/ Most Viewed

The Year Ahead: Predictions for 2013

I recently talked about the top trends of 2012. Well, now it's time for me to look into my crystal ball and predict the future. I believe that this year we'll see great developments when it comes to TR-069. I know you'll say that this was a trend last year, but I'm confident that 2013 is the year that this protocol will really shine. more

A Report on DNS Operations, Analysis, and Research Center (DNS-OARC) 30th Meeting

DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more

Blasphemy: The U.S. Problem Is Huawei’s Security Is Too Good

Everyone knows the $100B/year U.S. security apparatus taps almost the entire Internet. Friendly governments help from Australia to Canada to France. Companies like AT&T, Ericsson, Verizon, and Nokia obviously cooperate. The NSA assumes that China is attempting to do the same and that Huawei, as a Chinese company, will provide assistance. The evidence suggests otherwise. Huawei is the primary opponent of U.S. security. more

Gigabyte Motherboard Firmware Exposes Millions of PCs to Potential Cybersecurity Threats

In a potentially damaging cybersecurity revelation, researchers from the cybersecurity company Eclypsium have identified a hidden mechanism in the firmware of motherboards manufactured by Taiwanese company Gigabyte. more

Your Future is Scripted! China, AI and the Race for Digital Authoritarianism

The race for digital authoritarianism between China and the US is now exceedingly stark. It is a race with enormous implications for the management of humankind, (yes I said it) and the respected doctrines of our human rights and freedoms. Everything we care about today as freedom-loving citizens will be transformed by AI, from access to healthcare to economic status and, more importantly, your ability to serve. more

Report on Why Cameroon Has Blocked the Internet

Three weeks have passed since reports of Cameroon blocking the internet in English-speaking parts of the country and residents say services have yet to be restored. more

AOL Issues This Week to Look Out For

A few issues may affect some senders/outbound mail across the email industry this week... A few folks in the industry said they saw false positives of RLY:B1 blocks since Monday the 8th. If you notice these, ensure you follow necessary procedure: check to see all is good on your end, and then submit a support ticket to AOL's postmaster group. more

Insights from ARI’s New TLD Workshop

Never let it be said that group therapy isn't effective. Prior to hosting a new Top-Level Domain (TLD) workshop for a group of Australian applicants last week, the only therapy I would have advised for new TLD applicants was electroshock therapy - given the confidence-sapping delays and the catastrophic impact of constant changes to the program such as Digital Archery, Name Collisions and GAC Advice. more

Creating, Protecting and Defending Brand Equity - Part 2

In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more

Celebrating 20 Years of the World Wide Web

Computer scientists, engineers and journalists gathered today on the CERN particle physics lab in the suburbs of Geneva, Switzerland, to pay homage to the a 1989 proposal by Tim Berners-Lee that would later come to be the blueprint for the World Wide Web. In March 1989, Tim Berners-Lee submitted a proposal for an information management system to his boss, Mike Sendall. 'Vague, but exciting', were the words that Sendall wrote on the proposal, allowing Berners-Lee to continue... more

Sudanese Nationals Charged in Global Cyberattack Campaign

Two Sudanese nationals have been indicted for allegedly leading Anonymous Sudan, a cybercriminal group responsible for over 35,000 Distributed Denial of Service (DDoS) attacks targeting critical infrastructure worldwide. more

Google Bard Fails to Answer Satellite Internet Questions

In an earlier post, I asked whether electronically steered antennas (ESAs) would replace parabolic antennas in satellite ground stations. I did some research and concluded that it is likely that they will. Next, I discussed the same question with ChatGPT and, while it made several false statements, it made a relevant point that I had overlooked. The relevant addition was positive, but the errors were troublesome, so I decided to try ChatGPT's competitor Google Bard. more

Mobile Consolidation Is Unavoidable

Despite its absolute success in providing competition to the telecoms market, infrastructure-based competition in the mobile market is now also reaching its final stages. We have been predicting this for some time; we did so in order to highlight the need to change to different business models in the industry -- models with more emphasis on infrastructure-sharing and competition based on new innovative services rather than on utility offerings... more

Rustock, Xarvester Spambots Capable of Sending 25,000 Messages Per Hour, Says New Study

A recent study suggests Rustock and Xarvester malware provided the most efficient spambot code, enabling individual zombie computers to send 600,000 spam messages each over a 24 hour period. "Over the past few years, botnets have revolutionized the spam industry and pushed spam volumes to epidemic proportions despite the best efforts of law enforcement and the computer security industry. Our intention was to better understand the origins of spam, and the malware that drives it," said Phil Hay, senior threat analyst, TRACElabs (a research arm of security company Marshal8e6)... more

Benkler Analyzes Broadband in Stimulus Bills

Yochai Benkler has done a close reading of the broadband portions of both House and Senate stimulus bills. Nice work. To summarize Yochai's summary: House: $6 Billion, split between Commerce and Agriculture Depts., requires adherence to FCC's Four Internet Principles (the Martin FCC Version); Senate: $9 Billion, via Commerce Department's NTIA, requires less specific "interconnection and nondiscrimination." How much broadband can a Billion buy? more