Technology and Innovation

Latest articles

KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

Haya Schulmann

10 min read

KeyTrap - described by some as 'the worst attack on DNS ever discovered' - is capable of exhausting CPU resources and stalling widely used DNS implementations and public DNS providers, like Google Public DNS and Cloudflare. The research team from ATHENE explain how they discovered the attack.

Article tags:

44 You have liked this article 0 times.
1
The State of Reverse DNS

The State of Reverse DNS

Arnold Dechamps

7 min read

Most people know DNS for the part that resolves a domain name to an IP address. Reverse DNS, as the name suggests, works the other way around, and is generally less talked about. The question is, when people do implement reverse DNS, are they taking steps to keep it secure?

Article tags:

26 You have liked this article 0 times.
1
Unlocking Digital Growth: The Role of IXPs in the Middle East

Unlocking Digital Growth: The Role of IXPs in the Middle East

Jad El Cham

4 min read

What does it take for an IXP to be successful? What requirements are these crucial bits of Internet infrastructure meant to fulfil? Do any of these questions have one-size-fits-all answers? A new report from the RIPE NCC explores all of the above and more in the context of Middle East IXPs.

Article tags:

46 You have liked this article 0 times.
2
The LLM Misinformation Problem I Was Not Expecting

The LLM Misinformation Problem I Was Not Expecting

Kathleen Moriarty

5 min read

The prolific use of Artificial Intelligence Large Language Models (LLMs) present new challenges we must address and new questions we must answer. For instance, what do we do when AI is wrong?

Article tags:

23 You have liked this article 0 times.
3

All articles

André Grilo: Ready or Not - Rethinking Cybersecurity for a Post-Quantum World

André Grilo: Ready or Not - Rethinking Cybersecurity for a Post-Quantum World

Anastasiya Pak

Quantum technologies promise all kinds of fascinating possibilities, but they also come with risks. In this episode, André Grilo, founder and CEO of QuantumNova, talks about why we need to start investing in post-quantum cryptography to protect ourselves against post-quantum threats.

Article tags:

35 You have liked this article 0 times.
0
A Quantum-Safe Cryptography DNSSEC Testbed

A Quantum-Safe Cryptography DNSSEC Testbed

Caspar Schutijser

7 min read

As the prospect of more powerful quantum computers looms on the digital horizon, questions emerge over the threat this might pose to many of the cryptographic functions used in Internet security. The team at SIDN Labs has been working to evaluate the impact of quantum-safe cryptography algorithms o…

Article tags:

17 You have liked this article 0 times.
1
Palestine Internet Connectivity as Seen in BGP

Palestine Internet Connectivity as Seen in BGP

Qasim Lone

9 min read

What does Internet routing data tell us about how the Internet in Palestine has fared since the outbreak of war in October.

Article tags:

84 You have liked this article 0 times.
0
The Need for Programmability in Routing Protocols

The Need for Programmability in Routing Protocols

Thomas Wirtgen

11 min read

Networks change over time, and so do their needs. In response, network operators are constantly improving the services they offer, which often leads to proposals for new features to extend network protocols. To help speed up network innovation, we introduce xBGP, which allows all BGP implementation…

Article tags:

17 You have liked this article 0 times.
2
RIPE NCC Internet Country Report: Türkiye

RIPE NCC Internet Country Report: Türkiye

Suzanne Taylor

3 min read

We take a comprehensive look at the Internet landscape in Türkiye as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

19 You have liked this article 0 times.
0
Are IoT Safeguards Keeping Smart Homes Safe?

Are IoT Safeguards Keeping Smart Homes Safe?

Anna Maria Mandalari

3 min read

With IoT devices becoming an increasingly common and convenient addition to our daily lives, we examine whether the safeguards meant to maintain security and privacy when using these devices are actually effective.

Article tags:

15 You have liked this article 0 times.
0

Showing 180 article(s)

Previous
1 2 3 ... 18
Next