In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more
As AI notetakers become common in virtual meetings, concerns grow over data privacy, potential misuse, and the risks of unknowingly sharing sensitive corporate information with unseen third parties beyond organizational control. more
M3AAWG is a trade association that brings together ISPs, hosting providers, bulk mailers, and a lot of infrastructure vendors to discuss messaging abuse, malware, and mobile abuse. (Those comprise the M3.) One of the things they do is publish best practice documents for network and mail operators, including two recently published, one on Password Recommendations for Account Providers, and another on Password Managers Usage Recommendations. more
WikiLeaks shook the internet again on March 7, 2017, by posting several thousand documents containing information about the tools the CIA allegedly used to hack, among others, Android and iOS devices. These classified files were obtained from the CIA's Center for Cyber Intelligence, although they haven't yet been verified and a CIA official declined to comment on this incident. This isn't the first time that the U.S. government agencies were accused of crossing the line and undermining online security and civil liberties, as it's been only a year since the infamous FBI-Apple encryption dispute. It's like "1984" all over again. more
Congratulations. You have successfully defended your PhD dissertation, and it was a defining moment in your life. Your professorial experience and teaching assistant credentials are finally going to pay off. Further, you might have hundreds of citations, and PhDs are sought after because of their subject matter expertise. Well, that is OK. All that hard work and discipline allows you to use your newly earned moniker and seek out additional opportunities, either within the scope of academia or corporate options. Wait, Wait, Wait, not so fast. If you are thinking of just strolling into the industry and immediately begin earning a six-figure salary, think again, my friend. more
I have spent the day here in Berlin attending my second advisory board meeting for the EU research project reTHINK. I'm chewing over what I learnt about the possible future of the telecoms and cloud industry. There has been a decades-long tussle between the communications and computing parts of the ICT industry. Both sides wish to exert power over the digital economy. Sometimes this tussle works for the common good, sometimes not. more
The Trump administration today announced that the U.S. will begin a new strategy to deter and respond to cyberattacks with offensive actions against foreign adversaries. more
The source code for the IoT botnet 'Mirai' has been released," warns security expert Brian Krebs whose own website was targeted with the same botnet resulting in the historically large DDoS attack last month. more
When our G20 leaders met in Pittsburgh last week, stimulus and recovery were foremost on their minds. Needless to dwell on the ravages of sub-prime lending and outsized bonuses rewarding dismal performance. It is good to see that, in today's global economy, Information Technology is recognized as a major driver of economic growth and quality of life. ...The timing of the Cisco announcement linking IPv6 and smart grids is certainly no coincidence. There is a money trail to be followed and IPv6 will ride the smart grid coattails. more
Tel-Aviv, Israel was rejected as a possible venue for one of ICANN's 2020 public meetings due to its proximity to the Gaza strip and the escalation of an Iran/Israel conflict. more
In October 2023, the Number Resource Organization initiated a process to undertake a significant update to Internet Coordination Policy 2 (ICP-2); the policy which specifies the criteria for establishing new Regional Internet Registries (RIRs). The Address Supporting Organization Address Council (ASO AC) has been tasked with managing the revision process, emphasizing community engagement and transparency. more
US hospitals have been severely affected by a substantial cyberattack, leading to the closure of emergency rooms in multiple states and the redirection of ambulances. more
The story of computing and communications over the past eighty years has been a story of quite astounding improvements in the capability, cost and efficiency of computers and communications. If the same efficiency improvements had been made in the automobile industry cars would cost a couple of dollars, would cost fractions of a cent to use for trips, and be capable of travelling at speeds probably approaching the speed of light! more
It's time for the community to demonstrate its resolve to see ICANN implement a successful and effective Trademark Clearinghouse (TMCH). Let's be clear here. The current ICANN implementation model and approach is flawed and needs attention. Following more than three months of consultation and negotiation, today I'm pleased to be able to present the domain name and trademark protection industries with an alternative solution for the operation of ICANN's Trademark Clearinghouse for the new Top-Level Domain (TLD) program. more
Prior to November 30th of this year, the National Telecommunications and Information Administration (NTIA) must decide whether to renew or allow to expire its Cooperative Agreement with Verisign, the private-sector corporation that operationally controls the root of the Internet.. The Cooperative Agreement is unusually obscure, especially considering its central role in the operation of the Internet's Domain Name System (DNS). more