Last week we investigated how rich data derived from TR-069 can be used to optimize the service quality of a single access point (AP) within the subscriber premises. Often a service provider will control multiple APs within a multi-dwelling unit, university campus, or other public space. This opens up new doors for optimizing service quality - instead of simply optimizing a single AP, you are now able to control other APs in the vicinity as well. more
Chancellor George Osborne announces government plan to almost double its investment in cyber security initiatives over the next five years, spending an additional £1.9 billion. more
The Wall Street Journal is reporting that antitrust enforcement in telecommunication is being ramped up by the Obama Administration, after relatively lax times. In a piece entitled Telecoms Face Antitrust Threat it indicates that investigators are weighing up the roles of the large carriers and whether they are abusing the market power amassed under the Bush Administration. more
Internet Systems Consortium (ISC) has announced that it is working with Afilias and Neustar, Inc. in the effort to support ISC's DNSSEC Look-aside Validation (DLV) registry by providing secondary DNS service for the DLV zone. DLV is a mechanism that provides many of the benefits of DNSSEC (short for DNS Security Extensions), enabling domain holders to secure their domain information today in advance of broader DNSSEC deployment and adoption. "Adding Afilias and Neustar as secondary DNS providers for the DLV zone demonstrates our collective understanding that DLV is a vitally important production service bigger than any single provider in the same way that there are 13 root server operators, not just one." more
HackerOne has announced the results of the second Hack the Air Force bug bounty challenge which invited trusted hackers from all over the world to participate in its second bug bounty challenge in less than a year. more
J.D. Falk writes: Last week, MAAWG quietly published a new document titled "Overview of DNS Security - Port 53 Protection." [PDF] The paper discusses cache poisoning and other attacks on the local DNS, including likely effects of such a compromise and what access providers may be able to do to prevent it. more
During a speech at Mobile World Congress today, Ajit Pai said that net neutrality was "a mistake" and that the commission is now "on track" to return to a much lighter style of regulation. more
ICANN is seeking a global background screening service provider in order to conduct a "thorough and timely" background check on all new generic Top-Level Domain (gTLD) applicants. The Request for Proposal recently issued by ICANN aims at background screening focused on general business diligence, criminal history, and cybersquatting behavior. more
The Anti-Phishing Working Group (APWG) has released its 2008 first quarter Phishing Activity Trends Report revealing that the Crimeware-Spreading URLs rose rapidly doubling previous high. More specifically, the report say that numbers of crimeware-spreading URLs infecting PCs with password-stealing code rose 93 percent in Q1, 2008 to 6,500 sites, nearly double the previous high of November, 2007 -- and an increase of 337 percent from the number detected end of Q1, 2007. On the positive side, the number of phishing reports and new phishing websites decreased at the end of Q1 2008 period. more
Are you suffering delays in your recent emails to china? It may be because of "series of disruptions to cross-border email traffic on adjustments to the country's vast Internet surveillance system," Reuters reports today. The delays have been going on for four days now. But, of course, there is no way to get official confirmation. The symptom seems to be an error message that is returned to the sender... more
Yahoo recently become the latest company to join Twitter, Facebook and Google for promising to alert users suspected of being spied on by state-sponsored actors. However UK ministers want to make it a criminal offence for tech firms to warn users of requests for access to their communication data made by security organizations. more
I attended the 46th ICANN meeting in Beijing, China, and made a statementat on the panel "Internet Governance -- The Global Agenda", questioning the limits of the multistakeholder model, or more precisely the "bottom" of the bottom-up concept. My expectation was enormous, just at the time when two important meetings on governance and information society are in evidence: the WCIT and WSIS +10. more
In 2021, the story was price. In 2022, the story was price and large block supply. Spurred by unprecedented unit pricing, the IPv4 market in North America experienced its second-best year ever in market history. Nearly double the number of IPv4 addresses were traded in 2022 compared to 2021, predominantly due to the increased flow of large block supply from twelve sellers, five of whom were first-time market participants. more
Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests. more
Afnic, the association responsible for several Internet Top Level Domains, including the .fr country-code Top Level Domain, has published the 2022 edition of its annual analysis under the title “The Global Domain Name Market”. Here are some highlights of this study. The domain name market posted aggregate growth of +1.9% in 2022, an acceleration that reflects a break in the trend observed since 2019. As we foresaw in last year’s report, 2021 was the “trough” year, with a relative improvement over 2022. more