/ Most Commented

What Mobile Malware Looks Like

Last month at the Virus Bulletin Conference in Barcelona, I took in one of the sessions on mobile malware. This type of malware is foreign to me because I mostly stay in the email space at work (and even then, I am focusing more on day-to-day issues of running a large mail provider than I am on spam and abuse). What's mobile malware like? What are the threats? How do users get infected? more

Biggest Botnet Takedown to Date

Yesterday law enforcement officials arrested 6 people and charged them with running a massive internet fraud ring. Over 4 million PCs were part of the botnet. According to the FBI, "the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA." more

Mega International DNS Malware Operation Dismantled, Reports FBI

FBI today announced six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised -- or that the malicious software rendered their machines vulnerable to a host of other viruses. more

Comcast Begins Pilot Market Deployment of IPv6

Comcast is now the first large ISP in North America to start deploying IPv6. According to the company, this initial phase will support certain types of directly connected customer premises equipment (CPE), where a single computer is connected directly to a cable modem. "Subsequent phases in 2011 and 2012 will support home gateway devices and variable length prefixes." more

IPv6 RIPEness: More Smaller and Younger Organizations Deploying IPv6

The number of RIPE NCC members [also referred to as Local Internet Registries (LIRs)] that have an IPv6 allocation continues to grow -- in absolute terms as well as in percentages. 46% of all RIPE NCC members have one or more IPv6 RIPEness stars. ... Do new members pick up IPv6? Are older members with more experience, well-established businesses and customer base dominating IPv6 RIPEness scores? And what about the size of a member? Are small and large members adopting IPv6 in equal proportions? In this article we look into answering these questions. more

The Impressive Growth in Global Internet Stats (2011)

The ITU launched its latest statistics report, the World in 2011: ICT Facts and figures, which revealed impressive growth in a number of areas such as global internet use, particularly in developing countries. The report included further key details such as: "One third of the world's population are forecast to be online by the end of 2011..." more

ICANN: The Stakes in Registrar Accreditation

Law enforcement demands to domain name registrars were a recurring theme of the 42d ICANN public meeting, concluded last week in Dakar. The Governmental Advisory Committee (GAC) took every opportunity at its public meetings with GNSO and Board, and in its Communique to express dismay, disappointment, and demands for urgent action to "reduce the risk of criminal abuse of the domain name system." more

Professional Services Are a Safe Bet to Address Staff Shortages

Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more

RIPE Members Vote To Continue RPKI Work

RIPE 63 is on this week in Vienna, Austria. Yesterday evening saw the General Meeting where members were asked to vote on a number of motions. While some of the motions were more formalities than anything else, the votes on RPKI and the membership fee structure for 2012 provoked some emotive debate. more

EU and US Carry Out First Joint Cyber Security Exercise

The first joint cyber security exercise between the EU and US is being held today in Brussels, with the support of the EU's cyber security Agency ENISA and the US Department of Homeland Security. The day-long table-top exercise, named "Cyber Atlantic 2011", is using simulated cyber-crisis scenarios to explore how the EU and US would engage each other and cooperate in the event of cyber-attacks on their critical information infrastructures. more

Reports of Possible Cyberattack in Palestine

According to reports today, hackers have attacked Palestinian servers, cutting off phone and Internet service across the West Bank and Gaza. Foreign governments are accused to be behind the attack. "Since this morning all Palestinian IP addresses have come under attack from places across the world," said the Palestinian communications minister today. Reneys reports these outages are the largest observed all year for this country, which normally has a fairly stable Internet. more

The Governance of the Internet

Among the hottest topics at the Broadband Leadership Summit, which was held during the ITU Telecom World 2011 in Geneva, were the issues in relation to the security of the various aspects of the digital economy. The key issue in relation to the governance of the internet relates to the many political, social and cultural differences between countries. This is one of the most contentious issues. more

Four Promises ICANN Must Meet with New Top-Level Domains

Just back from a week of ICANN meetings in Dakar. Is it just me, or is the new top-level domain program starting to feel like a TLD triathlon, where everyone's now jockeying for position in the final stage -- a grueling marathon? When ICANN's board approved the new gTLD plan in Singapore, it came with the promise of small but substantive changes to improve the program. I hope that wasn't empty rhetoric... more

Nitro Attacks Target the Chemical Industry

New security report has revealed at least 48 companies involved in research, development, manufacturing of chemicals and advanced materials have been victims of a coordinated cyberattack traced to a source in China. The purpose of the attacks, code named Nitro, appear to be industrial espionage, collecting intellectual property for competitive advantage, according to Symantec. more

New Threats Demand a New Approach to DDoS Protection

In the past 24 months, distributed denial of service (DDoS) attacks have changed profoundly. Gone are the days when attackers worked under the radar, when machines were infected by botnet code unknowingly and attacks were disguised leaving very little to trace the exact origin. ... The other game-changer: It's easier than ever to execute attacks. The tools are so widely available that anyone with basic skills and a high-speed connection can become a "hacktivist." more