Security News

Since 1997, the Supreme Court has used the metaphor of the free market of ideas to define the internet, thus addressing the regulation of the net as a matter of freedom of speech. Internet regulation should be framed not as a matter of freedom of speech, but as a matter of freedom to conduct a business, they argue.

The Internet Society Foundation has awarded over $1 million through its Research grant programme to seven projects that examine the future and sustainability of the internet. Project title: Creating a research strategy to green the internet.

Now it appears DDoS-Guard is about to be relieved of more than two-thirds of the Internet address space the company leases to clients - including the Internet addresses currently occupied by Parler. Much like Internet infrastructure firm CloudFlare, DDoS-Guard typically doesn't host sites directly but instead acts as a go-between to simultaneously keep the real Internet addresses of its clients confidential and to protect them from crippling Distributed Denial-of-Service attacks.

The cyber offensive is said to have originated in August last year, with the attacks aimed specifically at energy and construction companies, said researchers from Check Point Research today in a joint analysis in partnership with industrial cybersecurity firm Otorio. Although phishing campaigns engineered for credential theft are among the most prevalent reasons for data breaches, what makes this operation stand out is an operational security failure that led to the attackers unintentionally exposing the credentials they had stolen to the public Internet.

Seven vulnerabilities have been found in a popular DNS caching proxy and DHCP server known as dnsmasq, raising the possibility of widespread online attacks on networking devices. Dnsmasq 2.83, maintained by open source software developer Simon Kelley, has been released to address the issues, which recall the DNS cache poisoning vulnerability identified in 2008 by security researcher Dan Kaminsky.

Microsoft this week shared details on the steps it will take in an effort to ensure improved security for Internet routing. The Border Gateway Protocol routing protocol, on which the Internet runs, relies on autonomous systems to exchange routing and reachability information.

One of the operators behind a Mirai botnet pleaded guilty to their involvement in a huge DDoS attack that caused a massive Internet disruption during October 2016. The botnet, a variant of the Mirai botnet, was developed by the defendant with the help of others between roughly 2015 until November 2016, specifically for being used to target gaming platforms in DDoS attacks.

New research from CyberNews.com analyzed 15.2 billion passwords based on term categories, with only 2.2 billion being considered "Unique." People, the data showed, choose passwords based, obviously, on what they think they can remember, but can be deciphered by hackers based on the creator, patterns, and personality. About 7% of passwords were either curse words or sex-related.

28% of subscribers said they would definitely switch service providers to obtain a superior cybersecurity solution. Telecom providers are situated to provide security services.

FireMon announced an integration with Zscaler Internet Access to simplify enterprise adoption of Secure Access Service Edge architectures. As enterprises move to the cloud, they are adopting hybrid network security architectures that incorporate cloud-first technologies like SASE to improve flexibility, performance, and agility.