/ Most Viewed

Mitigating Spoofed Attacks Using IPv6 Address Space

Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more

France’s Proposed Web Blocking Law: A Threat to Internet Freedom, Warns Mozilla Foundation

France's forthcoming SREN Bill could mandate web browsers to block websites deemed illicit by the government, setting a precarious standard for digital freedoms, warns Mozilla Foundation in a recent blog post. more

Corporate Email Phishing Scams Result in $3.1B Loss, Near 1300% Increase in 18 Months

Total number of Business Email Compromise (BEC) related crimes have reached epidemic levels, at nearly $3.1 billion in losses and involving 22,143 victims worldwide since January 2015, according to a new FBI report. more

On Comcast and Net Neutrality: Shouting Fire in a Theater

The Comcast traffic shaping case has stirred up passionate debate. Net neutrality proponents are calling for Comcast's head on a platter. The common argument is that Comcast's policy may stifle innovation and competition. If a service provider is allowed to exercise unregulated discretion in how it treats subscriber traffic, it is a slippery slope toward anti-competitive practices. Net neutrality says keep your hands off. Some are preaching net neutrality as if it were an inalienable human right like freedom of speech... more

Internet Governance Forum USA 2016 on Thursday, July 14

IGF-USA full day conference at the Center for Strategic and International Studies (CSIS) in Washington DC to be held on Thursday, July 14, 2016 from 8:00 AM - 7:00 PM. Key forum topics include IANA transition, ICANN accountability, broadband access, online privacy, Internet of Things, and digital trade. more

Facebook.com/Brand vs. a New TLD: What’s a Brand to Do?

Last week I published an article in Ad Age that the editors titled "Should your company jump on the dot-brand bandwagon?" I received several emails and LinkedIn requests from advertising and PR agencies as well as brand managers. One of the questions I received had to do with my opinion on whether brands that are currently promoting themselves via Facebook, e.g., "Find us on Facebook.com/brand," should consider the new Top-Level Domains (TLDs). more

China Tightens Internet Control in the Name of Fighting Porn, Piracy, and Cybercrime

As the year draws to a close, China's blocking of overseas websites - including Facebook, Twitter, and thousands of other websites including my blog - is more extensive and technically more sophisticated than ever. Controls over domestic content have also been tightening. People who work for Chinese Internet companies continue to complain that they remain under heavy pressure... more

New Study Highlights Growing Risk, Lack of Urgency with Mobile and IoT Application Security

Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organizations are ill-prepared for the risks they pose, according to a research report issued today from Ponemon Institute, IBM Security, and Arxan Technologies. more

Has Your ISP Been Hacked? (Growing Concern Over AI-Driven Hacking)

As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more

Congestion in the Backbone: Telecom and Internet Solutions

When a network is subject to a rapid increase in traffic perhaps combined with a rapid decrease in capacity (for example due to a fire or a natural disaster), there is a risk of congestion collapse. In a congestion collapse, the remaining capacity is so overloaded with access attempts that virtually no traffic gets through. In the case of telephony, everyone attempts to call their family and friends in a disaster area. The long standing telephony approach is to restrict new call attempts upstream of the congested area... This limits the amount of new traffic to that which the network can handle. Thus, if only 30% capacity is available, at least the network handles 30% of the calls, not 3% or zero... more

A Review of the 2024 Threat Landscape and Implications for Domain Security

The cybersecurity landscape in 2024 has been characterised by unprecedented complexity and rapidly evolving threats, presenting significant challenges for organisations across all sectors. As the digital attack surface expands and threat actors employ increasingly sophisticated techniques, domain security has emerged as a critical component of a robust cybersecurity strategy. more

Alphabet to Shut down Loon, its Balloon Based Internet Access Project

Despite several groundbreaking technical achievements over the past nine years, Google's parent company Alphabet has decided to end the Loon project. The company said the road to commercial viability has proven much longer and riskier than hoped.  more

Marking the 30th Anniversary of the Internet and Cybersecurity Treaty

Next week on 1 July 2020 marks the 30th anniversary of one of the most significant treaty instruments in modern times. On 1 July 1990, the Melbourne Treaty came into force as the first and only global treaty that enabled worldwide internets and mobile networks to exist, together with the cybersecurity provisions designed to protect those infrastructures. The achievement remains as an enduring tribute to Richard Edmund Butler of Australia who was one of the most influential, and best-loved Secretaries-General of the ITU. more

Help Science Fight COVID-19

Many organizations and individuals are socially committed and voluntarily help the weak, the poor, and the sick. Others consider how they can contribute. Supporting organizations and individuals by starting an aid project, donating money, or providing human resources, can make a crucial difference. The corona crisis is a challenge for many, if not all. Scientists around the world are experimenting with cures and vaccines, and they need help. However, you don't have to be a virologist to help science fight COVID-19. more

Voice Over IP – an Inflection Point

Voice over IP (VoIP) represents a sharp break from the traditional telephony. The story of VoIP is important in helping us think beyond the simplistic framing of a "digital transition". The first stage of any technology is emulating the old. Indeed, digital telephony was just like traditional analog telephony -- just FBC (Faster, Better Cheaper) but not fundamentally different. Merely changing from analog to digital isn't transformational in itself. But it creates the opportunity for transformation. more