/ Most Viewed

An Account of the Estonian Internet War

About a year ago after coming back from Estonia, I promised I'd send in an account of the Estonian "war". A few months ago I wrote an article for the Georgetown Journal of International Affairs, covering the story of what happened there. This is the "war" that made politicians aware of cyber security and entire countries scared, NATO to "respond" and the US to send in "help". It deserved a better understanding for that alone, whatever actually happened there. more

ARIN Statement on the Future of Addressing Policy

ARIN has just released a statement on the future of addressing policy. Specifically addressing the future of IPv4 addressing. What ARIN does is to emphasize the current policies and say they will be enforced even stronger than today if needed. I.e. there is no announcement of a change in policy. more

Phishers Increasingly Targeting SaaS and Webmail Services, APWG Reports

According to the latest report from Anti-Phishing Working Group (APWG) while the total number of conventional, spam-based phishing campaigns declined in 2018, users of software-as-a-service (SaaS) systems and webmail services are increasingly targeted. more

Hyper-Volumetric DDoS Attack Sets New Benchmark at 22.2 Tbps

A record-shattering DDoS attack peaking at 22.2 Tbps signals a new era of cyber aggression, driven by weaponized IoT botnets and raising urgent questions about global internet resilience. more

What’s the Best IPv6 Transition Option for You?

After decades of talk, the time for IPv6 has finally arrived. There are several transition options available, but whatever approach you choose, the challenge will be to make sure that your subscribers don't experience a reduction in quality of service. IPv4 is likely to co-exist with IPv6 for some time, so a native dual-stack migration strategy will be the best transition option for most providers... With dual-stack mode, there is no disruption to the service if a client requests an IPv4 address. more

Do We Need The New Top-level Domains?

After a long and exhaustive process it was finally decided by ICANN to introduce seven new top level domains in December. Well, they are not really introduced yet because the United States Government has the final word and they have not approved of them yet. Did you understand what I just wrote - the United States Government decides what names you can have on the Internet? more

It’s Not Enough to Succeed. Others Must Fail.

As the last strike of the clock signals the end of 30 May 2012 there will be quiet relief from the back offices and consultants of most top-level domain name (TLD) applicants. And finally after the drama of the TAS system gremlins we have closure. Still there may yet be squeals of anguish as someone, somewhere got it wrong. A glitch in the applicant's computer, a lost bank transfer, a last minute switch of provider: all may be reasons for failure. ...as the quip attributed to Gore Vidal so aptly put it, "It's not enough to succeed. Others must fail." So lets discuss some additional points of failure. more

Global Internet Traffic to Quadruple by 2015, Reaching 966 Exabytes Per Year

Cisco predicts that the number of network-connected devices will be more than 15 billion, twice the world's population, by 2015. In its Visual Networking Index (VNI) Forecast (2010-2015) report released today, the company also predicts the total amount of global Internet traffic to quadruple by 2015 and reach 966 exabytes per year. more

U.S. Expresses Concerns Over China’s Internet Regulatory Regime, In New Report

The Trump administration has criticized China on a number of trade issues in its Foreign Trade Barriers report including cloud computing restrictions, Voice-over-Internet Protocol (VoIP) and Domain Name Rules. more

New Nails in the Crypto-Anarchism Containment Coffin

Crypto-anarchism (or crypto-anarchy) is a form of anarchy accomplished through computer technology. Crypto-anarchists develop and employ their own cryptographic techniques to prevent knowledge of the information or even the identity of parties communicating over networks. The motivations vary - from just having fun and causing turmoil, to achieving perceived status within a crypto-anarchy community, to furthering socio-economic views about information availability, absolute privacy, political advocacy and spreading anti-government paranoia. more

IBM’s SoftLayer Cloud Infrastructure Service Blocks Cuba - Why Now?

Cachivache Media recently reported that the Bitly URL-trimming service had stopped working in Cuba. Cubans had been using the service for several years, so this resulted in many broken links. Cachivache did not know what had happened, but published a traceroute that timed out at an Akamai router. I contacted Akamai, and they said they could not say anything -- they would only talk with their customers -- Bitly in this case. So I contacted Bitly and had an email exchange with one of their support people. more

Principles for Internet Policy

Of all the candidates for the Democratic nomination, Howard Dean raised the most amount of money over the Internet. On March 15th, the Dean campaign launched the first official weblog in presidential campaign history, six days after Dean himself first stumped in the blogosphere. What follows are Dean's principles for Internet Policy.

This nation -- and not just this nation -- needs to have an honest conversation about what's real, possible and desirable when it comes to the gift of the Internet. Conversations need shared ground. Here are the beliefs we think should guide the development of a fact-based federal policy. We put these forward as part of a continuing Great American Conversation. more

Revisiting How Registrants Can Reduce the Threat of Domain Hijacking

Recent events have shown the threat of domain hijacking is very real; however, it is also largely preventable. As Verisign previously noted, there are many security controls that registrants can utilize to help strengthen their security posture. Verisign would like to reiterate this advice within the context of the recent domain hijacking reports. Domains are an important element of internet infrastructure; their functionality and security rely upon many factors such as their delegated name servers. more

Telesat Update – Proposal for a Larger Constellation, Canadian and DARPA Contracts, IPO and More

I've discussed Telesat's LEO broadband project in earlier posts, but the project has progressed, so an update is needed. The original plan was to launch 117 satellites but that has changed. The phase 1 constellation will now have 298 satellites and the second phase will add 1,373 for a total of 1,671. The revised plan has been submitted to the FCC, and they expect it to be approved next year. more

Hidden in Plain Sight: FCC Chairman Pai’s Strategy to Consolidate the U.S. Wireless Marketplace

While couched in noble terms of promoting competition, innovation and freedom, the FCC soon will combine two initiatives that will enhance the likelihood that Sprint and T-Mobile will stop operating as separate companies within 18 months. In the same manner at the regulatory approval of airline mergers, the FCC will make all sorts of conclusions sorely lacking empirical evidence and common sense. more