Russian submarines and spy are reported to be aggressively operating near vital undersea cables that carry global Internet communications, according to a story in the New York Times. The issue is raising concerns among some American military and intelligence officials regarding the possibility that Russians might be planning to attack those lines in times of tension or conflict. more
Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
Royal Pingdom has put together a list of top ten places with designated country code Top-Level Domains that are barely inhabited. The list starts off with '.hm' for Heard and McDonald Islands, an Australlian territory, with zero population. Others include '.pn' for Pitcairn Islands (Population: 50), '.tf' for French Southern and Antarctic Lands (Population: 140), '.cc' for Cocos (Keeling) Islands (Population: 596) and '.va' for the Vatican City (Population: 826). more
A class action lawsuit was filed today in Miami-Dade County Circuit Court on behalf of lead Plaintiff Carlos A. Cueto and others who participated in online auctions for domain names. In the lawsuit, Mr. Cueto alleges that an executive of the company conducting the auctions acted as a shill bidder to manipulate bids. The domain names were auctioned online by Oversee.Net, Inc. subsidiary SnapNames.Com, Inc. "The domain name industry is the wild west of intellectual property because it remains unregulated. The online community has been up in arms over what they feel has been an opaque system that just begs for transparency. It is impossible to know whether you are bidding against someone that isn't working or affiliated with the company conducting the auction," said attorney Santiago A. Cueto. more
The Untied States Government Accountability Office (GAO) has concluded that the IANA transition is not a government transfer of property requiring congressional approval. more
The United States White House Office of Science and Technology Policy (OSTP) has released a new report titled, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, specifying an agenda for "game-changing" cybersecurity R&D according to an official announcement today. The report is described as "a roadmap to ensuring long-term reliability and trustworthiness of the digital communications network that is increasingly at the heart of American economic growth and global competitiveness." more
Ministry of Foreign Affairs and the Cyberspace Administration of China has jointly released a document titled "International Strategy of Cooperation on Cyberspace." more
Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests. more
The number of 'things' connected to the internet is already bypassing the number of people on the planet. This Internet of 'things' is changing the way we live and work: from the way food is grown and produced on farms through automated temperature and feeding controls, to the way we check prices and buy through connected terminals, to the vehicles we drive, the security cameras at work, and automated gates at the entrance. Connected 'things' are everywhere. All these 'things' are helping us to be more productive and efficient while also offering more and more convenience. more
The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more
Before the Holidays, Yahoo got a flurry of good press for the announcement that it would (as the LA Times puts it) "purge user data after 90 days." My eagle-eyed friend Julian Sanchez noticed that the "purge" was less complete than privacy advocates might have hoped. more
These days you can hardly talk about Internet governance without hearing about security. DNSSEC is a hot issue, ICANN's new president is a cyber-security expert, and cyberattacks seem to be a daily occurrence.
This reflects a larger shift in US policy. Like the Bush administration before it, the Obama administration is making security a high priority for the US. Only now the emphasis is on security in cyberspace. The outlines of the new policy were published in the recent US Cyberspace Policy Review, which even recommends a cyber security office directly in the White House. more
The Internet Society today published the results of a study that demonstrates the far-reaching economic and societal benefits of establishing Internet Exchange Points (or IXPs) in emerging markets.The study, commissioned by the Internet Society and conducted by independent strategy and research consultancy, Analysys Mason, examined the critical cost and performance benefits of IXPs in Kenya and Nigeria - two sub-Saharan countries that have been on the leading edge of Internet growth in Africa. more
Last week we investigated how rich data derived from TR-069 can be used to optimize the service quality of a single access point (AP) within the subscriber premises. Often a service provider will control multiple APs within a multi-dwelling unit, university campus, or other public space. This opens up new doors for optimizing service quality - instead of simply optimizing a single AP, you are now able to control other APs in the vicinity as well. more
Large Communication Service Providers (CSPs) that provide transit to their customers need to pay special attention to those network segments to ensure that the IPs associated to them are actually being used. What happens should that customer move on or require more (or less) IP real estate? What do communication and management processes look like to ensure that all the various departments are aligned for rapid and seamless network configuration changes with no downtime? more