/ Recently Commented

US New Cybersecurity Strategy Includes Military Option

Defense Systems reports: "The U.S. government's sweeping new cybersecurity strategy announced May 16 states that the country will respond to a major cyberattack using any or all of the means at its disposal, reports the Associated Press. Although military response to a cyberattack is one of the options listed in the International Strategy for Cyberspace, it will be considered only as a last resort, officials said." more

Dutch ISPs Admit to Using Deep Packet Inspection

Digital Civil Rights in Europe reports: "During an investors day on 10 May 2011 in London, Dutch Internet service provider KPN admitted to using deep packet inspection (DPI) technology, to determine the use of certain applications by its mobile internet customers. Vodafone soon followed with an announcement that it used this technology for traffic shaping. The Dutch minister of Economic Affairs within days announced an investigation into KPN's practices and promised to publish the results within two weeks." more

Microsoft Data Suggests 1 Out of Every 14 Downloads is Malware

Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more

Nominet Rolls Out DNSSEC for 9.4 Million .UK Domains

UK registry Nominet has enabled the deployment of domain name system security extensions (DNSSEC) for 9.4 million second level .uk domains. Completing the rollout represents over a year's work and marks an important milestone in making the web a more trusted environment for UK consumers and businesses, says Nominet, which is responsible for running the .uk internet infrastructure. more

Facebook vs Google: The Pot Calling the Kettle Black

In case you missed it a few days, a story broke that said that Facebook was caught hiring a PR firm to spread stories about Google about how they invade people's privacy... Even though I work for Microsoft and therefore can hardly be considered unbiased, I think Microsoft would be in a position to call out others for lack of privacy protection. I say this based on the fact that in my division, every new feature that we implement has to go through Privacy reviews... more

EU Approval for 4G Technologies to Use GSM Bands - A Boost to Rural Mobile Broadband

The EC recently approved technical rules on how the 900MHz and 1800MHz frequency bands should be utilised for 4G services, including LTE and WiMAX. National governments have until the end of 2011 to implement the decision into national legislation. Restrictions were initially imposed by the 1987 GSM Directive which limited these bands for 2G. more

Netflix Becomes Largest Source of Internet Traffic in North America

Netflix has become the largest source of Internet traffic in North America, according Sandvine's Spring 2011 Global Internet Phenomena Report. Company further reports that currently, Real-Time Entertainment applications consume 49.2% of peak aggregate traffic, up from 29.5% in 2009 -- a 60% increase [see figture]. Sandvine forecasts that the Real-Time Entertainment category will represent 55-60% of peak aggregate traffic by the end of 2011. more

The Crimeware Infection Lifecycle

The distribution and installation of malicious and unauthorized software has evolved consistently throughout the 21st Century. The evolutionary path from annoying viruses, to destructive malware and on to financially driven crimeware, is well documented and can even be conveniently traced via the parallel evolution of technologies that were designed to counter each new aspect of the then contemporary threat. more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Chromebooks, Google’s Long-Waited Laptop, to Ship Next Month

Google yesterday dove deep into its Chrome notebook project at its annual Google I/O conference. The company has had the notebook operating system in beta for almost two years now. Google announced the first market-ready Chromebooks from partners Samsung and Acer. The Chrome OS is dependent on the cloud for storage and various web-based applications. The result is a machine that boots in a matter of seconds and carries very little in the line of native hardware. more

VeriSign and CFIT Resolve Over 5-Year Long Litigation

VeriSign reports that it has reached a Settlement Agreement and Mutual Release with the Coalition for ICANN Transparency, Inc. ("CFIT"), CFIT's members, and specified related parties that resolves the over five-year long CFIT litigation. Under the terms of the Agreement, no payment will be made and the parties immediately will file a dismissal with prejudice of all claims in the litigation. Further, the parties executed mutual releases from all claims now and in the future related to the litigation. more

Understanding the Modern DDoS Threat

The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more

Canada Becoming the New Cybercrime Hub, Quickly Replacing China, Eastern Europe

A recently conducted analysis of Canada's cyber security risk profile by Websense has detected trends indicating Canada is becoming the new launchpad for cybercriminals. Sr. Manager, Security Research at Websense in a blog post writes: "Cybercriminals are on the move again. And, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense evaluation. So hackers are on a quest to move their networks to countries, like Canada, that have better cyber reputations." more

IPv6 RIPEness: One Year Later

A year ago, the RIPE NCC introduced IPv6 RIPEness -- a system that rates IPv6 deployment of Local Internet Registries (LIRs)... Now, one year later, the numbers have gone up... In absolute numbers: more than 3,000 LIRs have IPv6 address space. This means that the RIPE NCC has made more than 1,100 IPv6 allocations within 12 months. more

Creating, Protecting and Defending Brand Equity - Part 3

In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more