Most of our IPv6 Security Myths are general notions, often passed on unwittingly between colleagues, friends, conference attendees, and others. Today's myth is one that most often comes specifically from your vendors or suppliers. Whether it's a hardware manufacturer, software developer, or Internet Service Provider (ISP), this myth is all about trust, but verify. more
A recent press release from the Internet Society reports that the IETF will shortly publish specifications of SPF and Sender-ID in the RFC series. What does this mean for the future? ...More than 4000 documents have been published in the RFC series since the first RFC in 1969, relatively few of which have evolved into Internet standards. Each RFC is characterized when published as standards-track, best current practice, informational, experimental, or historical. These four RFCs, three describing Sender ID and one describing SPF, are all experimental. more
While celebrating its 10th year anniversary this month, Google reflects on the "enormous impact" that the Internet has had on people's lives around the world. "It has changed politics, entertainment, culture, business, health care, the environment and just about every other topic you can think of," says Google in its recent blog postings related to "Google at 10". In today's blog post, Chad Hurley, CEO and Co-Founder, YouTube (acquired by Google) says: "Today, 13 hours of video are uploaded to YouTube every minute, and we believe the volume will continue to grow exponentially. Our goal is to allow every person on the planet to participate by making the upload process as simple as placing a phone call..." more
ICANN has announced today that it has tentatively agreed to settle a longstanding dispute with VeriSign Inc. The dispute which began in part from SiteFinder, a controversial search service VeriSign created in late 2003 for users who mistype Web addresses. The following is an excerpt from today's press release... more
The Latin America and Caribbean Domain Name System (LAC DNS) Forum will be held on November 15, 2013 in Buenos Aires, Argentina. This follows on a similar initiative that took place at ICANN 47 in Durban, South Africa. The event's global, regional and local organizers plan to address key online issues, including more regional involvement with Internet governance. more
According to a report released today, 69% of adult internet users, or roughly half of all U.S. adults (52%), have used the internet to watch or download video, with 18-29 year-olds leading the way. "We are seeing a surge in online video watching that is driven by a combination of broadband access, the increasing use of social networking sites, and the popularity of video-sharing sites," explains Kristen Purcell, Associate Director for Research at the Pew Research Center's Internet & American Life Project and author of the report. "To tap into these trends, untold numbers of websites now showcase online video as part of their content." more
OK, you know things are getting bad when Ameritrade leaks its customer information yet again, and I don't even bother to report it because it's not news anymore. Well, recent updates to the story have prompted me to correct that omission. Yes, it happened again. Roughly a month ago, correspondents began to receive pump-n-dump spam to tagged email addresses which they had given only to Ameritrade... This now marks the third major confirmed leak of customer information from Ameritrade. In addition, the Inquirer reported the loss of 200,000 Ameritrade client files in February 2005. One correspondent informs me that this has happened to him on four or five previous occasions. more
I have long been intrigued by the question of how do we turn the internet into a lifeline grade infrastructure... My hope that this will occur soon or even within decades is diminishing. Most of us observe, almost daily, how even well established infrastructures tend to crumble when stressed, even slightly... I was at the O'Reilly Etel conference last week. The content was impressive and the people there were frequently the primary actors in the creation and deployment of VOIP. However, not once during the three days did I hear a serious discussion by a speaker or in the hallways about how this evolving system would be managed, monitored, diagnosed, or repaired. more
It's common to hear that oversubscription is the cause of slow broadband -- but what does that mean? Oversubscription comes into play in any network when the aggregate subscribed customer demand is greater than the available bandwidth. The easiest way to understand the concept is with an example. Consider a passive optical fiber network where up to 32 homes share the same neighborhood fiber. more
Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools. more
Dell filed a suit in Florida in early October against a nest of domain tasters in Miami, widely reported in the press last week... The primary defendant is a Miami resident named Juan Vasquez, doing business as several registrars called BelgiumDomains, CapitolDomains, and DomainDoorman, as well as a whole bunch of tiny companies of unknown authenticity... Those registrars have an egregious history of domain churning. I gave a talk on domain tasting at MAAWG in October in which I picked out the registrars who churned the most domains from the May registrar reports, and those three were the worst, each having registered about 500,000 domains, refunded over 10 million... more
New developments that have been announced by the FCC in the United States have rekindled the decade-old debate on the use of the so-called 'white spaces' in broadcast spectrum that are to be used for telecoms purposes. In September 2010, the FCC adopted a Second Memorandum Opinion and Order that updated the rules for unlicensed wireless devices that can operate in broadcast television spectrum at locations where that spectrum is unused by licensed services. This unused TV spectrum is commonly referred to as television 'white spaces'. The rules allow for the use of unlicensed TV devices in the unused spectrum to provide broadband data and other services for consumers and businesses. more
The growing interest in the "Internet of Things" is forcing us to think beyond the web to a much larger world of connected devices. We can tolerate the many barriers to connectivity because we expect that someone can provide the necessary credentials to log in to the providers' services and to adjust Wi-Fi access keys whenever the access point changes or simply to click "agree" at a hotspot. This doesn't work for "things" which can't recognize a sign-on or "agree screen". more
In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape? more
There have been a number of attacks on the root name servers over the years, and much written on the topic. (A few references are here, here and here.) Even if you don't know exactly what these servers do, you can't help but figure they're important when the US government says it is prepared to launch a military counterattack in response to cyber-attacks on them. more