How to prevent a “security embarrassment?”

Posted · Add Comment

On Oct 7, 2014, a security researcher, Jonathan Hall, posted details of a potential Bash/Shellshock vulnerability on Yahoo’s infrastructure: http://www.futuresouth.us/yahoo_hacked.html https://www.reddit.com/r/technology/comments/2ifbjb/yahoo_got_hacked_this_morning_hooray_for/ As it turned out, it was NOT a Bach/Shellshock issue. As Alex Stamos, Yahoo’s chief information security officer wrote, “it turns out that the servers were in fact not affected by Shellshock.” (see https://news.ycombinator.com/item?id=8418809). […]

Is “Transparent” Web Caching Dead?

Posted · Add Comment

Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool […]

Weekend Read – Lessons from Heartbeed

Posted · Add Comment

IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the conclusion. Some items to note: This work focused on web sites. There are a lot of embedded devices that are NOT getting patched. […]

Does the Internet “End” at 500K routes?

Posted · Add Comment

No! Of course, the Internet does not end at 500K routes. On August 13, 2014, there was a lot of “news” about instability issues on the Internet that might have been caused by a surge of new Internet routes (see articles like “Internet routers hitting 512K limit, some become unreliable” – http://arstechnica.com/security/2014/08/internet-routers-hitting-512k-limit-some-become-unreliable/). The most accurate write […]

Questions to ask vendors to gauge their commitment to “secure products”

Posted · Add Comment

The Bloomberg article, “How Russian Hackers Stole the Nasdaq,” is a sobering insight into today’s risk. It should be a wake up call for all organizations in all parts of the world to understand that even the best security teams are facing an overwhelming threat. The focused expertise used by today’s cyber-criminals is often beyond the capabilities […]

“Getting the Right People on the Bus” Finding Staff with that Internet Spirit

Posted · Add Comment

Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a model that empowers  customers to drive the change in telecommunications. Telecommunications need to convert to “IP thinking” to succeed. They […]

Camel-Xerocole

Using DNS to Protect Your Network and Your Customers

Posted · 2 Comments

In cased you missed it, Xerocole & Damballa released two press releases on their new partnership: Xerocole’s link: Xerocole Partners with Damballa for Botnet Detection on Carrier Networks Damballa’s link: Damballa Enhances Cyber Threat Protection for Telecommunications and Internet Service Providers The Xerocole-Damballa partnership is another evolution of a security technique where the DNS recursive […]

DCWG

Beware! DNS Changer’s IP Blocks are re-allocated and advertised!

Posted · 2 Comments

As of Friday morning (August 10, 2012), the IP address blocks used by the Rove Digital criminal operations have been re-allocated by RIPE-NCC and advertised to the Internet: http://www.ris.ripe.net/cgi-bin/lg/index.cgi?rrc=RRC001&query=1&arg=85.255.112.0%2F20 http://www.ris.ripe.net/dashboard/85.255.112.0/20 As a reminder, the Rove Digital/DNS Changer Crew used the following IP address blocks for their nefarious activities: 85.255.112.0/20 67.210.0.0/20 93.188.160.0/21 77.67.83.0/24 213.109.64.0/20 64.28.176.0/20 From […]

canstockphoto6713279

Huawei’s “Customers” Share Accountability

Posted · Add Comment

Huawei responds to the DEFCON presentation ….  “We are aware of the media reports on security vulnerabilities in some small Huawei routers and are verifying these claims. Huawei adopts rigorous security strategies and policies to protect the network security of our customers and abides by industry standards and best practices in security risk and incident […]