/ Most Commented

Malware and Search Warrant

A recent decision from a federal district court addresses an issue I hadn't seen before: whether searching malware on the suspect's computer was outside the scope of the search warrant issued for that computer. It seems a narrow issue, and unfortunately the opinion issued in the case doesn't tell us a whole lot about what happened; but I thought the issue was worth writing about, if only to note that it arose. more

Reverse Domain Name Hijacking Found Where Complainant’s Rights Were of Narrow Geographic Scope

Complainant sells RV parts and accessories in the eastern part of Tennessee. Respondent, no stranger to UDRP proceedings, registers domain names and sets up pages with pay-per-click ads related to the subject of the words in the domain name. Though Complainant had been operating on the web since mid-2004, which is the same year it incorporated, it claimed that its predecessor in interest had been using the ADVENTURERV trademark since 1989. more

More Stepping Stones Before This Summer’s Seminal DNSSEC Events

The deployment of Domain Security Extensions (DNSSEC) has crossed another milestone this month with the publication of DURZ (deliberately unvalidatable root zone) in all DNS root servers on 5 May 2010. While this change was virtually invisible to most Internet users, this event and the remaining testing that will occur over these next two months will dictate the ultimate success of DNSSEC deployment across the Internet. more

ICANN Hires Cryptography Legend Whit Diffie

Pioneering cryptographer Whitfield 'Whit' Diffie has joined the Internet Corporation for Assigned Names and Numbers (ICANN) as Vice President for Information Security and Cryptography. Diffie will provide advice on general security matters related to ICANN's mandate, and to ICANN in the design, development and implementation of security methods for ICANN-managed networks. He will oversee the continuous improvement and 'best practices' process for information security and cryptography. more

Facebook, Privacy, and the Loss of Trust

Facebook sure is getting beaten up recently. There's even a crowd-funded initiative to replace it with something open, called Diaspora -- everyone on Facebook is talking about it. Yet it wasn't even two full years ago that Facebook was the darling of the ditherati. For a while it seemed as if nearly everything Facebook did was hailed as the future of messaging, perhaps the future of the Internet - or maybe the Internet didn't matter anymore, except for Facebook. more

ICANN Launches Russia’s Top-Level Domain in Cyrillic Characters

The first Internet domains using the Cyrillic script were launched on May 13 after Russia was officially assigned the .?? (.rf, for "Russian Federation") domain by the global Internet governing body. Representatives of the Internet Corporation for Assigned Names and Numbers (ICANN) handed Russia its Cyrillic domain administration certificate at an Internet forum that kicked off in Moscow. more

No Cyberattack on Wall Street

In case you missed it, last Thursday, May 6, we saw a remarkable day on the stock markets. The day started off with some selling which went down neat and orderly. Suddenly, around 2:40 pm eastern time, the market started selling off rapidly taking huge hits in in the span of 30 minutes. It was an incredible ride and at one point, the Dow Jones average was off 1000 points for the day, the largest drop in history (though not the largest percentage drop). It was kind of like October of 1987. more

Application Delivery Controller: So Long, Crystal Ball

Do you know how big your web site will be in a year? You probably can guess, or even estimate how much traffic will hit your site in a year. You can also use millennia proven methods such as Crystal Balls, Animal Entrails or even Coffee Stains. But seriously, it is no easy task evaluating site growth in this volatile, ever changing economy. A key element in the scaling of any web site is the Application Delivery Controller (ADC). more

Reputation and “The Cloud”

As Reddit recently learned it's not a great idea to use the Amazon EC2 cloud to host mailservers. There are a number of reasons for this, most of them related to the reputation of mail coming from EC2 servers. When you're using machines in the cloud, changing IP addresses is as simple as initializing a new server. Spammers discovered this almost as soon as the EC2 cloud became public. more

FBI Pushing Enforcement Action Against Money Mules

Brian Krebs reporting on the Krebs on Security blog: "The FBI's top anti-cyber crime official today said the agency is planning a law enforcement action against so-called 'money mules,' individuals willingly or unwittingly roped into helping organized computer crooks launder money stolen through online banking fraud." more

IPv6: Circling the IPv4 Wagons for a Last Stand

The last remaining stocks disappear from the shelves more quickly than ever before . . . IPv4 addresses that is. As the ARIN met in Toronto in April, an inordinate amount of time was spent yet again debating proposals on how to handle the dwindling stock of IPv4 addresses. I get the distinct impression that some people will still be tabling proposals and discuss the issue long after the last IPv4 block has been allocated by IANA and even the RIR's themselves. more

Major Outage Hits German’s Websites Under .de Domain

Millions of websites under Germany's top-level domains, .de, went offline on Wednesday due to a technical error according to various sources. While the exact cause of the outage is still unknown, the problem is reported to have originated from DENIC, the central registry for the .de top-level domain. more

ICANN Security Team Reports on Conficker Post-Discovery Analysis

A paper released today by ICANN provides a chronology of events related to the containment of the Conficker worm. The report, "Conficker Summary and Review," is authored by ICANN's Dave Piscitello, Senior Security Technologist on behalf of the organization's security team. more

UTOPIA, Perfection or Fantasy: Partnering Public-Private Sectors With Broadband

Utopia: the definition brings about visions of an "ideal place or state", or "a system of political and social perfection." Thus became the name chosen for a consortium of sixteen Utah cities building their own broadband infrastructure with a fiber-to-the-premise architecture, while offering residents a clear and alternative choice to incumbent operators, including Quest and Comcast. Is it perfection or fantasy? more

Buying Open Source… It’s a Different Ecosystem

A lot of organizations are interested in open source software, but fail to give it a fair chance compared to proprietary solutions. One reason for this is that the typical invitation to tender process puts open source at a disadvantage. Open source, as it happens, is made in a different ecosystem. more