“Zoombombing” Is The New Global Pandemic
Zoom has become a target for harassment and abuse coordinated in private off-platform chats. By Taylor…
Zoom has become a target for harassment and abuse coordinated in private off-platform chats. By Taylor…
In July of 2014 I wrote a blog post on this site, reporting the growing controversy and debate within the Internet community about the rise of a balkanized Internet, typified by the Chinese “Great Firewall.” Bill Gates and Vin Cerf argued that the Internet was too expansive and pervasive for government restrictions on the Internet to succeed. On the other side, Eric Schmidt and John Chamber of Cisco railed against the NSA metadata snooping as a contributing factor in the development of the “Splinternet,” that would severely harm American technology leadership.
It’s Still a Tower of Babble Privacy and Security Remain the Thorniest Problems I want…
A detailed report, prepared by Finite State, a Columbus, Ohio-based cybersecurity firm, concludes that Huawei telecom switching gear is far more vulnerable to hacking than other vendors’ hardware due to firmware flaws and inadvertent “back doors” that were discovered. The report has been circulated widely among cybersecurity experts in the U.S. and UK, and it is considered credible.
This post focuses on a particularly important technology market, the Internet of Things. IoT is at a strategic inflection point, due to explosive projected market growth and unresolved problems of wireless data throughput and energy-efficiency needs. The IoT market is projected to grow to 75 Billion devices by 2025. This growth is predicated on very high throughput wireless networks combined with high energy-efficiency which are not yet available. Existing wireless technologies, including 5G, will not meet this market need. Also, the extreme diversity of IoT applications will require both small sensors that operate using minimal energy and bandwidth and virtual reality applications with very high Gigabit per second data rates and substantial power requirements.
Five years ago, I wrote a post on this blog disparaging the state of the Internet of Things/home automation market as a “Tower of Proprietary Babble.” Vendors of many different home and industrial product offerings were literally speaking different languages, making their products inoperable with other complementary products from other vendors. The market was being constrained by its immaturity and a failure to grasp the importance of open standards. A 2017 Verizon report concluded that “an absence of industry-wide standards…represented greater than 50% of executives concerns about IoT. Today I can report that finally, the solutions and technologies are beginning to come together, albeit still slowly.Â
A year ago, a DDoS attack caused internet outages around the US by targeting the internet-infrastructure company Dyn, which provides Domain Name System services to look up web servers. Monday saw a nationwide series of outages as well, but with a more pedestrian cause: a misconfiguration at Level 3, an internet backbone company—and enterprise ISP—that underpins other big networks. Network analysts say that the misconfiguration was a routing issue that created a ripple effect, causing problems for companies like Comcast, Spectrum, Verizon, Cox, and RCN across the country.
Many know the name Kaspersky well. Others may only dimly recognize the brand name. Its anti-virus and Internet security software has been around for years in computer stores and OEM’d with computer systems. More than a year ago, I became concerned about what I was learning about Kaspersky Lab and its headquarters in Moscow, I began asking myself hypothetical rhetorical questions. What if Kaspersky was quietly working with the Russian FSB? What if Kaspersky had installed a sleeping Trojan Horse in millions of copies of its consumer computer security software? I was a user of Kaspersky Lab cybersecurity software myself. I knew that it was rated very highly by the tech journals. I liked its elegance and simplicity compared with other competitor products from U.S. based companies like Symantec and McAffee. Â Nevertheless, as the Russian hacking of the 2016 election became an ever-larger issue, I decided to pull the plug on Kaspersky because of my fears, though there was no direct evidence of collusion between Kaspersky and the Kremlin at that time, wiped my system clean, and installed another competitor product.Â
Anonymous, the murky global and leaderless hacking group has struck out on a campaign to disrupt ISIS’ sophisticated use of the Internet and social media. It claims to have disabled over 11,000 identified ISIS Twitter accounts with looped Rick Astley videos. For those of you not familiar with Rick Astley, he was a 1980’s British pop star of limited talent, whose videos are sometimes painful to watch. For unknown reasons, Astley’s videos have been used in a variety of online pranks and hacking incidents. So Anonymous did the convenient thing and used old Astley videos, a tactic now known as “RickRolling”, to disrupt and confound ISIS Twitter and other social media accounts. I like it. Striking back in this way is probably causing smiles in the French Intelligence Service, U.S. Defense Department, NSA, and GCHQ in the UK.