/ Most Commented

New Anti-phishing Initiative Introduced by Yahoo!

Neil Schwartzman writes to report: "The company announced the Yahoo! Mail Anti-Phishing Platform (YMAP) yesterday. The technology is predicated upon the use of both DKIM and Sender Policy Framework (SPF) to identify authentic messages. As part of the initiative, Yahoo! has partnered with email authenticators Authentication Metrics, eCert, Return Path, and Truedomain to provide broad-band coverage of well-known brands." more

Google Starts Experimental Fiber Network Rollout With Kansas City

Google today announced plans to build ultra high-speed broadband service to a selected community in the U.S. as part of its experimental fiber network. In its announcement via a blog post, the company says: "In selecting a city, our goal was to find a location where we could build efficiently, make an impact on the community and develop relationships with local government and community organizations. We've found this in Kansas City. We'll be working closely with local organizations including the Kauffman Foundation, KCNext and the University of Kansas Medical Center to help develop the gigabit applications of the future."
 more

Stumbling Forward Means Promoting IDNs

A couple of weeks ago during the 40th ICANN meeting in San Francisco I got up to talk at the microphone. I spoke about the needs of developing markets on the web, about the importance of focusing on the 56% of the world that doesn't use Latin character scripts and about the struggles they still face as they go about their everyday lives - chatting, shopping or when pushed, promoting regime change - all using the internet... more

FedRAMP: Critical to Cost-Effective Cloud Computing Cybersecurity

In September 2009, the Obama Administration announced the Federal Cloud Computing Initiative. As the government's CIO explained, cloud computing "has the potential to greatly reduce waste, increase data center efficiency and utilization rates, and lower operating costs." The Federal Risk and Authorization Management Program (FedRAMP) addresses the key elements of a cloud computing framework for federal agencies. more

Who Has Taken Over As the Most Prolific Botnet Since Rustock Was Taken Down?

Over at the site V3.co.uk, they have an article up today alleging that since the Rustock takedown two weeks ago, the bagle botnet has moved to take over as the botnet that is responsible for sending the most spam. They have not replaced Rustock's total spam volume, only that they are now the number one spam sending botnet. more

Cloud Services Drive Data Center Markets

Research from Infonetics shows that last year was a strong year for data centre network equipment sales, due to a rebound from bare-bones 2009 spending levels and, more importantly, fundamental trends favouring investments in the data centre, such as the explosion of content and traffic, use of virtualization, and increasingly, cloud-based services and architectures. more

Amount of Unsolicited Internet Traffic Reflecting Situation in Libya

During the recent political unrest in the Middle East, researchers have observed significant changes in Internet traffic and connectivity. Typically people look at routing data, latencies when connecting to sites and search and query statistics. Here we show results from a previously unused source of data: unsolicited Internet traffic arriving from Libya. The traffic data we captured shows distinct changes in unsolicited traffic patterns since 17 February 2011. more

.XXX Exposes the Naked Truth for ICANN

Internet governance can be a little on the dry side. So when tech policy reporters get a chance to write an ICANN story that features porn stars on picket lines, it's hard to blame them when they run with it. But all the media hype about ICANN's .xxx decision at last week's meeting in San Francisco exposed the real dilemma facing ICANN: how to engage governments in a multi-stakeholder model that's led by the private sector. more

Death of the PKI Dragons?

The recent attack on the Comodo Certification Authority has not only shown how vulnerable the current public key infrastructure is, but also that the protocols (e.g., OSCP) used to mitigate these vulnerabilities once exploited, are not in use, not implemented correctly or not even implemented at all. Is this the beginning of the death of the PKI dragons and what alternatives do we have? more

Old Cloud vs. New Cloud

Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more

Microsoft Offers $7.5 Million to Buy 666,624 IPv4 Addresses

Jaikumar Vijayan reporting in InfoWorld: "Microsoft has agreed to pay $7.5 million to purchase a block of 666,624 IPv4 addresses from bankrupt Canadian telecom equipment maker Nortel in a move that some see as a signal of the increasing value of IPv4 addresses. Last week, Nortel filed a motion seeking approval for the sale from the Bankruptcy Court for the District of Delaware. If the deal is approved, Microsoft would assume control of the IPv4 addresses, currently owned by Nortel, for about $11.25 a piece." more

ICANN and the GAC - Lessons Learned Since Cartagena

Experience is the best teacher. In the interest of capturing lessons learned (and avoiding the repetition of hard experiences needlessly), it is worth highlighting what the interactions between the ICANN Board and the Governmental Advisory Committee (GAC) since Cartagena have taught. more

Digging Through the Problem of IPv6 and Email - Part 2

We have seen that spammers already possess the ability to hop around IP addresses quickly. They do this because once an IP gets blocked, it is no longer useful to them. There are only so many places they can hide, though - 4.2 billion places they can hide. However, in IPv6, if they are able to do the same pattern of sending out mail and hopping around IP addresses the same way they do in IPv4, then there is virtually unlimited space they can hide in. more

The CSTD WG on IGF, Multi-Stakeholderism, and Short Deadlines

One of the many Internet governance discussions currently taking place is at the CSTD Working Group on improvements to the IGF, which is due to have its second and final meeting on 24 and 25 March 2011. Despite an unpromising beginning, with only governments on the Working Group (WG), it is now a multi-stakeholder environment, with the technical, business and civil society represented at the WG and genuinely welcomed by governments to participate in the WG's deliberations. more

2nd Annual RIPE NCC - LEA meeting: Cooperation Unfolds

On Wednesday 16 March the Serious Organised Crime Agency organised a meeting in London with the RIPE NCC. For the second time law enforcers from the whole world met with the RIPE NCC and RIPE community representatives to discuss cooperation. RIPE NCC staged several very interesting presentations that showed the LEAs the importance of the work done within RIPE and ARIN, the information RIPE NCC has and the relevance of all this to LEAs. Also issues were addressed that can potentially be harmful to future investigations. more