Researchers at security service provider, Zscaler, are reporting that in the past six months they have blocked over 2.5 billion web-based cryptomining attempts within their cloud service. more
I bet that nobody believed in 1992 that thirty years later, we'd still be discussing the state of the transition to IPv6! In 1992 we were discussing what to do about the forthcoming address crunch in IPv4, and having come to terms with the inevitable prospect that the silicon industry was going to outpace the capacity of the IPv4 address pool in a couple of years, we needed to do something quickly more
According to IDC, smartphones outsold personal computers, laptops included in Q4 2010! Nokia just announced the demise of the Venerable Symbian in favour of Windows 7 phone and Microsoft's bing search engine! Tectonic shifts are under way to adapt to the rise of wireless broadband, an all IP world, and the growing weight of Apple and Google Android. It is also time to head once again for Barcelona with the Mobile World Congress starting on the 14th. Highlights this year? more
This very interesting document was released by ICANN's Generic Names Supporting Organization (GNSO) for public comment yesterday. And it asks some fundamental questions while at the same time pointing to sources such as the Honeynet Alliance's reports on fast flux. more
Oracle today announced the launch of the Internet Intelligence Map website; a source available for free that provides country-level connectivity statistics based on traceroutes, BGP, and DNS query volumes on a single dashboard. more
Cisco's security arm, Talos, today revealed a several-month-old research on a sophisticated modular malware system dubbed "VPNFilter. more
Microsoft has digressed from a previously announced plan to move its internal wireless guest network to IPv6-only. more
During the 27th Usenix Security Symposium held in Baltimore, MD last week, a group of researchers from China revealed results obtained from a large-scale analysis DNS interceptions. more
Keynote speaker, and noted security industry commentator, Bruce Schneier (Co3 Systems ) set the tone for the two days with a discussion on how humans name things and the shortcomings of computers in doing the same. Names require context, he observed, and "computers are really bad at this" because "everything defaults to global." Referring to the potential that new gTLDs could conflict with internal names in installed systems, he commented, "It would be great if we could go back 20 years and say 'Don't do that'," but concluded that policymakers have to work with DNS the way it is today. more
So you are the IT regulator for a country and you are convinced that the shortage of IPv4 address space represents a threat to the development of the Internet in your country and you want to do something about it. Being that as regulator you don't really run the countries IP networks, what can you really do? I've heard many regulators in over 30 countries grapple with this problem. The purpose of this article is to think through some ideas to guide action on using (or not) regulation to drive IPv6 adoption. more
Reading about the EU Neutrality vote, I'm reminded of the challenge faced by traditional telecommunications regulators in understanding the very concept of the Internet. To put it bluntly zero-rate is a policy framed in terms of Minitel and setting the price based on what phone number is dialed and not at all about the Internet where the value is determined by relationships entirely outside of a network. more
Yesterday Apple declared that as of June 1 all iOS apps submitted to the AppStore MUST support IPv6-only networking. Back at their June 2015 WWDC event, Apple announced that all iOS 9 applications must support IPv6 - the news this week is reinforcing that requirement... As Apple continues to point out, the vast majority of application developers will not need to do anything to support IPv6. more
It has been about six months since I got together with four of my friends from the DNS world and we co-authored a white paper which explains the technical problems with mandated DNS filtering. The legislation we were responding to was S. 968, also called the PROTECT-IP act, which was introduced this year in the U. S. Senate. By all accounts we can expect a similar U. S. House of Representatives bill soon, so we've written a letter to both the House and Senate, renewing and updating our concerns. more
The main reason for developing a new internet protocol was based on lack of address; however this was not the only reason. Unfortunately, many people think of IPv6 only as enormous address space, but there are a lot of other advantages, for example... authorizations and authentication function are implemented directly in the protocol and are mandatory... automatic configuration of network interfaces based on their physical address... protocol itself recognizes data streams which must be transmitted in real time, and the data must be processed with highest priority... more
As the federal government grapples with Internet-connected devices and applications that make up the Internet of Things (IoT), the National Institute of Standards and Technology (NIST) is forging ahead to provide "technical leadership" for "the operation, trustworthiness, and lifecycle of IoT". Such efforts complement - and contrast - recent policy efforts at the National Telecommunications and Information Administration (NTIA) and elsewhere to promote IoT innovation while addressing security, privacy, and interoperability. more