Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more
Much of rural America with very low population density, depends on small wireless carriers for their internet access as AT&T, T-Mobile and other large providers have no interest in providing services. more
A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more
If you read this blog, you've probably heard by now about the massive Twitter hack. Briefly, many high-profile accounts were taken over and used to tweet scam requests to send Bitcoins to a particular wallet, with the promise of double your money back. Because some of the parties hit are sophisticated and security-aware, it seems unlikely that the attack was a straightforward one directly on these accounts. more
The .emarat Arabic script Internationalised Domain Name (IDN) ccTLD for the United Arab Emirates has been entered into the DNS Root Zone and is therefore now resolving. This is a truly historic moment in the development of the Internet in the United Arab Emirates and the wider Arabic-speaking world as it removes the last hurdle preventing people without English-language skills from enjoying the full benefits that the Internet has to offer. more
There is a germ of truth (perhaps a prion-sized germ or maybe just an amino acid) in the idea that transmitters in "white spaces" in the TV band *might* disrupt patient monitoring equipment if designed by a lunatic who believes in sending massive pulses of energy in a whitespace in the TV band (perhaps amplified by a large parabolic dish antenna the size of a trashcan lid or larger, aimed at the patient monitor system. But that risk is completely shared with zillions of other potential radiators of energy in the entire electromagnetic spectrum... GE, of course, owns NBC. There is a MAJOR conflict of interest at the corporate level of GE... more
This is the question being asked all across the industry as the volume of data traffic has leaped upward due to students and employees working from their homes. We got our first glimpse of the impact of the crisis when Verizon announced a week into the crisis that they were seeing a 22% increase in data traffic in their network. More recently, AT&T announced a 27% increase in network traffic. more
"DotConnectAfrica's attempt to have ICANN legally blocked from delegating the .africa gTLD to rival applicant ZACR has been denied," Kevin Murphy reporting in Domain Incite. more
Today, the Biden Administration released the National Cybersecurity Strategy, which outlines the use of all available resources to protect the United States' security, safety, and economic prosperity. more
A team of developers including .SE (The Internet Infrastructure Foundation), LNetLabs, Nominet, Kirei, SURFnet, SIDN and John Dickinson have come together to create open source software, called OpenDNSSEC, to make it easier to deploy DNSSEC. Patrik Wallström, responsible for DNSSEC at .SE comments: "In order to spread the use of DNSSEC to an increased number of domain names, the management surrounding this technology must be simplified. Together with a number of collaborators, we're developing OpenDNSSEC. Leveraging our deployment experience, we will produce a well-packaged, easy-to-use and flexible DNSSEC tool that eliminates all manual procedures. Those in charge of name servers no longer need detailed knowledge about the protocol in order to use it." more
For generations, large pockets of Africa were isolated from things many of us take for granted: access to medical treatment and advances that can make the difference between a healthy, productive life or debilitating illness -- or even an early death. These problems still persist, but over the last two decades technology has helped break through and enable medical professionals to reach the poorest and most remote populations and offer some hope. more
Chinese President, Xi Jinping, in response to concerns about China's new Internet regulations and restrictions, says "rule of law also applies to the Internet, with the need to safeguard a country's sovereignty, security and development interests as relevant as in the real world." more
A fresh & transparent, community-led, bottom-up, public debate has now become unavoidable and undeferrable. "....we need limited and smart regulation" were the clear and unambiguous words of UN Secretary-General Antonio Guterres at the launch of the final report of his UN Panel on Digital Cooperation last week in New York. Last November, I wrote about President Macron throwing down the gauntlet at UN IGF Paris challenging IGF and Multistakeholderism to become more relevant. more
In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more
eco's topDNS initiative and AV-Test are publishing monthly reports to help ISPs detect and mitigate DNS abuse by analysing malware, phishing, and PUA trends, creating a long-term data foundation for industry-wide transparency. more