A new year and a new goat with new conditions, the goat was slowly eaten by jackdaws, and in the end, almost only the frame remained. This was really slow TV for the devastation… You can read more on Wikipedia about the devastating jackdaws and the straw... 36% IPv6 is equal to last year, and I had high hopes as Telia (AS3301) has made great progress in IPv6 and that Sweden should be the dominant country. more
The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! ... Over at the Networking Nerd, Tom has an article posted supporting this view of networking equipment, entitled Network Longevity: Think Car, not iPhone. It seems, to me, that these concepts of longevity have the entire situation precisely backward. more
Number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. While most malware-generated traffic passing through most channels used for communicating with botnets (such as TCP, IRC, HTTP or Twitter feeds and Facebook walls) can be detected and blocked, it's not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow. more
The long-waited cybersecurity executive order expected to launch sweeping reviews of the federal government's digital vulnerabilities, was signed today by President Trump. more
Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more
It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed, and tens of thousands of travellers stranded. What's so unusual about this event is in the larger scheme of network engineering, it's not that unusual. If I think back to my time on the Escalation Team at a large vendor, I can think of hundreds of situations like this. And among all those events, there is one point in common: it takes longer to boot the system than it does to fix the initial problem. more
In an increasingly global environment, the Internet infrastructure industry faces a diverse set of serious issues that we as an industry need to address together. To look at these concerns, an area of focus for the Internet Infrastructure Coalition (i2Coalition) has been best practices for our industry. Our approach to developing best practices encapsulates three areas, always with the goal of striking the right balance between security, safety and privacy: working with experts and industry professionals; identifying like-minded partners; and fostering the growth of the Internet economy. more
In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more
According to reports, North Korea has accused the United States for conducting a cyberattack that has disrupted Internet connectivity in the country. "While the details of the cause of the disruption are unknown, we can confirm that in the last two days, North Korea's sole Internet provider has, in fact, suffered from disruptions in connectivity to the global Internet," reports Doug Madory from Renesys. more
Tonight (27 Sep 2019) you can watch the 2019 Internet Hall of Fame induction ceremony streaming live out of Costa Rica. Eleven individuals from six countries will be inducted into the Internet Hall of Fame (IHOF) today. The 2019 class of inductees have expanded the Internet's reach into new regions and communities, helped foster a greater understanding of the way the Internet works, and enhanced security to increase user trust in the network. more
Users of LinkedIn were unable to access the site for several hours due to what the company has reported to have been a DNS issue. The site is claimed to have been accidentally pointed to a domain name parking page and some users were greeted with a domain for sale page when trying to access LinkedIn's homepage. According to downrightnow, LinkedIn's outage began around 6 pm PST on Wednesday and is continuing, though website has gradually resumed for some users. more
It might be hard to imagine but we were already talking about fibre to the home networks back in the 1970s and 1980s. This was in the early days of interactive TV and pay TV and fibre optics were already at that time seen as the next level of telecoms infrastructure needed for such services. The first residential fibre pilot networks were built in Berlin and Nagasaki. One of the most ambitious projects was in Columbus Ohio, but in the end they decided to continue with their HFC network. more
Vodafone is working on a project to create the first 4G network on the Moon to support a mission by PTScientists in 2019. Nokia is chosen as the company's technology partner, according to a press release issued today. more
WikiLeaks shook the internet again on March 7, 2017, by posting several thousand documents containing information about the tools the CIA allegedly used to hack, among others, Android and iOS devices. These classified files were obtained from the CIA's Center for Cyber Intelligence, although they haven't yet been verified and a CIA official declined to comment on this incident. This isn't the first time that the U.S. government agencies were accused of crossing the line and undermining online security and civil liberties, as it's been only a year since the infamous FBI-Apple encryption dispute. It's like "1984" all over again. more
In a 52 page security report released by Cisco, the company has confirmed what has been consistently been observed through out this year: "the Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers." The 2008 edition of the report has specified the year's top security threats and offers recommendations for protecting networks against attacks that are propagating more rapidly, becoming increasingly difficult to detect, and exploiting technological and human vulnerabilities. more