The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more
The NTIA has published a Notice of Inquiry, Assessment of the Transition of the Technical Coordination and Management of the Internet's Domain Name and Addressing System, in advance of the expiration of the Joint Project Agreement in September 2009. The document outlines the history and evolution of the Memorandum of Understanding (MOU) between the Department of Commerce (DoC) and ICANN, and the questions posed cover fairly standard territory. However, the following might be worth paying attention to... more
When the U.S. Digital Television Transition (DTV) transition happens in Feb. 2009, channels 2 through 51 will remain allocated for television transmission. Few of the nation's television markets actually use 49 channels. Indeed, most use less than half of that number... Today, with Congress in recess, leaving less room for last-minute-Lucy-with-the-football lobbying gambits, the Federal Communications Commission (FCC) appears to be poised to release a report saying the white spaces can be used without necessarily causing interference to existing broadcasts. There are still many questions to be answered... more
One of fastest growing trends of electronic communications is digital identity. The simplest way of establishing digital identity is to get a domain name and create a web site and email accounts. While this might have been a fairly complex undertaking some ten years ago, today it is a trivial matter. So trivial in fact that spammers and phishers can ply their trade with very low costs of entry. These low cost of entry have made the Internet a commodity business as traffic is handled in the aggregate and competitive pricing has made being an ISP a difficult business model. It also has created aggressive growth and adoption curves. The Internet is also the lowest common denominator... more
I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more
The Internet as we know it and use it today -- is broken, badly broken. Yes broken so much so that we are really crazy to have any expectations of privacy or security. Yes, really. The Internet was conceived as somewhat of a utopian environment, one where we all keep our doors, windows and cars unlocked and we trust all the people and machines out there to "do the right thing...". more
One of the WIPO decisions published today relates to gillette.ro. The registrant (respondent) didn't make any submissions in their defence, so the decision could have been quite banal. However some of the panelist's comments under the "Registered and Used in Bad Faith" section are quite interesting... more
The City of Amsterdam announcement to now move to the next stage of their FttH (fibre to the home) project -- with another roll out covering 100,000 connections -- is a clear indication that the concept of open access FttH networks is a valid one. This will have large scale implications for countries around the world who are looking at using open network based telecoms infrastructure projects to stimulate their economies. more
DomainKeys Identified Mail (DKIM) is the leading email authentication technology, supported by major ISPs including Google, AOL, and Yahoo! (who invented its predecessor), popular mail server software like Sendmail, and many of the best minds in email technology. But if you peruse the archives of the IETF DKIM mailing list, or start up a conversation at MAAWG, it might appear that there's still a lot of disagreement about what a DKIM signature actually means. more
One of the biggest telecom events in the world, now in its tenth year, the GSMA Global World Congress, is attracting 90,000 visitors this year. Why are so many people flocking to this event? Obviously telecoms and mobile in particular, has become one of the biggest industries in the world. Hundreds of billions of dollars are invested every year and the market simply keeps growing. However, that alone is not enough to explain this large number of visitors. more
Yesterday, in my post on three new threats in one day, I posed the question whether it was necessary to develop regulations that would set a minimum standard on cyber security for devices that connect to the Internet. I'm having second thoughts here, which I'll explain in this post, but also try to look at a way forward and ask you to engage. more
Technologists and law enforcement have been arguing about cryptography policy for about 30 years now. People talk past each other, with each side concluding the other side are unreasonable jerks because of some fundamental incompatible assumptions between two conceptual worlds in collision. In the physical world, bank branches have marble columns and granite counters and mahogany woodwork to show the world that they are rich and stable. more
Do you know someone who has played a major role in the development and advancement of the Internet? Now is the time to recognize their contribution. Nominate them for the 2019 Internet Hall of Fame. With more than 100 inductees, the Internet Hall of Fame celebrates Internet pioneers and innovators who have pushed the boundaries to bring the Internet to life and make it an essential resource for billions of people today. more
Remember not very long ago when social media experts were preaching the value of a Facebook page over a website? It was not uncommon to be told to dump your website altogether in favor of a Facebook page and Twitter feed. Why bother with HTML when you could simply hashtag your way to global success? My how times have changed. more
You don't necessarily need to walk before you can run, but you should probably look where you are going before you do either. The U.S. Government's announcement that it would transition out of its unique legacy role in ICANN set off a powder keg at ICANN, as stakeholders from every corner of the community rushed to offer their recommendations on how to fill the impending contractual vacuum with something, new, better, and appropriately reflective of the multi-stakeholder model. more
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC