/ Most Viewed

Researchers Demonstrate How Smart Bulbs Can Be Hacked to Cause Mass Disruptions

A team of researchers have released a report detailing a new type of threat in which adjacent IoT devices, such as Internet-connected light bulbs, will infect each other with a worm that will spread explosively over large areas in a kind of nuclear chain reaction. more

Blacklist Operations and Practices: Excerpts from an ASRG Draft

The Anti-Spam Research Group (ASRG) published a draft for an Overview of Email DNSBL Best Practices. We can take a step back and review paragraph 2.2.5 (Conflict of Interest)... Some DNSBLs used for blocking/negative reputation have had a practice of requiring fees or donations to charities from the listee for delisting. It is generally considered entirely appropriate for a DNSBL to charge for access to it by its users -- the definition of a commercial DNSBL. more

How to Suspend a .US Domain Name

Although rarely used, the usTLD Rapid Suspension Dispute Policy (usRS) allows a trademark owner to seek the suspension of a domain name in the .us country-code top-level domain (ccTLD). The usRS has many things in common with the Uniform Rapid Suspension System (URS), which applies to domain names in the new generic top-level domains (gTLD). more

FCC Ends Inquires Into “Zero Rating” Programs

"AT&T and Verizon just got a free pass from the FCC to divide up the internet," Colin Lecher reporting in The Verge. more

Gigabyte Motherboard Firmware Exposes Millions of PCs to Potential Cybersecurity Threats

In a potentially damaging cybersecurity revelation, researchers from the cybersecurity company Eclypsium have identified a hidden mechanism in the firmware of motherboards manufactured by Taiwanese company Gigabyte. more

New EU Satellites to Protect Government Communications, Provide Connectivity and Surveillance

A new network of European telecommunication satellites will be active from 2024, following the green light by European Parliament. The Infrastructure for Resilience, Interconnectivity and Security by Satellite project is aimed at providing a secure communications infrastructure for EU government bodies and agencies, emergency services and European delegations around the world. more

New Cyberthreats: Have You Been Exposed at Home?

There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more

ICANN - A Catalyst for Development

In 1998 the idea of "Newco," ICANN's informal predecessor name, was dreamlike. It was so new, so unprecedented, that it was constantly being referred to as an "experiment." It was not every day that one came across an organization conceived by one nation (e.g., the U.S.), that was available for globally shared ownership. One that was defined, in large part, by international participation. more

Clash Over Dot-Amazon During the ICANN Meetings in Abu Dhabi

Government representatives from several countries in the Amazonas region clashed with a team of lawyers and communication officers of the global retailer Amazon over the top-level domain .amazon during the Annual Meeting of the Internet Corporation For Assigned Names Numbers (ICANN) in Abu Dhabi today. more

Data Quality in the RIPE NCC Service Region

In an earlier article on CircleID, Registry Data Quality Assessment, we discussed the importance of high quality and accurate IP registry data. At that time, we focused mainly on the accuracy of legacy address space: IP addresses that were given out prior to the existence of the RIPE NCC and that are not part of the current registry system. In this article, we want to present the efforts to keep the address space that is the responsibility of the RIPE NCC up to date and well maintained. more

The Growing Rate of Standalone Broadband Adoption

Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more

One More Trump 5G Minefield

As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more

Net Neutrality, Slippery Slopes &  High-Tech Mutually Assured Destruction

Ten years ago, Nobel Prize-winning economist Milton Friedman lamented the "Business Community's Suicidal Impulse:" the persistent propensity to persecute one's competitors through regulation or the threat thereof. Friedman asked: "Is it really in the self-interest of Silicon Valley to set the government on Microsoft?" After yesterday's FCC vote's to open a formal "Net Neutrality" rule-making, we must ask whether the high-tech industry -- or consumers -- will benefit from inviting government regulation of the Internet under the mantra of "neutrality." more

Content vs Carriage – Who Pays?

There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more

Nerd Knobs and Open Source in Network Software

Tech is commoditizing. I've talked about this before; I think networking is commoditizing at the device level, and the days of appliance-based networking are behind us. But are networks themselves a commodity? Not any more than any other system. We are running out of useful features, so vendors are losing feature differentiation. This one is going to take a little longer... more