/ Recently Commented

Latvian ISP Closure Dents Cutwail Botnet ...for a Whole 48 Hours

From MessageLabs' latest report: "Real Host, an ISP based in Riga, Latvia was alleged to be linked to command-and-control servers for infected botnet computers, as well as being linked to malicious websites, phishing websites and 'rogue' anti-virus products. Real Host was disconnected by its upstream providers on 1 August 2009. The impact was immediately felt, where spam volumes dropped briefly by as much as 38% in the subsequent 48-hour period. Much of this spam was linked to the Cutwail botnet, currently one of the largest botnets and responsible for approximately 15-20% of all spam. Its activity levels fell by as much as 90% when Real Host was taken offline, but quickly recovered in a matter of days." more

Apparently Legitimate Estonian ISP Operating as Large Cybercrime Hub Since 2005

An apparently legitimate ISP in Tartu, Estonian is reported to have been serving as the operational headquarters of a large cybercrime network since 2005 according to TrendWatch, the security research arm of TrendMicro. "An Estonian company is actively administering a huge number of servers in numerous datacenters, which together form a network to commit cybercrime. It appears that the company from Tartu, Estonia controls everything from trying to lure Internet users to installing DNS changer Trojans by promising them special video content, and finally to exploiting victims' machines for fraud with the help of ads and fake virus infection warnings..." more

Genachowski: FCC Will Enforce Net Neutrality and Watch Any Violations of Principles

US Federal Communications Commission (FCC) Chairman Julius Genachowski today reaffirmed his commitment to network neutrality and said that the FCC will go after anyone who violates its tenets. "One thing I would say so that there is no confusion out there is that this FCC will support net neutrality and will enforce any violation of net neutrality principles," said Genachowski told The Hill newspaper when asked what he could do in his position to keep the Internet fair, free and open to all Americans. more

ICANN Regional Meeting and More Questions on nTLDs

Congratulations and thanks to ICANN for hosting the North America Regional meeting at the Sheraton in downtown Toronto, Canada. This event was done first class and was in my opinion a highly successful meeting... At this regional ICANN meeting many interesting topics were covered. Some topics though not at the foremost of my mind, surprisingly were not only highly interesting but very informative. more

Broadband Giants Stay Neutral on Network Funding

It looks as if the big boys like AT&T, Verizon and Comcast are passing on the stimulus money. The official reason is that they don't need it, that they enough cash on hand to build out their networks on their own. Fair enough. Perhaps the funding should be reserved for those more in need, those that just need a boost to fund a new business model or expand service. But there are probably other reasons. more

FCC Requests Comments on Definition of “Broadband”  - Comments Due Aug 31; Replies Due Sept 8

The FCC is engaged in researching and preparing a National Broadband Plan which is due to Congress in February 2010. The FCC has released a Notice of Inquiry soliciting comments for the plan and is currently actively holding a lengthy series of workshops exploring the different aspects of what might go into the plan. more

Pew Looks at the State of Online Music Ten Years After Napster

Pew Internet reporting on the 10th anniversary of the Napster's launch: "As researchers look back on the first decade of the 21st Century, many will no doubt point to the formative impact of file-sharing and peer-to-peer exchange of music on the internet. Distributed networks of socially-driven music sharing helped lay the foundation for mainstream engagement with participatory media applications. Napster and other peer-to-peer services "schooled" users in the social practice of downloading, uploading, and sharing digital content, which, in turn, has contributed to increased demand for broadband, greater processing power, and mobile media devices." more

ICANN Must Simultaneously Reveal TLD and Second-Level Registration Rules

I outline two possible drawbacks with the idea of first revealing rules for the new proposed Top-Level Domains (TLDs) and then for second-level registrations. I propose a lottery process to initially allocate second-level domain names. A number of people have voiced concerns about the idea of automatically granting the winner of the TLD a monopoly power over second-level domain registrations. We should also be worried about the financial interest ICANN has in not providing the rules for the two-level registrations simultaneously. more

Are Phishing and Malware Separate Threats?

Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more

Downloading is Not Enough… Probably

Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more

Comment on the Kleiman/Komaitis Proposal on Multiple IP Clearinghouses for the New gTLD Process

I recently learned about a meeting that took place between ICANN staff and Noncommercial Users Constituency (NCUC) members Kathy Kleiman and Konstantinos Komaitis regarding the Implementation Recommendations Team (IRT) recommendations for the protection of intellectual property rights in new generic Top-Level Domains (gTLDs). My comment relates to the White Paper published by Ms. Kleiman and Mr. Komaitis with respect to the notion of having multiple Regional Trademark clearinghouses (TMCs). For the reasons stated in this comment, the KK Proposal fails a number of the benchmarking checklists used by the IRT in evaluating proposals. more

DotEco Bids Heat Up - Catfight Anyone?

The new Top-Level Domain (TLD) process is occupying a lot of people in the domain name industry at present. While some people are obviously very much against the entire concept of new TLDs, there are plenty of people and organisations who support the project. But what happens when you have more than one organisation vying for the same namespace? ...Seemingly the competition between two rival bids for .eco (doteco) has been getting more than a little dirty in the past few weeks. more

Google Voice Dispute Highlights an Opportunity for Mobile Network Operators

The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more

Twitter, DDoS and the Motivations Behind the Attack

As we all know by now, last week, on Thursday, August 7, Twitter was hit with a denial-of-service attack that took it down for several hours. Other social networking sites like Facebook, LiveJournal, Youtube and Blogger were also hit. They managed to repel the attack although Facebook was not quite as successful as the other larger players. The theory floating about at the moment is that this was a politically oriented play designed to target one guy: a blogger. We are nearing the 1-year anniversary of a the Russian/Georgian 2008 war. There is a pro-Georgian blogger by the username of "Cyxymu" who had accounts on all of these services. more

Google Reveals New “Secret” Web Search Project

In a blog post by Google's Sitaram Iyer, Staff Software Engineer, and Matt Cutts, Principal Engineer, a "secret project" has been revealed in an effort where the company is aiming to enhance various key aspects of its web search technology including indexing speed, accuracy, and comprehensiveness. The company so far has released the new engine "under the hood," for testing and feedback only and says most users will not notice a difference in search results. more