According to a new security report released today by SANS Institute, TippingPoint and Qualys, the number of vulnerabilities found in applications in the last few years is far greater than the number of vulnerabilities discovered in operating systems. "On average, major organizations take at least twice as long to patch client-side vulnerabilities as they take to patch operating system vulnerabilities. In other words the highest priority risk is getting less attention than the lower priority risk." more
An open letter from nearly 150 individual and organizational members of ICANN's Non-Commercial Users Constituency (NCUC) has been submitted to ICANN's board of directors and CEO. The letter has expresses serious concern over a recent ICANN Board decision regarding the restructuring of the Generic Names Supporting Organization (GNSO). From the letter: "We believe that the Noncommercial Stakeholder Group (NCSG) chartering process has been seriously flawed on both procedural and substantive grounds. We appeal to you to address these problems before permanent damage is done to ICANN's reputation, to the GNSO reform process, and to the interests of noncommercial users of the Internet." more
Over the next five years, the number of mobile cloud computing subscribers worldwide are expected to grow rapidly, "rising from 42.8 million subscribers in 2008, (approximately 1.1% of all mobile subscribers) to just over 998 million in 2014 (nearly 19%)," according to the latest study by ABI Research. "From 2008 through 2010, subscriber numbers will be driven by location-enabled services, particularly navigation and map applications. A total of 60% of the mobile Cloud application subscribers worldwide will use an application enabled by location during these years,” says senior analyst Mark Beccue. more
Over the last year I have become deeply involved in the debate in the USA regarding the future of their telecoms sector, which is proceeding very much along the lines of the trans-sector approach towards infrastructure (using it for other sectors such as healthcare, education, energy), open networks and a separation between infrastructure and applications. While many of the issues are universal it was also interesting to observe the specific elements that make the USA so unique. more
Oh, Internet. You had such potential when you were born — darling of the research community, supported by the wealthiest military the world has ever known. And you married well, into a powerful merchant family. Why are you so lost? Is it a midlife crisis? You were born, some say, 40 years ago this week in a lab at UCLA — one of ARPA's many children. It wasn't until nearly two months later that you first spoke, transmitting the letters "L" and "O" before crashing... more
Hardly a week goes by without a press release touting how soon we'll be using a Long Term Evolution (LTE) wireless network. Verizon has promised a major commercial launch in 2010 and a two-city trial before the end of 2009. Let me show you a little chart I put together for my 3G Tutorial and have repeatedly updated... more
According to a recent research, European Internet traffic peaks in the early everning and drops off soon after until the next business day hours while in the United States, internet traffic reaches its peak at 11 p.m. EDT and stays relatively high until 3 a.m. in the morning. "The question is what are Internet users doing after dark?" Craig Labovitz of Arbor Networks reports. more
Government are recognising that healthcare is one of the last paper-based sectors of the economy. It has been estimated that, quite apart from the costs involved, this leads to then of thousands of deaths each year. There is no doubt that a fully integrated computerised e-health system will bring with it its own challenges, and will undoubtedly on occasions also deliver its share of problems. But, as has been the case with all other sectors of society and the economy, integrated computerisation in this sector will improve the situation. more
In India we saw the Department of Telecommunications take action. Late July the Telecom Engineering Centre organized a seminar where the recommendations for IPv4 to IPv6 transition put forward by the regulator (TRAI) were adopted. The highlights of the plan reflect a traditional Indian non aggressive but nonetheless forceful persuasion. more
The FCC is seeking public comments to help create a better definition of "broadband". The effort is in relation to its development of a National Broadband Plan by February 2010 as part of the American Recovery and Reinvestment Act. Accurately noting that "broadband can be defined in myriad ways" and "tends to center on download and upload throughput," the FCC seeks a more robust definition. The definition will be part of the governance over those receiving funding for broadband development as part of the Recovery Act. This could get interesting. more
According to the latest report released by comScore for the month of July, 58 million U.S. Internet users watched online video during the month, the largest audience ever recorded. Online video reached another all-time high in July with a total of 21.4 billion videos viewed during the month, according to the report. YouTube.com accounted for more than 99 percent of all videos viewed while Viacom Digital ranked second with 812 million (3.8 percent) followed by Microsoft Sites with 631 million videos viewed (3.0 percent). more
I have to tell you -- I'm not really happy about the fact that the majority of serious cyber crime on the Internet happens without any legal prosecution. I spend an enormous amount of time -- far beyond my "day job" and exceeding what some might consider my professional capacity -- tracking cyber crime. I also work closely with law enforcement (both in the U.S. and abroad) to assist in the intelligence gathering process, putting the pieces of the puzzles together, connecting the dots, and so forth. And most of the major criminal organizations are still operating (pretty much) in the open, with fear of retribution or criminal prosecution, for a number of reasons. more
Domain names registered under United Arab Emirates' recently liberalized county code Top-Level Domain (.ae) have attracted such high level speculative interests that red flags have been raised within the country's regulatory agency. Domain names such as 'vip.ae' and 'vips.ae' registered only a little over a year ago are currently receiving multi-million dollar offers according to reports. Abu Dhabi's newspaper, The National, reported last week that the Telecommunications Regulatory Authority (TRA), the .ae administrator, has stated "registering a UAE domain with no intention other than to resell it could hurt the registrants if they are later accused of registering the site in bad faith, something forbidden by its rules." more
From MessageLabs' latest report: "Real Host, an ISP based in Riga, Latvia was alleged to be linked to command-and-control servers for infected botnet computers, as well as being linked to malicious websites, phishing websites and 'rogue' anti-virus products. Real Host was disconnected by its upstream providers on 1 August 2009. The impact was immediately felt, where spam volumes dropped briefly by as much as 38% in the subsequent 48-hour period. Much of this spam was linked to the Cutwail botnet, currently one of the largest botnets and responsible for approximately 15-20% of all spam. Its activity levels fell by as much as 90% when Real Host was taken offline, but quickly recovered in a matter of days." more
An apparently legitimate ISP in Tartu, Estonian is reported to have been serving as the operational headquarters of a large cybercrime network since 2005 according to TrendWatch, the security research arm of TrendMicro. "An Estonian company is actively administering a huge number of servers in numerous datacenters, which together form a network to commit cybercrime. It appears that the company from Tartu, Estonia controls everything from trying to lure Internet users to installing DNS changer Trojans by promising them special video content, and finally to exploiting victims' machines for fraud with the help of ads and fake virus infection warnings..." more