Press

"IPv6 Adoption Starting to Add Up to Real Numbers: 0.6 Percent"
August 28, 2014 | Iljitsch van Beijnum, Ars Technica

In a paper presented at the prestigious ACM SIGCOMM conference last week, researchers from the University of Michigan, the International Computer Science Institute, Arbor Networks, and Verisign Labs presented the paper "Measuring IPv6 Adoption." In it, the team does just that—in 12 different ways, no less. The results from these different measurements don't exactly agree, with the lowest and the highest being two orders of magnitude (close to a factor 100) apart. But the overall picture that emerges is one of a protocol that's quickly capturing its own place under the sun next to its big brother IPv4.

"IPv4 Is Not Enough"
August 26, 2014 | Marc Eisenbarth, Arbor Networks IT Security Blog

Last week in Chicago, at the annual SIGCOMM flagship research conference on networking, Arbor collaborators presented some exciting developments in the ongoing story of IPv6 roll out. This joint work (full paper here) between Arbor Networks, the University of Michigan, the International Computer Science Institute, Verisign Labs, and the University of Illinois highlighted how both the pace and nature of IPv6 adoption has made a pretty dramatic shift in just the last couple of years. This study is a thorough, well-researched, effective analysis and discussion of numerous published and previously unpublished measurements focused on the state of IPv6 deployment.

"What Do You Do With 100 Million Photos? David A. Shamma and the Flickr Photos Dataset"
August 25, 2014 | Trevor Owens, The Signal, Library of Congress

Every day, people from around the world upload photos to share on a range of social media sites and web applications. The results are astounding; collections of billions of digital photographs are now stored and managed by several companies and organizations. In this context, Yahoo Labs recently announced that they were making a data set of 100 million Creative Commons photos from Flickr available to researchers.

An analysis by security researchers of 48,000 extensions for Google’s Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.

"Arab Monarchies Use Malware to Track Journalists"
July 31, 2014 | Joseph Marks, Politico

U.S. allies Bahrain and the United Arab Emirates, along with Syria, are using malicious email and Facebook messages to track and entrap journalists, dissidents and campaigners, who face jail and torture if identified and arrested, according to a new study.

Researchers at Toronto-based Citizen Lab have shot down denials by Syria, Bahrain and the United Arab Emirates regarding attacks against activists, journalists and dissidents, labelling some of the assaults as incompetent.

"Service Drains Competitors’ Online Ad Budget"
July 25, 2014 | Brian Krebs, Krebs on Security

The longer one lurks in the Internet underground, the more difficult it becomes to ignore the harsh reality that for nearly every legitimate online business there is a cybercrime-oriented anti-business. Case in point: Today’s post looks at a popular service that helps crooked online marketers exhaust the Google AdWords budgets of their competitors.

Yahoo has released a massive dataset for researchers to experiment on. The dataset includes URLs for nearly 100 million images and 700,000 videos, as well as their metadata. Soon, a larger supercomputer-processed dataset that includes audio and visual features will be available.

"2014: The Year Extortion Went Mainstream"
June 26, 2016 | Brian Krebs, Krebs on Security

The year 2014 may well go down in the history books as the year that extortion attacks went mainstream. Fueled largely by the emergence of the anonymous online currency Bitcoin, these shakedowns are blurring the lines between online and offline fraud, and giving novice computer users a crash course in modern-day cybercrime.

"How the FBI Brought Down Cyber-Underworld Site Silk Road"
May 15, 2014 | Donna Leinwand Leger, USA Today

Criminals who prowl the cyber-underworld's "darknet" thought law enforcement couldn't crack their anonymous trade in illegal drugs, guns and porn. But a series of arrests this month, including the bust of the black market site Silk Road, shows the G-men have infiltrated the Internet's back alley.

Pages