Web cache deception escalates!
Guest Post: WCD has consequences well beyond personal information leaks — attacks targeting non-authenticated pages are highly damaging.
Guest Post: WCD has consequences well beyond personal information leaks — attacks targeting non-authenticated pages are highly damaging.
Is the stability of the routing system changing?
Guest Post: Internet researchers and operators are overlooking a high-impact event that poses a significant threat to the Internet.
Geoff Huston analyses recent and historical BGP routing table growth and forecasts IPv4 and IPv6 BGP routing table growth for the next five years.
This year, George Michaelson touched on topics ranging from news to explainers. Here are three of George’s best.
Guest Post: Emerging IoT threats are quickly evolving and adapting to current defences.
Guest Post: A handful of large operators have been behind a significant increase in the adoption of anycast in top-level and second-level domains since 2017.
Guest Post: Study finds that TCP SYN-ACK is not an accurate indicator of service presence because of middlebox responses.
Guest Post: Google, Facebook and Netflix have invested heavily in deploying servers deep inside other networks over the past seven years.
Results of a study aiming to help inform the future of networking have been revealed.