/ Recently Commented

White Spaces: The NAB vs. Reality

One of Washington's most powerful corporate lobbies is at it again. Raising a dust cloud of lies in a last-ditch effort to stop new technology that could better the lives of millions. For more than five years, now, the television broadcast lobby has tried to deny the American public access to white spaces -- unused airwaves that sit vacant between TV channels. Technology now exists that would tap the near limitless potential of these airwaves and deliver high-speed Internet services to tens of millions of people now left on the wrong side of the digital divide. more

Beyond White Spaces

Back in 1999 I wrote a column that envisioned the uses of digital wireless in the home. I compared two nascent, much-touted wireless protocols, Bluetooth and HomeRF. I completely, totally, slippery-dash missed Wi-Fi. There had been a public 802.11 spec since 1997. The first 802.11b devices, which made Wi-Fi popular, burst onto the scene in early 2000, just a few short months after my clueless insights. Today HomeRF is forgotten, Bluetooth is for ugly ear jewelry and Wi-Fi rulz... more

Photos of Google’s Latest $600 Million Data Center

Earlier this month, Google officially opened its new data center in South Carolina which was first reported during April of 2007 when the company announced its plans to invest $600 million in the project. This data center is one of the four new data center projects announced by Google last year with other locations being Lenoir, North Carolina; Council Bluffs, Iowa and Pryor, Oklahoma. more

Energy Industry Number One Target by Cyber Criminals, According to New Study

Web security company, ScanSafe reports that, in the past quarter, companies in the Energy industry faced the greatest risk of Web-based malware exposure, at a 196% heightened risk compared to other verticals. The Pharmaceutical and Chemicals industry faced the second highest risk of exposure at 192% followed by the Construction & Engineering industry at 150%. The Media and Publishing industry were also among those at highest risk, with a 129% heightened risk compared to other verticals. more

Are Domain Names Recession Proof?

We'll only be able to tell whether domain names are recession proof by waiting for the performance of e-commerce sites during the holiday shopping season. Domain name owners and buyers have to remain in suspense a while longer. Some domainers are experiencing drops in sales and prices. However, it is not clear whether those drops are because of changes in valuations by buyers, sellers, or both. more

The Growing Security Concerns… Don’t Have Nightmares

Anyone concerned about the security of their computers and the data held on them might sleep a little uneasily tonight. Over the past few weeks we've heard reports of serious vulnerabilities in wireless networking and chip and pin readers, and seen how web browsers could fall victim to 'clickjacking' and trick us into inadvertently visiting fake websites. The longstanding fear that malicious software might start infecting our mobile phones was given a boost... And now a group of researchers have shown that you can read what is typed on a keyboard from twenty metres away... more

IT Security Guide: “Financial Impact of Cyber Risk” Released by ANSI and ISA

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) released today a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack. In 2004, the Congressional Research Service estimated the annual economic impact of cyber attacks on businesses -- which can come from internal networks, the Internet or other private or public systems -- to be more than $226 billion. In 2008, U.S. Department of Homeland Security Secretary Michael Chertoff named cyber risks one of the nation's top four priority security issues. more

$300 Million Annual Loss Due to Non-Cooperation in Fight Against Phishing

During a presentation today at the eCrime Researchers Summit in Atlanta, Georgia, security researchers revealed that average lifetime of malicious websites are often longer than they should be due to lack of communication and cooperation between security vendors. According to results, website lifetimes are extended by about 5 days when "take-down" companies -- often hired by Banks -- are unaware of the site. "On other occasions, the company learns about the site some time after it is first detected by someone else; and this extends the lifetimes by an average of 2 days," says Richard Clayton. more

Cyber Security Forecast for 2009: Data and Mobility Key Part of Emerging Threats

Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more

White Spaces News… Interesting First Step

When the U.S. Digital Television Transition (DTV) transition happens in Feb. 2009, channels 2 through 51 will remain allocated for television transmission. Few of the nation's television markets actually use 49 channels. Indeed, most use less than half of that number... Today, with Congress in recess, leaving less room for last-minute-Lucy-with-the-football lobbying gambits, the Federal Communications Commission (FCC) appears to be poised to release a report saying the white spaces can be used without necessarily causing interference to existing broadcasts. There are still many questions to be answered... more

My Name is Vint Cerf, I’m a Scientist and I am Voting for Barack Obama

Vint Cerf, Google’s Chief Internet Evangelist who is also credited as the co-founder of the Internet, has endorsed U.S. presidential candidate Barack Obama in a YouTube video submitted to AVoteForScience channel. In the video, Cerf discusses the importance of Net Neutrality (NN) and the fact that Obama is the candidate that supports NN. The following excerpt is a portion of what Cerf says in the video... more

Largest Spam Gang Operation in the World Shutdown by U.S. and New Zealand Authorities

U.S. authorities announced today that they have shut down one of the largest spam operations in the world, an extensive network with ties to Australia, New Zealand, India, China and the United States. The group, dubbed 'HerbalKing' by spam fighting organizations, had been active as far back as 2005 and became notorious as the number one worst spam gang on the Internet for much of 2007 and 2008 according to Spamhaus, a non-profit anti-spam research group. more

U.S. Department of Commerce Seeking Public Comments for Deployment of DNSSEC

During a conference, "Internet of Things," in France, the U.S. Department of Commerce made the announcement that it will hold a public consultation on the different proposals to cryptographically sign the DNS root zone file, and determine who will hold the root zone trust anchor for global DNSSEC implementation, says Milton Mueller on the Internet Governance Forum blog. The blog, titled "Commerce Department asks the world to comment on its plans to retain control of the root," continues... more

Research Firm Predicts 22.4 million IPTV Subscribers by 2013 in Asia-Pacific

New analysis from Frost & Sullivan research firm suggests that the IPTV subscriber base in Asia-Pacific -- covering 13 countries -- reached 4.1 million in 2007 and estimates this number to reach 22.4 million by the end of 2013, at a CAGR (compound annual growth rate) of 32.7 percent (2007-2013). Of the 13 countries, eight had commercial IPTV services in 2007, while the rest are conducting trials for expected deployments from 2009 onwards, according to the report. "Many service providers feel the urge to launch IPTV services as a defensive strategy to increase their 'n-play' offerings with one more service." more

Peering into Fast Flux Botnet Activity

Together with Thorsten Holz, I recently published a paper on fast flux botnet behaviors, "As the Net Churns: Fast-Flux Botnet Observations," based on data we gathered in our ATLAS platform. Fast flux service networks utilize botnets to distribute the web servers to the infected PCs... One of the most well known fast flux botnets has been the Storm Worm botnet, which uses the zombies to spam, send out new enticements to infect users, and to host the malicious website which delivers the malcode. more