/ Most Viewed

Bandwidth Needed to Work from Home

The pandemic made it clear that the millions of homes with no broadband or poor broadband were cut off from taking the office or the school home. But the pandemic also showed many additional millions of homes that their current ISP connection isn't up to snuff for working or doing schoolwork from home. Families often found that multiple adults and students couldn't share the bandwidth at the same time. more

Mueller Report: Russians Used Spear Phishing, SQL Injection to Penetrate US Election Administration

The nearly 400-page copy of the Mueller report released on Thursday includes some details on how Russia's foreign military intelligence agency (GRU), targetted individuals and entities involved in the administration of the U.S. elections. more

When Two Trademarks Aren’t Confusingly Similar to One Trademark

As I've written before, domain name disputes involving multiple trademarks sometimes raise interesting issues, including whether a panel can order a domain name transferred to one entity without consent of the other. While panels typically have found ways to resolve this issue, one particularly troubling fact pattern arises when a panel denies a complaint simply because a disputed domain name contains trademarks owned by two different entities. more

Ranking Top Internet Service Providers in the World for 2008

In a post by Earl Zmijewski of Renesys, a number of observations have been made in the effort to rank all Internet service providers in the world for 2008 -- globally, geographically, as well as by market segment. Given the controversial nature of such a ranking in the industry, Zmijewski has pointed out that the changes in rank can be far more revealing than the actual rank itself. For instance it is noted that providers who are moving up in the rankings are doing so due, in large measure, to Asia. "China Telecom poised to enter the top-10 'global' providers, despite not being very global. Guess that is easy to do when you 'own' 1/6 of the world's population," says Zmijewski. Findings also include Sprint losing its long held #1 status to Level 3 and Global Crossing surging to #3, leaving their peers behind. more

The Early History of Usenet, Part VII: Usenet Growth and B-News

For quite a while, it looked like my prediction – one to two articles per day – was overly optimistic. By summer, there were only four new sites: Reed College, University of Oklahoma (at least, I think that that's what uucp node uok is), vax135, another Bell Labs machine – and, cruciallyy, U.C. Berkeley, which had a uucp connection to Bell Labs Research and was on the ARPANET. more

Dealing With DMARC

DMARC is an anti-phishing scheme that was repurposed in April to try to deal with the fallout from security breaches at AOL and Yahoo. A side effect of AOL and Yahoo's actions is that a variety of bad things happen to mail that has 'From:' addresses at aol.com or yahoo.com, but wasn't sent from AOL or Yahoo's own mail systems. If the mail is phish or spam, that's good, but when it's mailing lists or a newspaper's mail-an-article, it's no so good. more

U.S. Department of Justice Demands IP Addresses, Other Details on Visitors to Trump Resistance Site

The Los Angeles-based hosting company, DreamHost on Monday revealed that for the past several months it has been dealing with a search warrant from the Department of Justice pertaining to a website used to organize protests against President Trump. more

ICANN 48 in Buenos Aires: What Happened and What’s Next?

Last month, some of my colleagues at MarkMonitor and I traveled to Buenos Aires, Argentina for ICANN 48. With the recent delegation and launch of the first new gTLDs, the atmosphere had an air of both excitement and anxiety. In my opinion, there is much to be done before brand owners should begin to feel comfortable in the post-new gTLD Internet environment, which brings a host of new challenges, as companies attempt to scale monitoring and enforcement to the new (huge) domain name space. more

Comcast Begins Pilot Market Deployment of IPv6

Comcast is now the first large ISP in North America to start deploying IPv6. According to the company, this initial phase will support certain types of directly connected customer premises equipment (CPE), where a single computer is connected directly to a cable modem. "Subsequent phases in 2011 and 2012 will support home gateway devices and variable length prefixes." more

Can Big Companies Stop Being Hacked?

The recent huge security breach at Sony caps a bad year for big companies, with breaches at Target, Apple, Home Depot, P.F.Changs, Neiman Marcus, and no doubt other companies who haven't admitted it yet. Is this the new normal? Is there any hope for our private data? I'm not sure, but here are three observations... This week Brian Krebs reported on several thousand Hypercom credit card terminals that all stopped working last Sunday. Had they all been hacked? more

SpaceX Starlink Beta, Phase Two

According to an email, Starlink has moved into the second phase of its beta program, nicknamed the "better than nothing beta," which feels a bit like monopoly hubris to me. It may be better than nothing, but it is not as good as the initial beta, which was free. Participants will pay $99 per month for the service and pay $499 for a terminal, including a tripod and WiFi router. I wonder what the difference is between these "beta testers" and "customers." more

Lawful Registrations of Domain Names

Doug Isenberg notes in a recent CircleID essay that two records in domain name disputes were broken in 2017, namely number of cybersquatting claims (3,036 in 2016, 3,073 in 2017) and number of domain names implicated (5354 in 2016, 6370 in 2017). Fairly consistently from year to year, approximately twenty percent of filings are terminated (withdrawn): whether by settlement or nolo contendere we don't know. (All of these statistics come from the World Intellectual Property Organization (WIPO). more

Ethical Hacking: Turning The Tables to Boost Cyber Security

Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States had their personal information stolen. For companies, the stakes are huge: Compromised systems not only damage the bottom line but can severely impact public opinion. more

Why Attribution Is Important for Today’s Network Defenders

It makes me cringe when I hear operators or security practitioners say, "I don't care who the attacker is, I just want them to stop." I would like to believe that we have matured past this idea as a security community, but I still find this line of thinking prevalent across many organizations -- regardless of their cyber threat operation's maturity level. Attribution is important, and we as Cyber Threat Intelligence (CTI) professionals, need to do a better job explaining across all lines of business and security operations... more

Telecoms as a Spying Tool

With more and more stories coming in from all over the world about the prolific use of telecommunications to spy on what people are doing, the ball has been thrown back into the industry's court, to do something about it. In principle, ever since telecoms came into existence in the 1850s spying was high on the agenda of the people who started to use the new technology. In 1865 countries formed the International Telecommunications Union (ITU). This later became the first institution under the UN and all countries in the world are a member. more