CLDAP Reflection Attacks

Does the Internet “End” at 500K routes?

No! Of course, the Internet does not end at 500K routes. On August 13, 2014, there was a lot of “news” about instability issues on the Internet that might have been caused by a surge of new Internet routes (see articles like “Internet routers hitting 512K limit, some become unreliable” – http://arstechnica.com/security/2014/08/internet-routers-hitting-512k-limit-some-become-unreliable/). The most accurate write Read More

canstockphoto17647669

Don’t wait, prepare for the Internet Skills Gap

I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful as we all explore how we can bridge the Read More

canstockphoto17809542

Security Questions to ask Vendors

What security questions are you asking your vendors? The Bloomberg article, “How Russian Hackers Stole the Nasdaq,” is a sobering insight into today’s risk. It should be a wake-up call for all organizations in all parts of the world to understand that even the best security teams are facing an overwhelming threat. The focused expertise used by Read More

CLDAP Reflection Attacks

Korea LTE Operators Drive an Ecosystem to Ensure Profitability

“Little things” matter in the telecommunications business. The difference between profitability and “just getting by” often depends on small focus innovations that increase margin, open new business opportunities, and add to the top line revenue. Attention to the “small things” are easily seen with the big Korean SPs. Their success has less to do with Read More

CLDAP Reflection Attacks

“Getting the Right People on the Bus” Finding Staff with that Internet Spirit

Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a model that empowers  customers to drive the change in telecommunications. Telecommunications need to convert to “IP thinking” to succeed. They Read More

Cisco Data Meter

Crowd Sourcing as a Tool for Network Tuning

Excellent mobile customer experience is now the #1 factor keeping happy & paying customers. As the network grows in capacity, coverage, and complexity (heterogeneous network = complexity), the cost of constantly tuning the network also increases. The core mobility vendors[1] are putting forward a variety of “customer experience” tools. These tools work as an integral Read More

Camel-Xerocole

Using DNS to Protect Your Network and Your Customers

In cased you missed it, Xerocole & Damballa released two press releases on their new partnership: Xerocole’s link: Xerocole Partners with Damballa for Botnet Detection on Carrier Networks Damballa’s link: Damballa Enhances Cyber Threat Protection for Telecommunications and Internet Service Providers The Xerocole-Damballa partnership is another evolution of a security technique where the DNS recursive Read More

ripe-ncc

RIPE NCC Responds to the Rove Digital/DNS Changer Re-allocations

RIPE has publicly responded to the surprise felt by members of the DCWG and others involved with the Rove Digital/DNS Changer clean up community. The statement on their web page is as follows: 15 Aug 2012 — ripe ncc As reported in previous announcements, the RIPE NCC will go to court in the Netherlands on Read More

DCWG

Beware! DNS Changer’s IP Blocks are re-allocated and advertised!

As of Friday morning (August 10, 2012), the IP address blocks used by the Rove Digital criminal operations have been re-allocated by RIPE-NCC and advertised to the Internet: http://www.ris.ripe.net/cgi-bin/lg/index.cgi?rrc=RRC001&query=1&arg=85.255.112.0%2F20 http://www.ris.ripe.net/dashboard/85.255.112.0/20 As a reminder, the Rove Digital/DNS Changer Crew used the following IP address blocks for their nefarious activities: 85.255.112.0/20 67.210.0.0/20 93.188.160.0/21 77.67.83.0/24 213.109.64.0/20 64.28.176.0/20 From Read More

canstockphoto6713279

Huawei’s “Customers” Share Accountability

Huawei responds to the DEFCON presentation ….  “We are aware of the media reports on security vulnerabilities in some small Huawei routers and are verifying these claims. Huawei adopts rigorous security strategies and policies to protect the network security of our customers and abides by industry standards and best practices in security risk and incident Read More