Technology and Innovation

Latest articles

Bert Hubert: Internet Privacy and the Cost of Losing Control

Bert Hubert: Internet Privacy and the Cost of Losing Control

Alun Davies

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Article tags:

49 You have liked this article 0 times.
0
Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

11 You have liked this article 0 times.
0
Geoff Huston: Starlink and the Future of Low-Orbit Internet

Geoff Huston: Starlink and the Future of Low-Orbit Internet

Anastasiya Pak

Starlink's megaconstellations deliver broadband Internet to customers around the globe. But while the tech promises to democratise Internet access, it's not always clear how existing protocols and regulations apply beyond the clouds. In this episode, Geoff Huston talks about the future of low-orbit…

Article tags:

27 You have liked this article 0 times.
0
Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Moritz Müller

10 min read

EU sanctions on Russian controlled content require ISPs in member states to block access to websites. But our research reveals that their implementation varies widely, both between and within individual EU member states, raising important questions about their effectiveness.

Article tags:

36 You have liked this article 0 times.
0

All articles

NTP Pool - The Internet Timekeeper

NTP Pool - The Internet Timekeeper

Giovane Moura

12 min read

The NTP Pool is a network of volunteer-run servers providing time synchronisation services to millions of computers over the Internet using the Network Time Protocol (NTP). But how does it map clients to NTP servers? And why are some clients more equal than others? The team at SIDN Labs investigate…

Article tags:

40 You have liked this article 0 times.
2
Measuring NAT64 Usage in the Wild

Measuring NAT64 Usage in the Wild

Elizabeth Boswell

7 min read

With IPv4 address space depleted, it's increasingly important to transition to IPv6. IPv6 transition mechanisms, which allow the two protocols to interoperate, can help. One such mechanism is NAT64. We use RIPE Atlas to measure the usage of NAT64, and compare NAT64 paths to native IPv4 paths.

Article tags:

50 You have liked this article 0 times.
0
Qasim Lone: Something's Wrong on the Internet

Qasim Lone: Something's Wrong on the Internet

Alun Davies

The Internet is hardly foolproof in its design, and whether by accident or on purpose, the people who use and operate it sometimes don't do things they should or do do things they shouldn't. Qasim Lone talks about strange goings on he's investigated and how RIPE Atlas can help researchers in the fi…

Article tags:

36 You have liked this article 0 times.
0
Crashing the Party – Vulnerabilities in RPKI Relying Party Software

Crashing the Party – Vulnerabilities in RPKI Relying Party Software

Niklas Vogel

10 min read

RPKI adoption is on the rise. And that's a good thing. But as the number of networks deploying RPKI grows, so does the potential impact of vulnerabilities in its implementation. CURE is a novel fuzzing tool developed by ATHENE researchers to test vulnerabilities in RPKI Replying Party software.

Article tags:

36 You have liked this article 0 times.
0
KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

Haya Schulmann

10 min read

KeyTrap - described by some as 'the worst attack on DNS ever discovered' - is capable of exhausting CPU resources and stalling widely used DNS implementations and public DNS providers, like Google Public DNS and Cloudflare. The research team from ATHENE explain how they discovered the attack.

Article tags:

52 You have liked this article 0 times.
1
The State of Reverse DNS

The State of Reverse DNS

Arnold Dechamps

7 min read

Most people know DNS for the part that resolves a domain name to an IP address. Reverse DNS, as the name suggests, works the other way around, and is generally less talked about. The question is, when people do implement reverse DNS, are they taking steps to keep it secure?

Article tags:

34 You have liked this article 0 times.
3

Showing 188 article(s)

Previous
1 2 3 ... 19
Next