/ Most Viewed

Mac Hit by Another Wave of Malware… Users in Denial?

In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? more

Belarus-Linked Hackers Target Diplomats, Likely With State Support

Foreign diplomats based in Belarus have been under the digital crosshairs of hackers with suspected ties to the Belarusian government for nearly a decade, security researchers revealed on Thursday. more

Threats to Internet Oversight Mount as Key Protection Expires

Before the US Government abdicates its oversight of the Internet Corporation for Assigned Names and Numbers (ICANN) it should take a long, hard look at the mounting efforts by world governments to assume greater power over the Internet's addressing system. If those efforts meet no further resistance, the once-theoretical threat of "capture" could become a reality. At the end of September, the Joint Project Agreement (JPA) between ICANN and the US Government is set to expire. The JPA is part of a decade-long agreement where the US transitions control of Internet addressing to ICANN. more

Netflix Has Buyer’s Remorse Over Its Paid Peering Deal With Comcast

Soon after capitulating to Comcast's surcharge demand for improved treatment of its traffic, Netflix got better downstream delivery speeds. Apparently Comcast did not have to undertake a major bandwidth expansion program. Much to the immediate relief of Netflix, Comcast merely needed to allocate more ports for Netflix traffic. So with a reallocation of available bandwidth, Comcast solved Netflix's quality of service dilemma apparently without degrading service to anyone else, upstream or downstream. more

Cybercriminals Shifting Focus From Windows PCs to Other Systems and Mobile

In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, tablet computers, and mobile platforms in general, according to the Cisco® 2010 Annual Security Report, released today. The report also finds that 2010 was the first year in the history of the Internet that spam volume decreased, that cybercriminals are investing heavily in "money muling," and that users continue to fall prey to myriad forms of trust exploitation. more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

First Square Mile is not the Last or First Mile: Discovery not Just Choices!

The term "last mile" highlights the fact that we are the consumers at the end of a broadband "pipe". Saying "first mile" is a little better but the Internet is not a pipe to or from somewhere else. It's about what we can do locally and then what we can do when we interconnect with other neighborhoods. It's better to describe our neighborhood as the first square mile. Telecom is about selling us services; the Internet is about what we can do ourselves locally and then interconnecting with others everywhere. In writing the First Square Mile - Our Neighborhood essay which I just posted I came to better understand the fundamental difference between the world of telecom which is about giving you choices and the Internet which provides opportunity to discover what we can't anticipate... more

RIPE NCC is Reaching the Last /8 of IPv4

In an earlier article, IPv4 - Business As Usual, we pointed out that the RIPE NCC will reach the last /8 of IPv4 address space (16,777,216 addresses) sometime later this year. On Friday, 14 September 2012 we reached this important milestone; we allocated the last IPv4 addresses from the unallocated pool. From now on, the RIPE NCC can only distribute IPv6 addresses and a one-time /22 IPv4 allocation from the last /8 to those Local Internet Registries (LIRs) that meet the requirements. more

Prediction: Google WILL Bid for 700MHz Spectrum and WILL Win

There is an excellent business case for Google bidding megabucks in the upcoming 700MHz auction and investing even more to get a network up and running. I think Google is well aware of the value to them if they win and the harm they'd suffer if the duopoly wins instead. Google can make big bucks with a nationwide third network AND make things better for all Internet users AND improve the United States' pathetic competitive position in the contest for broadband access. Hope this post doesn't end up post-tagged "wishful thinking"... more

The IETF’s *Other* Diversity Challenge: An Update

Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more

Exploring Future Internet Architectures

UCLA and Washington University in St. Louis recently announced the launch of the Named Data Networking (NDN) Consortium, a new forum for collaboration among university and industry researchers, including Verisign, on one candidate next-generation information-centric architecture for the Internet. Verisign Labs has been collaborating with UCLA Professor Lixia Zhang, one of the consortium's co-leaders, on this future-directed design as part our university research program for some time. more

US Telecoms Market Further Deteriorating

Some worrying signs are emerging in the USA. During the last decade I have questioned the economic viability of two parallel telecoms infrastructures. When these two network rollouts commenced no issue existed in relation to conflicting interests -- one delivered telephone services, the other broadcasting services. But this all began to change when it became possible to use the HFC network more

Maslow’s Hammer Meets the Software Defined Data Center

In my previous post, I talked about the significance of DNS in connection with the Software Defined Data Center (SDDC) and Software Defined Networking. Although the second generation DNS provisioning model I outlined should have seemed straight-forward enough, in real life it is anything but. In my view, the real-world complications of a seemingly trivial issue are largely related to how the network industry approaches IP addressing. more

Kentucky and the Gambling Domains

A recent law suit in Kentucky has attracted world-wide attention because it could create a very dangerous precedent – the application of local law to the domain name system and Internet web sites that are available globally... Even though the Kentucky case only involves Kentucky gambling laws, the dangerous precedent is that regimes around the world with oppressive local laws restricting speech or religion might attempt similar litigation. more

Global Payments Breach Confirmation

This morning, Global Payments held a conference call with investors and analysts covering their earlier breach announcement and projected earnings. Global Payments had also released an update advisory yesterday stating that "the company believes that the affected portion of its processing system is confined to North America and less than 1,500,000 card numbers have been exported" and that only Track 2 card data may have been stolen. more