/ Most Viewed

Widespread Compromised Routers Discovered With Altered DNS Configurations

A widespread compromise of consumer-grade small office/home office (SOHO) routers has been discovered by threat intelligence group Team Cymru. According to the report, "attackers are altering the DNS configuration on these devices in order to redirect victims DNS requests and subsequently replace the intended answers with IP addresses and domains controlled by the attackers, effectively conducting a Man-in-the-Middle attack." more

Spamhaus Tells Us That Botnets Are Getting Worse

The Spamhaus Project just published a long article about the botnets they've been watching during 2014. As this chart shows, we're not making any progress. They also note that the goals of botnets have changed. While in the past they were mostly used to send spam, now they're stealing banking and financial information, engaging in click fraud, and used for DDoS and other malicious mischief. more

DNSSEC Workshop Streaming Live from ICANN 55 in Marrakech on Wednesday, March 9, 2016

What is the current state of DNSSEC deployment around the world and also in Africa? How can you deploy DNSSEC at a massive scale? What is the state of using elliptic curve crypto algorithms in DNSSEC? What more can be done to accelerate DNSSEC deployment? Discussion of all those questions and much more can be found in the DNSSEC Workshop streaming live out of the ICANN 55 meeting in Marrakech, Morocco, on Wednesday, March 9, from 9:00 to 15:15 WET. more

.Paris Takes Over the Eiffel Tower

Last night there was apparently a big event in Paris at the Eiffel Tower (Champs de Mars) and there were plenty of photos shared by the brands, companies and people in attendance.
But what's really impressive is that they were able to get the message up on the side of one of Paris' best known monuments -- the Eiffel Tower. How? The City of Paris is behind the domain extension - so that's "how". more

AT&T CTO Donovan: We Need Non-Discrimination

"Outside applications need to be on an equal footing with our own applications," John Donovan said at a SUPERCOMM keynote here in Chicago. "My jaw dropped," one of his colleagues told me a few minutes later, because this is a reversal of AT&T's long-standing position they needed to be able to favor their own applications. AT&T D.C. needs to listen closely to their own CTO, because they are throwing everything they have in D.C. at preventing "non-discrimination" being included in the FCC Net Neutrality regulations. more

The Internet of Things and User-Generated Internet Energy

One of the key factors in the transformation of the telecommunications industry was the fact that, thanks to the internet, end-users were suddenly able to become active participants in generating content for both private and public use. Companies such as Google, Amazon, eBay, Skype and Apple, followed by a number of national and international social media companies, all became involved in these new developments, and they became the great game-changers of the industry. Telecoms companies were caught off guard... more

Yahoo Reveals Over One Billion More Accounts Have Been Hacked

Just a few months after Yahoo confirmed a massive data breach impacting half a billion users, the company today disclosed a second major breach of its systems affecting over a billion users. more

Understanding and Detecting Mobile Malware Threats

Every couple of years there's a new "hot threat" in security for which vendors abruptly tout newfangled protection and potential customers clamor for additional defense options. Once upon a time it was spyware, a few years ago it was data leakage, and today it's mobile malware. It's a reoccurring cycle, analogous to the "blue is the new black" in fashion -- if you fancy adopting a certain cynical tone. more

An Open Letter to ICANN’s New CEO, Fadi ChehadĂ©

Congratulations on your appointment as the next CEO of ICANN, and welcome to our little rogues' gallery. Some denizens of this domain (your humble author included) may strike you as a little odd at first, but we're mostly harmless. We usually steer first-timers onto the Newcomers track, but in your case, that may be... inadequate. And while we would never presume to tell you how to do your job -- which may be one of the world's hardest - we thought we might offer a few pieces of friendly advice, based on our time here. more

Big Rumble in Tokyo Over JPRS’s Announcement to Offer gTLD Domains

In an announcement at a registrars meeting in Tokyo on October 19th 2010, JPRS announced that they would be offering generic Top-Level Domains (.com, .net, .org, etc.) to their .jp accredited registrars in the near future. JPRS is already famous for their double-dipping practices, acting as both registry and registrar for .jp domains, for their dubious "campaigns" which are aimed at being dis-advantageous to smaller registrars and for their famous registrar back-end "system" which is circa 1995 technology and even prone to accidental DOS attacks by registrars trying to simply drop-catch domains. more

Unbridled Discretion and Prior Restraint: The Verizon and Comcast Stories

Let's say that providing communications infrastructure is an inherent function of a state. Most people think of the internet as a telephone system, and most people think the telephone companies aren't supposed to choose which calls will go through based on their content. People think that because they think internet access, like telephone access, is a utility -- like electricity conduit, water pipes, etc. -- that has something to do with the government, and the government isn't supposed to discriminate. more

Internet Traffic Slowed for Popular Video Apps by Wireless Carriers in US, New Research Indicates

According to new research from Northeastern University and the University of Massachusetts, Amherst, largest U.S. telecom companies are slowing internet traffic to and from popular apps like YouTube and Netflix. more

What Domain Names Get Transferred: Why and Why Not?

Think of trademarks situated on a continuum with famous and well-known at one end and less well-known or unrecognized by average consumers at the other. On one end there is certainty of infringement... at the other end, certainty of having the complaint denied either for lack of proof or overreaching... At some point along the continuum, it becomes uncertain whether respondents registered accused domain names in bad faith, and the question has to be answered by examining the facts. more

The Economics of Magic

Arthur C. Clarke said any sufficiently advanced technology is indistinguishable from magic. Milton Friedman said there's no such thing as a free lunch. The validity of the former statement does not invalidate the later. From this we can see that even magic has a price. Hence, its application is subject to cost-benefit analysis. There are many developing technologies that may eventually qualify as magic. more

Automation for Physical Devices: the Holy Grail of Service Provisioning

Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) are finally starting to pick up momentum. In the process, it is becoming clear that they are not the silver bullet originally advertised to be. While great for some use cases, emerging technologies like SDN and NFV have been primarily designed for virtual greenfield environments. Yet large service providers continue to run tons of physical network devices that are still managed manually. more