Established in 1998 by the Global Anti-Counterfeiting Group (GACG), "World Anti Counterfeiting Day" is held annually in June to raise awareness of the international impacts of counterfeiting and piracy. According to the International Chamber of Commerce (ICC), the cost of counterfeiting is a $600 billion a year problem. MarkMonitor estimates the cost of online counterfeit trade at $200 billion annually. more
New research has uncovered evidence of spammers establishing their own fake URL-shortening services for the first time. According to the latest MessageLabs Intelligence report, shortened links created on these fake URL-shortening sites are not included directly in spam messages; instead, the spam emails contain shortened URLs created on legitimate URL-shortening sites. "Rather than leading directly to the spammer's final Web site, these links actually point to a shortened URL on the spammer's fake URL-shortening Web site, which in turn redirects to the spammer's final Web site." more
Pingdom has conducted a study on how today's two billion internet users around the world are spread over different time zones. Study found two time zones stand head and shoulders above the others in terms of the amount of Internet users they contain: UTC+8, which passes through eastern Asia, and UTC+1, which passes through Europe and Africa. more
Microsoft Program Manager, Jeb Haber, reports in a blog post that from browser data collected on user downloads, 1 out of every 14 programs downloaded is later confirmed as malware. Haber says: "Consumers need information to make better decisions. That said, IE9 adds another layer of defense against socially engineered attacks that now looks at the application being downloaded -- this is in addition to the URL-based protection described above. This new layer of protection is called SmartScreen Application Reputation." more
Netflix has become the largest source of Internet traffic in North America, according Sandvine's Spring 2011 Global Internet Phenomena Report. Company further reports that currently, Real-Time Entertainment applications consume 49.2% of peak aggregate traffic, up from 29.5% in 2009 -- a 60% increase [see figture]. Sandvine forecasts that the Real-Time Entertainment category will represent 55-60% of peak aggregate traffic by the end of 2011. more
Google yesterday dove deep into its Chrome notebook project at its annual Google I/O conference. The company has had the notebook operating system in beta for almost two years now. Google announced the first market-ready Chromebooks from partners Samsung and Acer. The Chrome OS is dependent on the cloud for storage and various web-based applications. The result is a machine that boots in a matter of seconds and carries very little in the line of native hardware. more
Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more
Caixin reports that the State Council, China's cabinet, has set up an office to regulate internet activity, according to an announcement released on May 4 via an official website. The new department, called the State Internet Information Office, will supervise online content management and process approvals of businesses involved in online news reporting, according to the state-run news agency Xinhua. The new agency is reported to have the authority to investigate and punish online content-providers if necessary. more
Wout de Natris writes to report: "EU Commissioner for the Information Society Neelie Kroes today launched the EU co-funded project for the Internet of the future in which everything will be connected to everyone in the cloud. Here's the link to Mrs. Kroes' speech." more
Telnic Limited, the registry operator for the .tel top level domain (TLD), today announced that its regional partner TelChina and China Mobile, a leading mobile phone company, have entered into a strategic relationship to develop Mobile-Pay services on the .tel platform. ... On this platform, users will not have to log on to various websites for payment, but accomplish it through the clicking of a Mobile-Pay link on a .tel page. more
With the recent passing of Paul Baran, IFTF is releasing an excerpt of a 1971 report in tribute, entitled "Brief descriptions of potential home information services." The excerpts are from the report titled, Toward a Study of Future Urban High-Capacity Telecommunications Systems, which included a handbook of forecasts for what was then called "broadband telecommunication and information services," later known as the Internet. more
The recent attack on the Comodo Certification Authority has not only shown how vulnerable the current public key infrastructure is, but also that the protocols (e.g., OSCP) used to mitigate these vulnerabilities once exploited, are not in use, not implemented correctly or not even implemented at all. Is this the beginning of the death of the PKI dragons and what alternatives do we have? more
Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more
The importance of online presence continues to grow exponentially. More and more of our personal and professional endeavors are conducted online. Because of this, the ability to ensure a good experience for our online friends and customers also is increasing rapidly. At its core, load testing is nothing more than ensuring your online presence is ready for the number of visitors you expect. It's simple to explain, but historically it's been anything but simple, or easy to afford. more
In pursuit of its efforts to improve Google search results, the company on Thursday announced the release of a new feature that enables users to block specific search results based on domain names. more