/ Recently Commented

Major Organizations Overlooking High Priority Security Risks, Too Much Focus on OS

According to a new security report released today by SANS Institute, TippingPoint and Qualys, the number of vulnerabilities found in applications in the last few years is far greater than the number of vulnerabilities discovered in operating systems. "On average, major organizations take at least twice as long to patch client-side vulnerabilities as they take to patch operating system vulnerabilities. In other words the highest priority risk is getting less attention than the lower priority risk." more

NCUC Sends Urgent Plea to the ICANN Board Regarding Recent Changes Affecting Noncommercial Groups

An open letter from nearly 150 individual and organizational members of ICANN's Non-Commercial Users Constituency (NCUC) has been submitted to ICANN's board of directors and CEO. The letter has expresses serious concern over a recent ICANN Board decision regarding the restructuring of the Generic Names Supporting Organization (GNSO). From the letter: "We believe that the Noncommercial Stakeholder Group (NCSG) chartering process has been seriously flawed on both procedural and substantive grounds. We appeal to you to address these problems before permanent damage is done to ICANN's reputation, to the GNSO reform process, and to the interests of noncommercial users of the Internet." more

New Research Predicts 1B Mobile Cloud Computing Subscribers by 2014

Over the next five years, the number of mobile cloud computing subscribers worldwide are expected to grow rapidly, "rising from 42.8 million subscribers in 2008, (approximately 1.1% of all mobile subscribers) to just over 998 million in 2014 (nearly 19%)," according to the latest study by ABI Research. "From 2008 through 2010, subscriber numbers will be driven by location-enabled services, particularly navigation and map applications. A total of 60% of the mobile Cloud application subscribers worldwide will use an application enabled by location during these years,” says senior analyst Mark Beccue. more

Analysing the USA: An Outsider’s Perspective

Over the last year I have become deeply involved in the debate in the USA regarding the future of their telecoms sector, which is proceeding very much along the lines of the trans-sector approach towards infrastructure (using it for other sectors such as healthcare, education, energy), open networks and a separation between infrastructure and applications. While many of the issues are universal it was also interesting to observe the specific elements that make the USA so unique. more

Happy Birthday, Internet!

Oh, Internet. You had such potential when you were born — darling of the research community, supported by the wealthiest military the world has ever known. And you married well, into a powerful merchant family. Why are you so lost? Is it a midlife crisis? You were born, some say, 40 years ago this week in a lab at UCLA — one of ARPA's many children. It wasn't until nearly two months later that you first spoke, transmitting the letters "L" and "O" before crashing... more

LTE: Another Way to Estimate when It Will Be Real

Hardly a week goes by without a press release touting how soon we'll be using a Long Term Evolution (LTE) wireless network. Verizon has promised a major commercial launch in 2010 and a two-city trial before the end of 2009. Let me show you a little chart I put together for my 3G Tutorial and have repeatedly updated... more

The State of Internet Traffic (After Dark)

According to a recent research, European Internet traffic peaks in the early everning and drops off soon after until the next business day hours while in the United States, internet traffic reaches its peak at 11 p.m. EDT and stays relatively high until 3 a.m. in the morning. "The question is what are Internet users doing after dark?" Craig Labovitz of Arbor Networks reportsmore

National Broadband - Key to the Success of E-Health

Government are recognising that healthcare is one of the last paper-based sectors of the economy. It has been estimated that, quite apart from the costs involved, this leads to then of thousands of deaths each year. There is no doubt that a fully integrated computerised e-health system will bring with it its own challenges, and will undoubtedly on occasions also deliver its share of problems. But, as has been the case with all other sectors of society and the economy, integrated computerisation in this sector will improve the situation. more

No Summer Break for IPv6

In India we saw the Department of Telecommunications take action. Late July the Telecom Engineering Centre organized a seminar where the recommendations for IPv4 to IPv6 transition put forward by the regulator (TRAI) were adopted. The highlights of the plan reflect a traditional Indian non aggressive but nonetheless forceful persuasion. more

Defining Broadband

The FCC is seeking public comments to help create a better definition of "broadband". The effort is in relation to its development of a National Broadband Plan by February 2010 as part of the American Recovery and Reinvestment Act. Accurately noting that "broadband can be defined in myriad ways" and "tends to center on download and upload throughput," the FCC seeks a more robust definition. The definition will be part of the governance over those receiving funding for broadband development as part of the Recovery Act. This could get interesting. more

Americans Watched 21.4 Billion Videos in July, Largest Number Ever Recorded

According to the latest report released by comScore for the month of July, 58 million U.S. Internet users watched online video during the month, the largest audience ever recorded. Online video reached another all-time high in July with a total of 21.4 billion videos viewed during the month, according to the report. YouTube.com accounted for more than 99 percent of all videos viewed while Viacom Digital ranked second with 812 million (3.8 percent) followed by Microsoft Sites with 631 million videos viewed (3.0 percent). more

Glaring Weaknesses in Prosecuting International Cyber Crime

I have to tell you -- I'm not really happy about the fact that the majority of serious cyber crime on the Internet happens without any legal prosecution. I spend an enormous amount of time -- far beyond my "day job" and exceeding what some might consider my professional capacity -- tracking cyber crime. I also work closely with law enforcement (both in the U.S. and abroad) to assist in the intelligence gathering process, putting the pieces of the puzzles together, connecting the dots, and so forth. And most of the major criminal organizations are still operating (pretty much) in the open, with fear of retribution or criminal prosecution, for a number of reasons. more

United Arab Emirates TRA Investigating High Level Speculative Interests in Recently Liberalized .AE

Domain names registered under United Arab Emirates' recently liberalized county code Top-Level Domain (.ae) have attracted such high level speculative interests that red flags have been raised within the country's regulatory agency. Domain names such as 'vip.ae' and 'vips.ae' registered only a little over a year ago are currently receiving multi-million dollar offers according to reports. Abu Dhabi's newspaper, The National, reported last week that the Telecommunications Regulatory Authority (TRA), the .ae administrator, has stated "registering a UAE domain with no intention other than to resell it could hurt the registrants if they are later accused of registering the site in bad faith, something forbidden by its rules." more

Latvian ISP Closure Dents Cutwail Botnet ...for a Whole 48 Hours

From MessageLabs' latest report: "Real Host, an ISP based in Riga, Latvia was alleged to be linked to command-and-control servers for infected botnet computers, as well as being linked to malicious websites, phishing websites and 'rogue' anti-virus products. Real Host was disconnected by its upstream providers on 1 August 2009. The impact was immediately felt, where spam volumes dropped briefly by as much as 38% in the subsequent 48-hour period. Much of this spam was linked to the Cutwail botnet, currently one of the largest botnets and responsible for approximately 15-20% of all spam. Its activity levels fell by as much as 90% when Real Host was taken offline, but quickly recovered in a matter of days." more

Apparently Legitimate Estonian ISP Operating as Large Cybercrime Hub Since 2005

An apparently legitimate ISP in Tartu, Estonian is reported to have been serving as the operational headquarters of a large cybercrime network since 2005 according to TrendWatch, the security research arm of TrendMicro. "An Estonian company is actively administering a huge number of servers in numerous datacenters, which together form a network to commit cybercrime. It appears that the company from Tartu, Estonia controls everything from trying to lure Internet users to installing DNS changer Trojans by promising them special video content, and finally to exploiting victims' machines for fraud with the help of ads and fake virus infection warnings..." more