking at IPv6 deployment at the LIR level, we can look at the following two metrics... more
One thing that ICANN clearly lacks is a set of well documented and often referenced founding principles. This leaves the awkward position where everyone who has been around since the beginning has a different position on what those principles should have been and all those that have joined later know that there is something fundamental missing. The missing principle vexing me this week is that of fair competition. Even now, long after the gTLD vote, the argument still runs on... more
Virtualization of core network services such as DDI has created a lot of controversy over the last couple of years. Perhaps most notably, Infoblox and Gartner have been both claiming that virtualized network services are not on the agenda of larger organizations, nor will they ever be. I'm not sure I have ever seen a convincing technological reasoning for this position. Rather, the logic has always been circular: it's not going to happen because we're not seeing it happening. more
It was fascinating last week to read coverage of congressional hearings around the SOPA bill, or Stop Online Privacy Act. The bill has strong support from the Motion Picture Association of America, the U.S. Chamber of Commerce and big pharmaceutical companies. It's opposed by most technology and telecom companies, plus consumer advocate groups like the Electronic Frontier Foundation and Public Knowledge. more
Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more
According to press reports, a water utility's SCADA network was hacked. The attacker turned a pump on and off too much, resulting in physical damage to the pump. ... For years, security specialists have been warning that something like this could happen. Although more and more people have started to believe it, we still hear all of the usual reassuring noises -- the hackers don't know enough, we have defenses, there are other safeguards, etc. That debate is now over... more
"There is a serious danger that ICM will establish and monopolize such a distinct market. As consumers seeking adult content become more aware of the .XXX TLD, registering and displaying websites in other generic TLDs may not easily be substituted for registration in the .XXX TLD." No that statement is not from the ICM Registry's sales material. more
While Occupy Wall Street and other groups representing the so-called 99% are getting most of the press, the 1% is raising its profile as well, at least when it comes to gTLDs. They are complaining that introducing global choice and competition to the Internet will cost them money. The chief of the Association of National Advertisers (ANA) now says that it has "spent the last few months" considering the new gTLD program, and has found it lacking. They want ICANN to shut the whole thing down. more
As handheld devices grow ever more sophisticated and demand for content-rich services such as mobile video increases, mobile data traffic is likely to continue growing at an explosive rate. This represents good news for the industry, but next-generation wireless technologies will need to be ready to meet the challenge and able to cope with these increased demands on bandwidth. A recent TD-LTE spectrum workshop looked at the potential of TD-LTE technology to take us on to the next stage of wireless communication. more
While at that same Virus Bulletin conference that I was talking about earlier in my other post, I also had the chance to check out a session on Chinese DDoS malware put on by some folks from Arbor Networks. As little insight as I have into Android malware, I know even less about Chinese DDoS malware. So what's Chinese DDoS malware like? What are its characteristics? more
Is desktop anti-virus dead? Someday I'd love to make that announcement, but it still feels to me that there's a Patron Saint of Voodoo with an affinity for bringing it back to life -- like some macabre mirror image of the malicious zombies it's supposed to provide protection against. It's kind of ironic that today's innovation in desktop anti-virus isn't really happening at the desktop; rather it's occurring in the cloud. more
In a move that shouldn't come as a surprise to anyone, the EU Commission has given a rather mixed welcome to the IANA bid. While they obviously like a lot of what they are seeing, they're also not overly impressed with the contract only being open to US companies. more
Last month at the Virus Bulletin Conference in Barcelona, I took in one of the sessions on mobile malware. This type of malware is foreign to me because I mostly stay in the email space at work (and even then, I am focusing more on day-to-day issues of running a large mail provider than I am on spam and abuse). What's mobile malware like? What are the threats? How do users get infected? more
In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byRadix