/ Most Viewed

Beyond Net Neutrality: A Manifesto for Internet Freedom

The Internet's existence within the regulatory system has been a disastrous failure. Network Neutrality is fine as far as it goes. The problem is that it leaves the current abysmal system in place. On my Economics and Architecture of IP Networks Mail list, Erik Cecil has been deconstructing the regulatory system. Bottom line -- the most significant thing that can be done for the citizens of the internet in the US would be for the FCC to declare the internet protocol to be telecommunications and no longer exempt from regulation. more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

Mac Hit by Another Wave of Malware… Users in Denial?

In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? more

Time to Act as Apple Sets Wheels in Motion for Shorter Certificate Life Cycles

You may have read our previous blog about the pending reduction of digital certificate life cycles to just 90 days. This past weekend, the issue gained momentum at the Certification Authority Browser Forum when more detail was discussed following the proposed ballot to set a timeline for shorter lifetime certificates by Apple. This creates real urgency for organizations of all sizes to seriously consider and implement automation into their certificate life cycle management. more

Belarus-Linked Hackers Target Diplomats, Likely With State Support

Foreign diplomats based in Belarus have been under the digital crosshairs of hackers with suspected ties to the Belarusian government for nearly a decade, security researchers revealed on Thursday. more

Netflix Has Buyer’s Remorse Over Its Paid Peering Deal With Comcast

Soon after capitulating to Comcast's surcharge demand for improved treatment of its traffic, Netflix got better downstream delivery speeds. Apparently Comcast did not have to undertake a major bandwidth expansion program. Much to the immediate relief of Netflix, Comcast merely needed to allocate more ports for Netflix traffic. So with a reallocation of available bandwidth, Comcast solved Netflix's quality of service dilemma apparently without degrading service to anyone else, upstream or downstream. more

Radix Wins 3-way Applicant Auction for .website, Donuts wins .lawyer, .fish, .discount

As of today, Innovative Auctions has successfully completed private auctions for a total of 18 contested generic Top-Level Domains, resolving contention for more gTLDs than all other mechanisms combined -- including straight-up withdrawals, private negotiations, and swaps. Here is this week's update. more

First Square Mile is not the Last or First Mile: Discovery not Just Choices!

The term "last mile" highlights the fact that we are the consumers at the end of a broadband "pipe". Saying "first mile" is a little better but the Internet is not a pipe to or from somewhere else. It's about what we can do locally and then what we can do when we interconnect with other neighborhoods. It's better to describe our neighborhood as the first square mile. Telecom is about selling us services; the Internet is about what we can do ourselves locally and then interconnecting with others everywhere. In writing the First Square Mile - Our Neighborhood essay which I just posted I came to better understand the fundamental difference between the world of telecom which is about giving you choices and the Internet which provides opportunity to discover what we can't anticipate... more

UK Government Releases New Cyber Security Standard for Self-Driving Vehicles

UK government today announced the release of a new cyber security standard for self-driving vehicles. Funded by the Department for Transport, the British Standards Institute has developed the guidance to set a marker for those developing self-driving car technologies. more

Two Romanians Charged for Hacking Washington DC Police Computers Linked to Surveillance Cameras

US prosecutors have charged two Romanians with hacking Washington DC police computers linked to surveillance cameras just days before President Donald Trump's inauguration. more

Kentucky and the Gambling Domains

A recent law suit in Kentucky has attracted world-wide attention because it could create a very dangerous precedent – the application of local law to the domain name system and Internet web sites that are available globally... Even though the Kentucky case only involves Kentucky gambling laws, the dangerous precedent is that regimes around the world with oppressive local laws restricting speech or religion might attempt similar litigation. more

US Telecoms Market Further Deteriorating

Some worrying signs are emerging in the USA. During the last decade I have questioned the economic viability of two parallel telecoms infrastructures. When these two network rollouts commenced no issue existed in relation to conflicting interests -- one delivered telephone services, the other broadcasting services. But this all began to change when it became possible to use the HFC network more

Prediction: Google WILL Bid for 700MHz Spectrum and WILL Win

There is an excellent business case for Google bidding megabucks in the upcoming 700MHz auction and investing even more to get a network up and running. I think Google is well aware of the value to them if they win and the harm they'd suffer if the duopoly wins instead. Google can make big bucks with a nationwide third network AND make things better for all Internet users AND improve the United States' pathetic competitive position in the contest for broadband access. Hope this post doesn't end up post-tagged "wishful thinking"... more

The Crimeware Infection Lifecycle

The distribution and installation of malicious and unauthorized software has evolved consistently throughout the 21st Century. The evolutionary path from annoying viruses, to destructive malware and on to financially driven crimeware, is well documented and can even be conveniently traced via the parallel evolution of technologies that were designed to counter each new aspect of the then contemporary threat. more

The IETF’s *Other* Diversity Challenge: An Update

Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more