IoT'd →
News, via the inimitable Dan Goodin, writing at Ars Technica, of newly released DDoS source code leveraging IoT devices. Beware that new Bluetooth cuddly stuffed bear, it's a killer (and let's ignore the rabbit for now)...
News, via the inimitable Dan Goodin, writing at Ars Technica, of newly released DDoS source code leveraging IoT devices. Beware that new Bluetooth cuddly stuffed bear, it's a killer (and let's ignore the rabbit for now)...
via the AFP, comes this amusing little tidbit, enumerating the networks of the dead - in Москва, Российская Федерация...
'If the wireless Internet service proves popular then the authorities will look about expanding it to the rest of the sprawling capital’s 133 cemeteries.' via the AFP
Yes, Virginia, routing security is fundamental. via Andrei Robachevsky, Technology Program Manager at the Internet Society.
Gotta love the 90's... Regardless of that affection, avoid, if you will, blasts from the past such as this newly reported flaw via Peter Bright (writing at Ars Technica) with tinges of that bygone decade... Read it and Weep.
The InterPlanetary Networking Special Interest Group (IPNSIG) of the Internet Society (ISOC) has announced the organizations' Second Annual IPN Conference in Washington, DC; slated for Monday, May 18, 2015. This time focusing on Delay & Disruption Tolerant Networking (DTN): the Emerging Standard for Space Data Communications.
Speakers include:
While admission is free for all to attend, and breakfast, lunch and an afternoon snack will be provided it is crucial that you register to attend. Physical attendance is limited to 150 people. The event will reportedly be webcast on the Internet Society’s LiveStream Channel and presentations will also be published on YouTube for VOD streaming poste-event. You can register for the event at the IPN's Eventbrite site.
The Federal Communications Commission has issued the codified order targeting Net Neutrality. Entitled FCC 15-24*, for GN Docket Number 14-28, In the Matter of Protecting and Promoting the Open Internet, Report and Order on Remand, Declaratory Ruling, and Order. At over *Four hundred pages long*, this document will (likely) become one of the most highly contentious Orders emerging this year (or the weapon of choice for conspiracy theorists due to it's weight*) from the Commission.
More IPV6 myths exposed by ISOC's Deploy360 Director Chris Grundemann. This time focusing on the myth that IPv6 is too new to be attacked. Today's MustRead!
Astoundingly, myths still arise in this epoch of science, strangely so, when dealing with new technologies [Read: new means new in the final two years of the last century as IPv4 was originally codified by the IETF in 1981, with the acceptance of RFC 791] - in this case the vaunted move to IPv6. Now, arising from the ashes of IPv4 exhaustion hysteria, comes a current popular myth surrounds the utilization NATs in IPv4 and the lack of a counterpart construct in IPv6.
News, of the latest crop of secondary school cyber-defense teams advancing into the finals of the CyberPatriot National Finals Competition. CyberPatriot has additional information for those of you that wish to attend the live National Finals Competition on March 13th through and inclusive of March 15th, 2015 in National Harbor, Maryland. Congratulations to All!
via Paleofuture's Matt Novak. The inception date of our beloved interweb is generally assumed to be the date of the first electronic message transmitted via the packet switched network, that was to become the ARPANET, and at that time managed by BBN.