A long time ago, I worked in a secure facility. I won't disclose the facility; I'm certain it no longer exists, and the people who designed the system I'm about to describe are probably long retired. Soon after being transferred into this organization, someone noted I needed to be trained on how to change the cipher door locks. We gathered up a ladder, placed the ladder just outside the door to the secure facility, popped open one of the tiles on the drop ceiling, and opened a small metal box with a standard, low-security key. more
Having been involved in the telecommunications industry for a long time, I followed many of the discussions involving health concerns when the 3G and 4G mobile technologies were introduced. This time, with 5G, the situation is no different. Again, there are many communities worried about the potential negative health effects of the radiation that emanates from mobile communications. more
The Republican-controlled FCC on Thursday suspended the net neutrality transparency requirements for broadband providers with fewer than 250,000 subscribers. more
The U.S. Department of Justice and the FBI announced on Wednesday that they have taken actions to disable an international botnet of more than two million infected computers responsible for stealing corporate data including user names, passwords and financial information. more
The Internet Architecture Board (IAB) statement on the IANA Stewardship Transition released on Wednesday more
Google, Facebook, Twitter and Microsoft are among tech companies that have joined Apple in its iPhone fight with the U.S. government, according the latest report from the Wall Street Journal. more
Speaking during a discussion on innovation hosted by Reuters in Washington, Bill Gates said that no one was an "absolutist" on either side of the digital privacy debate but that he supports Microsoft's lawsuit against the U.S. government seeking the freedom to tell customers when federal agencies have sought their data. more
Following several months of pressure, ICANN has revealed a breakdown of figures under its catch-all term of "professional services," exposing its political expenses, Kieren McCarthy reported today in the Register. more
Iran's nuclear facilities are immune to cyber attack a senior Iranian military official has claimed today according to various reports. "Gholam Reza Jalali, who heads an Iranian military unit in charge of combatting sabotage, was quoted Monday by the official IRNA news agency as saying that Iran and its nuclear facilities possess the technology and knowledge to deal with malicious software." more
It wasn't that long ago that we saw a major update to WiFi standards with the release of WiFi 6 in 2019 and WiFi 6E in 2020. But we're on the verge of the next generation of WiFi with the official launch of the new WiFi 7 standard in November 2022. There has already been a soft release of WiFi 7 routers in China, and we'll start seeing the new routers in the market here sometime this year. more
"Russian banks will be faced with a whole range of new regulations, and penalties for non-compliance, when it comes to cyber-security, according to the country's Central Bank," Eugene Gerden reported today in SC Magazine UK more
Today marks the 20th anniversary of the decommissioning of the NSFNET backbone on April 30 1995, an important milestone in the development of the commercial Internet. The NSFNET was set up by the US National Science Foundation in 1985 to enable university researchers access to five supercomputer sites across the United States, using Internet Protocol technology. In stepping back, the NSF supported a transition to an Internet shaped by market forces, and the explosion of commercial use soon followed. more
According to a new security report released today by SANS Institute, TippingPoint and Qualys, the number of vulnerabilities found in applications in the last few years is far greater than the number of vulnerabilities discovered in operating systems. "On average, major organizations take at least twice as long to patch client-side vulnerabilities as they take to patch operating system vulnerabilities. In other words the highest priority risk is getting less attention than the lower priority risk." more
Eric Vyncke reporting in the NetworkWorld: "IPv6 exists for more than 15 years and it is rumored to be deployed extensively in Asia and especially in Japan and China with Africa being the last continent to deploy IPv6. Another place where there should be a lot of deployments is of course in the USA with the US Government IPv6 mandates. But, when it comes to measure where web sites are actually deployed over IPv6, the rumor proves to be just a myth..." more
Kicking off the sixth annual National Cybersecurity Awareness Month this October, the Department of Homeland Security (DHS) has urged computer users to practice good "cyber hygiene". The campaign was given a boost Wednesday when the Senate passed resolution 285 to support its goal to make U.S. citizens more aware of how to secure the internet. DHS has also announced that is has been given new authority to recruit and hire up to 1,000 cybersecurity professionals across the department to fill roles such as: cyber risk and strategic analysis; cyber incident response; vulnerability detection and assessment; intelligence and investigation; and network and systems engineering. more