/ Most Viewed

Can We Really Blame DNSSEC for Larger-Volume DDoS attacks?

In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more

MailChimp Not Quite Ready for PrimeTimeML

With perhaps the most coveted valuation in the Email Industry at close to $10B, MailChimp is considered the most forward-thinking ESP on the planet boasting 12M customers, with outstanding brand recognition and an incredible leadership suite. But when it comes to installing RealTimeML, it's lollygagging mainly because it has not justified the actual value to productionalize RealTimeML across its client base. And also, because it is a challenge to execute! more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more

SpaceX Is Testing Starlink Roaming

Last April, Elon Musk tweeted that Starlink "should be fully mobile later this year, so you can move it anywhere or use it on an RV or truck in motion." It is good to know that mobility with a standard dish is in the works, but it's not yet available. David Lang had been able to connect his Starlink terminal about fifteen miles from his home in Simi Valley, California, but when he brought it to my place in Carpinteria, California, about forty-three miles away and in a different coverage cell, it failed to connect. more

The Future of Internet Governance? Comments on IGF 2018 Speech by French President Emmanuel Macron

Macron has declared the Internet to be under threat. Without stepping back to question and explore the underlying causes of those threats, he uses them as a justification to propose a different approach to, albeit limited, current Internet Governance processes. Here we explore his proposals and some of the issues they generate. He acknowledges that Civil Society and the private sector have been core drivers in the creation of the Internet. He argues that its benefits and existence are endangered by predatory practices. more

Genachowski to Broadband: Reduce Prices, Increase Speeds, Increase Access, Embrace Competition

Broadband providers are not taking the recent move by the FCC to reclassify broadband under Title II; i.e., put broadband under its regulation arm along with the likes of telephone companies, very lightly and have come out swinging to stop that effort... Seemingly at issue; an appeal brought by Comcast with the D.C. Court of Appeals and the subsequent defeat of the FCC's perceived role as a broadband regulator, ruling the communication had no authority under current legislation to sanction Comcast over a 2008 Internet throttling incident. more

Donuts, Rightside Group Merge in a $213M Acquisition Deal

Donuts Inc., a leading domain name registry for new top-level domains and Rightside Group today announced a merger agreement; Donuts has agreed to acquire Rightside for $10.60 per share in an all-cash tender offer, for an aggregate purchase price of approximately $213MM. more

ChatGPT Used to Create Polymorphic Malware

ChatGPT, the newly released language model, has quickly gained popularity and is used for various tasks, from automation to music composition. While having useful features like fast and easy-to-use code examples, it also has the ability to create sophisticated malware without malicious code. more

EU Approval for 4G Technologies to Use GSM Bands - A Boost to Rural Mobile Broadband

The EC recently approved technical rules on how the 900MHz and 1800MHz frequency bands should be utilised for 4G services, including LTE and WiMAX. National governments have until the end of 2011 to implement the decision into national legislation. Restrictions were initially imposed by the 1987 GSM Directive which limited these bands for 2G. more

Renesys Chronicles Today’s Internet Blackout in the Sudan (Now Restored)

The team over at Renesys has once again provided a great analysis of an Internet outage in a country, this time in Sudan. In the article simply titled "Internet Blackout in Sudan", Doug Madory writes: A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011..." more

Demystifying ISP Oversubscription

I think the concept that I have to explain the most as a consultant is oversubscription, which is how ISPs share bandwidth between customers in a network. Most broadband technologies distribute bandwidth to customers in nodes. ISPs using passive optical networks, cable DOCSIS systems, fixed wireless technology, and DSL all distribute bandwidth to a neighborhood device of some sort that then distributes the bandwidth to all of the customers in that neighborhood node. more

Trump’s Strange WRC-19 Letter

The 2019 World Radiocommunication Conference (WRC-19) is underway. It is the latest in a continuum of treaty-making gatherings that began in 1903 and is devoted to the now 116-year-old art of globally carving up the radio spectrum among designated uses that is instantiated in the Radio Regulations treaty agreement. Not unexpectedly, the event includes designation of 5G spectrum that flows from the requirements long set in 3GPP and GSMA. more

UN Moves on Internet Governance: Latest Dispatch

Some unsettling plans declared themselves at the International Telecommunication Union (ITU) this week as countries prepared for the up-coming treaty-making jamboree called the World Conference on International Telecommunications (WCIT). This community will now have to decide what it does about them. ... It was significant to the CircleID community that the ITU's top dog -- the Secretary General - appeared in person before the assembled countries with a reassurance: the broad and unusual WCIT treaty negotiation, though it may treat many issues, would not take up Internet governance. more

On Internet Centrality and Fragmentation

I attended a workshop on the topic of Internet Fragmentation in July. The workshop was attended by a small collection of Australian public policy folk, some industry representatives, folk from various cyber-related bodies, and those with a background in Internet Governance matters. It was a short meeting, so the perils of fragmentation were not discussed at length, as they often can be, but the concerns about the breakup of the essential bonds that keep the Internet together were certainly palpable in that meeting. more

Be Wary of 5G Hardware

We've now entered the period of 5G competition where the wireless carriers are trying to outdo each other in announcing 5G rollouts. If you believe the announcements, you'd think 5G is soon going to be everywhere. Device manufacturers are joining the fray and are advertising devices that can be used with the early carrier 5G products. Buyers beware -- because most of what the cellular companies and the manufacturers are hyping as 5G is not yet 5G. more