What security questions are you asking your vendors? The Bloomberg article, “How Russian Hackers Stole the Nasdaq,” is a sobering insight into today’s risk. It should be a wake-up call for all organizations in all parts of the world to understand that even the best security teams are facing an overwhelming threat. The focused expertise used by Read More
Korea LTE Operators Drive an Ecosystem to Ensure Profitability
“Little things” matter in the telecommunications business. The difference between profitability and “just getting by” often depends on small focus innovations that increase margin, open new business opportunities, and add to the top line revenue. Attention to the “small things” are easily seen with the big three Korean LTE Operators. Their success has less to Read More
Get the Right People on the Bus and Finding Staff with that Internet Spirit
How do you find the people with the Internet Spirit? How do you ‘get the right people on the bus?’ Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a Read More
Crowdsourcing as a Tool for Network Tuning
Excellent mobile customer experience is now the #1 factor keeping happy & paying customers. As the network grows in capacity, coverage, and complexity (heterogeneous network = complexity), the cost of constantly tuning the network also increases. The core mobility vendors[1] are putting forward a variety of “customer experience” tools. These tools work as an integral Read More
RIPE NCC Responds to the Rove Digital/DNS Changer Re-allocations
RIPE has publicly responded to the surprise felt by members of the DCWG and others involved with the Rove Digital/DNS Changer clean up community. The statement on their web page is as follows: 15 Aug 2012 — ripe ncc As reported in previous announcements, the RIPE NCC will go to court in the Netherlands on Read More
Beware! DNS Changer IP Blocks are re-allocated and advertised!
DNS Changer Update As of Friday morning (August 10, 2012), the IP address blocks used by the DNS Changer – Rove Digital criminal operations have been re-allocated by RIPE-NCC and advertised to the Internet: http://www.ris.ripe.net/cgi-bin/lg/index.cgi?rrc=RRC001&query=1&arg=85.255.112.0%2F20 http://www.ris.ripe.net/dashboard/85.255.112.0/20 As a reminder, the Rove Digital/DNS Changer Crew used the following IP address blocks for their nefarious activities: 85.255.112.0/20 Read More
Huawei’s Customers Share Accountability
Vendors have a responsibility to deliver products to the best of their “security” capacity. At the same time the vendor’s customer have a responsibility to push for security accountability. Huawei’s Customers share accountability for the lack of security capabilities and capacity. Huawei responds to the DEFCON presentation …. “We are aware of the media reports Read More
Huawei Vulnerabilities – the Real Risk & what you should do now
The Facts: Two researchers from Recurity Labs – Felix Lindner (also known as “FX”) and Gregor Kopf – presented a talk at DEFCON titled: Hacking [Redacted] Routers. (see https://www.defcon.org/html/defcon-20/dc-20-speakers.html#FX). Their work examined the Huawei AR18 and AR28 routers. Exploitable vulnerabilities were discovered. Questions to the quality of the code were raised. A general concern in Read More
Everyone should be deploying BCP 38! Wait, they are ….
Have you deployed BCP 38 in your network? For most networks, the answer is yes. During last week’s FCC CSRIC III meeting, several people called on operators to deploy “BCP 38.” This IETF best common practice (BCP) is packet filter placed on the edge of networks to insure that the IP source cannot pretend to Read More
Flashback Malware – Check your MAC Now! Are you one of the 500,000?
Dr Web has released a tool to check to see if your MAC is showing up in their list of +500K infected computers. The Flashback.k malware uses the MAC’s UUID to identify the computer. UUID is Universally Unique IDentifier, defined in RFC 4122, ITU-T Rec. X.667 and ISO/IEC 11578:1996, used by Apple to identify the Read More