Route Hijacking: Identity Theft of Internet Infrastructure
Peter Svensson gives an old and quite serious problem some mainstream press in this AP story from 8 May 2010: On April 25, 1997, millions of people in North America lost access to all of the Internet...
View ArticleWhat about the Therac-25?
Someone suggested that Dennis Quaid should be reminded of the Therac-25 “if he thinks computers will reduce risk without a huge investment in quality, quality assurance and operational analysis.” For...
View ArticleWhat we can learn from the Therac-25
What does Nancy Leveson’s classic analysis of the Therac-25 recommend? (“An Investigation of the Therac-25 Accidents,” by Nancy Leveson, University of Washington and Clark S. Turner, University of...
View ArticleQuis custodiet ipsos medici?
Internet security is in a position similar to that of safety in the medical industry. Many doctors have an opinion like this one, quoted by Kent Bottles: “Only 33% of my patients with diabetes have...
View ArticleOur Friend Unfairly Maligned in London’s Court
Many of you are concerned as am I about our friend who has been hauled into court in London and unfairly maligned for the “crime” of distributing some government communications that he got from an...
View ArticleEgypt Returns
Egypt returned to the Internet about 09:30 GMT today (2 February 2011). This sudden return after being as suddenly disconnected one week ago (27 January 2011) is obviously not due to ordinary causes...
View ArticleISPs, spam, and botnets? a case in Finland
In Finland, some ISPs proactively detect spamming botnets and do something about it. A small company that does computer maintenance, “HS-Works Oy” located in Helsinki, Finland, received a computer...
View ArticleSyria and Yemen: 29 November 2012
At 10:30 AM GMT yesterday, 29 November 2012, routing to Yemen suddenly changed from London to Dubai through FLAG to New York to Dubai through ETISALAT, as shown in the animation here and detailed in...
View ArticleCompanies fear reputation for bad security
As more companies come out of the closet about their Internet security being compromised, still more start to admit it. But many (perhaps most) don’t even know. Fortunately, there is a way the public...
View ArticleAn Eerie Silence on Cybersecurity
Apparently it takes an alleged Chinese threat to get the New York Times to notice Internet security problems. The Times has escalated from a recent article to an editorial. NYTimes Editorial 26...
View Article
More Pages to Explore .....