/ Most Viewed

Where Should the Telcos Jump Next?

With declining revenues now across all of the major revenue segments -- something in the order of $25 billion worldwide -- it is 2 minutes to 12 and the industry needs to act. Unlike previous situations, this time there is no large money-spinner around the corner for the telcos, such as we saw in previous situations when broadband and mobile came to the rescue. more

China Accused of ‘Weaponizing’ Global Internet Users to Launch DDoS Attack

Activists battling internet censorship in China are reporting that they have proof of a massive online assault on their websites by the Chinese authorities. The attack, which began last Thursday, targeted two GitHub projects designed to combat censorship in China: GreatFire and CN-NYTimes, a Chinese language version of the New York Times. more

Software Glitch Causes ICANN to Extend New gTLD Application Deadline

Due to unusual behaviour with the operation of its TLD Application System (TAS), ICANN announced today that it has shut down the system until Tuesday. ICANN has also extended the submission deadline: "In order to ensure all applicants have sufficient time to complete their applications during the disruption, the application window will remain open until 23:59 UTC on Friday, 20 April 2012." more

The Early History of Usenet, Part I: The Technological Setting

Usenet -- Netnews -- was conceived almost exactly 40 years ago this month. To understand where it came from and why certain decisions were made the way they were, it's important to understand the technological constraints of the time. Metanote: this is a personal history as I remember it. None of us were taking notes at the time; it's entirely possible that errors have crept in, especially since my brain cells do not even have parity checking, let alone ECC. Please send any corrections. more

GlavMed Hacks U.S. Government Website

Garth Bruen writes: A report in LegitScript takes a look at Russian rogue Internet pharmacy hacking US government website. "As rogue Internet pharmacy networks become more sophisticated, even US government websites are at risk. Today, we're taking a look at how a rogue Internet pharmacy linked to a criminal network operating out of Russia and Eastern Europe has hacked into a US government website. The Millennium Challenge Corporation, a US foreign aid agency, utilizes a ".gov" top-level domain, which is assigned to the control of the US government. Domain names ending in .gov are typically administered by the General Services Administration." more

6G Collaboration by U.S. and Allies Against Authoritarian Control

The United States, along with key global partners, has formally committed to principles guiding the development of 6G technology, as announced by the White House. This move comes amidst a strategic contest to shape the future of wireless communication standards, driven by concerns over authoritarian regimes exerting greater control over the internet within their borders. more

Amazon Web Services to Charge for IPv4 Addresses Amidst Rising Costs and Scarcity; Urges Shift to IPv6

Amazon Web Services (AWS) will charge customers for public IPv4 addresses effective February 1, 2024. The charge will be $0.005 per IP per hour for all public IPv4 addresses, irrespective of whether they're attached to a service. more

Global Standards Collaboration: Is It Possible?

On 24-27 April, a 33-year-old international organisation of ICT organisations will convene a meeting at London under ETSI auspices after a four-year hiatus. Known today as the GSC or Global Standards Collaboration organisation, it began its existence in the Spring of 1990 at Fredericksburg, Virginia, as an umbrella mechanism for all of the world's ICT standards bodies to collaborate on "high interest subjects." more

The Value of Community Broadband

There are many voices calling for increased initiatives by municipalities to build and operate broadband internet infrastructure as a public utility, but until this week, very little in the way of economic analysis to fully examine whether the benefits justify the costs. A paper released this week finds that local efforts produce small economic benefits, but cause a notable increase in the size of local government. more

EU Telecom Overhaul One Step Closer

Europe's electronic communications sector is currently governed by directives adopted in 2002. These stipulated that the directives and regulatory framework should be reviewed, a processed initialised in November 2007. Both the European Council and the European Parliament need to adopt the proposed changes, and none of the initial consultations conducted by the EC indicated that a major overhaul was on the cards, or even required. Yet this is what has transpired. more

Telecoms Infrastructure As a Service

More than a decade ago we predicted that the telecoms industry would be transformed, driven by its own innovations and technological developments. As a result we indicated that in many situations the telecommunications infrastructure would be offered as a service by hardware providers. We also predicted that this would open the way for a better sharing of the infrastructure. more

New EU WHOIS Verification Recommendations Take Center Stage

The EU has once again turned its attention to domain name registration data (WHOIS) -- this time reinforcing requirements to collect, maintain, verify, and disclose WHOIS for IP enforcement purposes through its "Commission Recommendation" on measures to combat counterfeiting and enhance the enforcement of IP Rights. Published last month, this regulatory action demonstrates the EU's commitment to restore WHOIS despite... more

Botnet Metrics and Calibration

As ISP's continue to spin up their anti-botnet defenses and begin taking a more active role in dealing with the botnet menace, more and more interested parties are looking for statistics that help define both the scale of the threat and the success of the various tactics being deployed... To overcome this problem there are several initiatives trying to grapple with this problem at the moment.. Obviously, if every ISP was using the same detection technology, in the same way, at the same time, it wouldn't be such a difficult task. Unfortunately, that's not the case. more

Problems With the Burr-Feinstein Bill

What appears to be a leaked copy of the Burr-Feinstein on encryption back doors. Crypto issues aside -- I and my co-authors have written on those before -- this bill has many other disturbing features. (Note: I've heard a rumor that this is an old version. If so, I'll update this post as necessary when something is actually introduced.) One of the more amazing oddities is that the bill's definition of "communications" (page 6, line 10) includes "oral communication", as defined in 18 USC 2510. more

The Impact of a Pandemic on Cyberattacks and Business Continuity Plans

A new survey of security and IT leaders by csoonline.com sheds light on how organizations across industries are dealing with the COVID-19 crisis, how prepared they were when the pandemic first hit, how vulnerable they are, and what the long-term impact on companies may be. Unsurprisingly, the survey found there has been an increased number of employees working from home. more