/ Most Viewed

DNS Insecurity

The Internet as we know it and use it today -- is broken, badly broken. Yes broken so much so that we are really crazy to have any expectations of privacy or security. Yes, really. The Internet was conceived as somewhat of a utopian environment, one where we all keep our doors, windows and cars unlocked and we trust all the people and machines out there to "do the right thing...". more

Businesses Beware: Cybersecurity Awareness Varies Based on Job Function

Businesses should consider bumping phishing as an urgent concern in their cybersecurity agendas. To those still unacquainted, "phishing" refers to the use of fake emails, messages, and websites that fool users into giving up access to accounts and information or into installing malware through attachments. It has become quite rampant over recent years. Attackers are using the method as a primary means to breach defenses, and with good reason: they work. more

Beyond the Interweb

Today's Internet is a network of networks and seen through the lens of the web. We need to look beyond the engineering history to see the Internet in the context of the broader vision of JCR Licklider, an acoustic psychologist, and his vision of man/computer symbiosis... JCR Licklider would've been thrilled to see such a powerful man-machine symbiosis becoming so normal and having it work so well. Lick, as he was called, can be considered the grandfather of the Internet. more

Ottawa Committed to Overturn CRTC Decision on Usage-Based Internet Billing

Canadian Industry Minister Tony Clement has announced that the Harper government will overturn the CRTC's decision that effectively ends "unlimited use" Internet plans if the regulator doesn't rescind the decision itself. more

IPTV Subscriptions to Grow 64% Worldwide in 2008

Worldwide subscriptions to internet Protocol television (IPTV) services are on pace to reach 19.6 million subscribers in 2008, a 64.1 per cent increase from 12 million subscribers in 2007, according to research company, Gartner, Inc. Worldwide IPTV revenue is projected to total $4.5 billion in 2008, a 93.5 per cent increase from 2007 revenue of $2.3 billion. In 2008, 1.1 per cent of households worldwide will be subscribers of IPTV. By the end of 2012, Gartner forecasts worldwide household penetration of IPTV will be 2.8 per cent, while worldwide IPTV revenue is expected to total $19 billion in 2012. more

Why the Fukushima Analogy Was Apt

A few days ago, CAUCE published a blog post entitled "Epsilon Interactive breach the Fukushima of the Email Industry" on our site, and the always-excellent CircleID. A small coterie of commenters was upset by the hyperbolic nature of the headline. Fair enough, an analogy usually has a high degree of probability that it will fail, and clearly, no one has died as a result of the release of what appears to be tens of millions of people's names and email addresses. But, the two situations are analogous in many other ways, and here's why. more

Dave Crocker and John Levine Discuss Current Dealings With Spam (Video)

During the M3AAWG meeting in Brussels earlier this year, Dave Crocker and John Levine were asked to step into an impromptu video studio and talk about how email has changed over the past several decades and whether we are any closer to resolving the spam problem. more

Al-Jazeera, HuffPost Arabi Among 21 News Sites Blocked by Egypt, Plus Possible Legal Action

At least 21 news sites critical of the government in Egypt, including the Qatari channel Al-Jazeera and Huffington Post’s Arabic-language site HuffPost Arabi, have been blocked. more

Cloud Services Drive Data Center Markets

Research from Infonetics shows that last year was a strong year for data centre network equipment sales, due to a rebound from bare-bones 2009 spending levels and, more importantly, fundamental trends favouring investments in the data centre, such as the explosion of content and traffic, use of virtualization, and increasingly, cloud-based services and architectures. more

About That Second, Third and Fourth Wireless “Attachment”

There is some good news about the decision by Verizon Wireless to offer shared monthly data plans. But there could be a lot more if the FCC applied its Carterfone policy. That policy gave consumers the power to decide what and how many devices to attach to a network connection. If Carterfone applied, consumers could use multiple devices to access a network subscription, albeit perhaps not at the same time. more

The Use of AI in the Domain Name Industry

Artificial intelligence has important uses in the domain name industry. With the use of AI, domain name registration, management, and valuation have been made more efficient and accurate. Here are some specific ways AI is affecting domain names... AI-powered domain name generators can suggest relevant and available domain names based on specific keywords, making the search process easier and faster. more

Why Passive DNS Matters in Cybersecurity

Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more

Live Data Visualization of DDoS Attacks

Google Ideas in collaboration with Arbor Networks has released a data visualization that maps daily, global DDoS attacks. The tool shows anonymous data linked to these attacks, allowing users to explore historical trends and make the connection to related news events. "The data is updated daily, and historical data can be viewed for any country worldwide." By surfacing this data and providing insights on the global patterns of DDoS attacks, the companies hope that more informed decisions can be made that can reduce the threat of digital attacks. more

Restricting Anti-Virus Won’t Work

In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more

Update on IPv6 Address Distribution in the RIPE NCC Service Region

At the recent RIPE Meeting we presented some IPv6 address distribution statistics that we would like to share with a wider audience. In the article below, you can find recent statistics on IPv6 allocations and assignments. The first image shows the number of IPv6 allocations the RIPE NCC made to LIRs in each quarter, starting in 2008... Each year is depicted in a different colour, the last one showing the number of allocations made in Q3 2012. more