/ Most Viewed

Transformation - the Real Business Case for NFV and SDN

2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more

Visibility of Prefix Lengths in IPv4 and IPv6

Internet routes are specified for an address prefix. The shorter the prefix, the more general the route. A shorter prefix covers more address space and thus a bigger part of the Internet. Very long prefixes cover few addresses and are used for local routing close to the destination address. In general, it is not necessary to distribute very long prefixes to the whole Internet, because a more general, shorter prefix is sufficient to direct packets in the direction of the destination. more

Weaponizing the Internet Using the “End-to-end Principle” Myth

At the outset of the Internet Engineering Task Force (IETF) 100th meeting, a decidedly non-technical initial "Guide for human rights protocol considerations" was just published. Although the IETF has always remained true to its DARPA origins as a tool for developing disruptive new technical ideas, it launches into bizarre territory when dealing with non-technical matters. more

Thomson Reuters in Definitive Agreement to Sell Intellectual Property Unit Including MarkMonitor

The portfolio includes Web of Science, Thomson CompuMark, Thomson Innovation, MarkMonitor, Thomson Reuters Cortellis and Thomson IP Manager. more

Google Rolling Out Its Services Over IPv6

While Google admits that offering its services over IPv6 is still in its infancy, the company today announced the option for accessing Google services over IPv6. Last year, Google started offering Google search over IPv6 on IPv6-only websites like 'ipv6.google.com' requiring IPv6 connection, but other Google products have not been generally available over IPv6, says Google. "That's why we created Google over IPv6." more

Reality Check on the 5G Security MAGAverse

As chance has it, the attempt by NTIA to create a fake Trump Open 5G Security Framework MAGAverse as they headed out the door on 15 January is being followed this week by the global meeting of 3GPP SA3 (Security) to advance the industry's real open 5G security Framework. Designated TSGS3-102e (the 102nd meeting, occurring electronically), it continues the practice of assembling companies, organisations, and agencies from around the world every 8 to 12 weeks to focus on 5G security for current and future releases of 5G infrastructure. more

Cigarette Smuggling and Cyber Security: Low-Tech Crimes Fund High-Tech Threats

You may not connect the cheap cigarettes sold under the counter (or out of a trunk, bodega or by a street vendor) with the mysterious charges on your credit card that you don't remember making or the cash that has, somehow, just disappeared from your bank account. You also may not connect that website selling cheap cigarettes made in second and third world countries with Shellshock or whatever the fashionably scary cyber-threat of the day is when you're reading this. more

Trump Admin Ramping Up Attacks on GDPR – Says It Helps Cybercrime, Threatens Public Health

While the EU is boasting about the success of its flagship privacy law, the General Data Protection Regulation (GDPR), the U.S. administration is ramping up attacks on the system, saying it provides cover to cybercriminals and threatens public health. more

Nearly 1 Million IP Addresses Used by Attackers on a Single Target

According to a recent report by Akamai, an analysis of massive Account Takeover (ATO) attack campaigns, targeting two of its customers, revealed 1,127,818 different IPs were involved in the attacks. more

Richard Clarke: Defend Against Cyberwar by Re-Architecting Networks, Not Buying More Technology

In his keynote yesterday at the RSA Security Conference, former U.S. top chief counter-terrorism adviser, Richard A. Clarke, said cyberwar defence efforts need to focus on re-architecting networks not buying more technology. more

Why Bitcoin Will Not Solve the Caribbean’s Financial Inclusion Woes

There's a deluge of hype around Bitcoin and blockchain technologies right now, and policymakers and regulators in the Caribbean are doing their best to wrap their heads around the advantages and disadvantages of this virtual currency. Similar questions are being contemplated in the ICTs for development (ICT4D) community, taking into account that electronic money (e-money) platforms such as Safaricom's M-PESA have essentially solved the financial inclusion quandary for millions of people in Kenya. more

Businesses and Intellectual Property Owners Discuss GDPR and WHOIS Issues With ICANN and Community

On January 24, 2018, ICANN's Business Constituency (BC) and Intellectual Property Constituency (IPC) co-hosted an event to discuss the EU's General Data Protection Regulation (GDPR) and its implications on access to the WHOIS database. ICANN's CEO and General Counsel joined the discussion, as did stakeholders from across the ICANN community. The event was timely and well attended with over 200 participants attending in-person or virtually. more

‘Spam King’ Sanford Wallace Sentenced to 2.5 Years In Prison

The 47 year old Las Vegas man known as the "Spam King" has been sentenced to 2.5 years in federal prison for sending over half-million spam messages to Facebook users resulting in over 27 million spam messages sent through social networking company's servers. He pleaded guilty last year to one count of fraud. more

The Long Gestation and Afterlife of New gTLDs

ICANN continues to flail, pointlessly. The latest in a series of missteps that could easily have been avoided is its recommendations on what to do about a report on the potential for confusion and misaddressing when someone's internal network names match the name for a new gTLD, and they have misconfigured their routers and/or DNS to the extent that someone typing in a new gTLD name might end up in the middle of someone else's network. more

New gTLDs: Comments on the Unsigned “The Economic Case for Auctions”

When Kurt Pritz briefed the Generic Names Supporting Organization (GNSO) Council (and observers) in Los Angeles April 10th and 11th, the new generic Top-Level Domain (gTLD) process model flows transition through an "auction" state in two of the three paths where two or more applications existed for the same (or similar) strings. At that time Kurt, speaking for Staff, was clear that the existence of a well-defined community was not dispositive, which surprised the Council members from the Intellectual Property Constituency... more