Featured Blogs

Latest

Is Mobile Internet Really Such a Good Thing?

Just about everyone I talk to is very excited about mobile Internet. In 2006, the Japanese government proudly announced that more people used the Internet through their mobile phones than through their computers. Online services are all talking about their "mobile strategy" and VCs are flocking to fund the latest "mobile startup". I don't think there is anything wrong with mobile or with some of the great new mobile applications and devices, but we have to be careful to remember that most mobile networks that actually work are built on infrastructure that is operated by a small number of mobile operators who use a lot of regulated and closed technology... more

Uprooting of the DNS Root

The folks at Renesys pointed out earlier this week some interesting activity surrounding the L-root name server, highlighting some activity that should give us all yet another reason to be concerned about the security and integrity of the Internet DNS... considering that a great deal of malware today tends to corrupt the DNS resolution path in order to further exploit compromised end-systems, and that corruption, or any other actual end-system compromise, might well be unnecessary if the root were compromised -- well, think of the possibilities! more

Google Surpasses Supercomputer Community, Unnoticed?

This week's issue of EE Times carries a story Pflops here; now what? about IBM's new 1 petaFLOPS supercomputer, the Roadrunner, and how its designers are scrambling to run benchmarks in advance of the annual International Supercomputing Conference (ISC) being held June 17th-20th. It's an article (dare I say, a puff piece?) about IBM, but it does mention competing supercomputers by Japanese vendors. However, it makes no mention of distributed computing projects like SETI@Home or, more importantly, of the Google computing cluster. more

An Account of the Estonian Internet War

About a year ago after coming back from Estonia, I promised I'd send in an account of the Estonian "war". A few months ago I wrote an article for the Georgetown Journal of International Affairs, covering the story of what happened there. This is the "war" that made politicians aware of cyber security and entire countries scared, NATO to "respond" and the US to send in "help". It deserved a better understanding for that alone, whatever actually happened there. more

Identity Theft of Root Name Servers, Reason Unknown

There have been a number of attacks on the root name servers over the years, and much written on the topic. (A few references are here, here and here.) Even if you don't know exactly what these servers do, you can't help but figure they're important when the US government says it is prepared to launch a military counterattack in response to cyber-attacks on them. more

A Case of Mistaken Identity

As far as facebook is concerned, your email is your identification. This is true for other social networks like linkedin, and is slowly catching on to many other Web 2.0 services. It actually makes a lot of sense that your unique identifier (your "ID") would be your email -- it's unique by definition, it's easy to remember and most services need the email information anyway... So if email is destined to become the equivalent of your social security number or identification number (depending on which country you live in) how do we proof check that the email address we typed does not contain any typos? more

CAN SPAM and Affiliate Mailer Opt-Out

Many online businesses use affiliates to drum up business. The affiliate finds a lead somewhere, passes it to the business, and gets a commission if the lead turns into a sale. Web based affiliates are relatively uncontroversial, but affiliates who advertise by e-mail are a chronic problem due to their propensity to send spam, both spam as normally defined and as defined by CAN SPAM. Is it possible to do legitimate e-mail affiliate marketing? Maybe... more

Wow, Sanford Wallace Owes a Lot of Money

Last September MySpace sued ur-spammers Sanford "Spamford" Wallace and Walt "Pickle Jar" Rines were for egregious violations of CAN SPAM. Neither responded, so as was widely reported, earlier this week the court granted a default judgement. Since they sent a lot of spam, the statutory damages came to an enormous $235 million. Even for Spamford, that's a lot of money. more

White Space for Internet Use Interfering with Wireless Patient Devices?

There is a germ of truth (perhaps a prion-sized germ or maybe just an amino acid) in the idea that transmitters in "white spaces" in the TV band *might* disrupt patient monitoring equipment if designed by a lunatic who believes in sending massive pulses of energy in a whitespace in the TV band (perhaps amplified by a large parabolic dish antenna the size of a trashcan lid or larger, aimed at the patient monitor system. But that risk is completely shared with zillions of other potential radiators of energy in the entire electromagnetic spectrum... GE, of course, owns NBC. There is a MAJOR conflict of interest at the corporate level of GE... more

Do We Need Two Internets?

Jonathan Zittrain's recent book, The Future of the Internet -- And How to Stop It, has spurred a lot of discussion both online and offline, with blog posts lauding his insights or criticising his over-apocalyptic imagination. The book itself makes fascinating reading for those who have watched the network grow from its roots in the research community into today's global channel for communications, commerce and cultural expression... One of the reasons that Zittrain puts forward for the growing popularity of closed or, as he prefers 'tethered', devices, is that they are less vulnerable to hacking, security flaws, malware and all the other perils that face any internet-enabled system. more

Are Botnets Run by Spy Agencies?

A recent story today about discussions for an official defense Botnet in the USA prompted me to post a question I've been asking for the last year. Are some of the world's botnets secretly run by intelligence agencies, and if not, why not? Some estimates suggest that up to 1/3 of PCs are secretly part of a botnet. The main use of botnets is sending spam, but they are also used for DDOS extortion attacks and presumably other nasty things like identity theft. But consider this... more

The New Clearwire

The new Clearwire could be game-changing, but the rules of the game may not be quite as Clearwire presents them. I have been wondering since last July whether something significant would happen in the Google/Sprint world. The deal announcement earlier this weekseems to be that key development... In a nutshell, Sprint will contribute its substantial spectrum licenses in the 2.5 GHz range and its WiMAX-related assets and intellectual property. Google, Intel, Comcast, Time Warner Cable, and Bright House Networks will invest a total of $3.2 billion. more

NGN is Not the Internet, and Never Will

I see and hear a lot of confusion about next generation networks (NGN). In most cases people are using the term roughly as the ITU-T defines it: "A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies." but many people don't realize how little this has to do with the Internet... more

A Patent for SiteFinder-Like Resolution

I saw an interesting news item that broke Monday courtesy of DomainNameNews and SlashDot that hasn't been broadly covered yet. I'm surprised no one has posted on this yet on CircleID, so here goes. Apparently VeriSign has been awarded a patent for the resolution of mis-typed domain names. This was at the heart of the controversy back in 2003 around their SiteFinder Service. Amidst a storm of criticism ICANN insisted VeriSign shut down the service, and the company eventually agreed. more

Coders, Crackers and Bots, Oh My!

There are more than just blue, black and white hat hackers. There are a few more types of folks out there that don't fit into the above categories. This article is taken from Stratfor with some commentary by myself... Many of the hackers described in my previous post are also coders, or "writers," who create viruses, worms, Trojans, bot protocols and other destructive "malware" tools used by hackers... more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days