Destination-Adjacent Source Address spoofing
Guest Post: With a side of IP TTL-based origin triangulation, is this a new surveying method, a unique attack, or just a scanner malfunction?
Guest Post: With a side of IP TTL-based origin triangulation, is this a new surveying method, a unique attack, or just a scanner malfunction?
A look into the recent .nz DNSSEC chain validation incident.
Dr Mona Jaber from QMUL discusses her research into the use of fibre optic communication systems to measure traffic, digital twins and social-science led research.
Guest Post: AbuseBox can check and monitor IP address blacklists and send delist requests.
How to extract greater capacity and reach from optical systems. Why is it useful?
About new email deliverability guidelines for Google, Yahoo, and Outlook.
Guest Post: After years of high prices for mobile data in Papua New Guinea, consumers are now able to access lower prices that represent better value.
Guest Post: The stubborn persistence of legacy technologies.
Guest Post: Applying physical early warning system frameworks to cyber hazards.
Guest Post: Real-life hijacks of cloud resources identified for the first time.