Do you trust your home router?
Guest Post: A team of cybersecurity researchers are seeking to understand how malware infects home routers to develop ways to protect them from being used in DDoS attacks.
Guest Post: A team of cybersecurity researchers are seeking to understand how malware infects home routers to develop ways to protect them from being used in DDoS attacks.
Guest Post: Guarding against server impersonation attacks using Server Location Verification.
Guest Post: Protecting Internet geolocation services from manipulation using Client Presence Verification.
Guest Post: There are limits to the benefits HTTPS provides, even when deployed properly.
Guest Post: Learn how one unsuspecting subdomain owner managed to serve 390,000+ PDF books without any servers being compromised.
Guest Post: Study scans 600 million certificates from 30 CT logs to analyze the application of best security practices.
Guest Post: A look at the geographic verification techniques Client Presence Verification and Server Location Verification
APNIC held a social event for attendees of the PacSON meeting in Brisbane last week.
APNIC recently travelled to the world’s smallest economy, Tokelau, to assist with developing in-country capacity to deploy IPv6.
Guest Post: To what extent does price and return on investment play on the adoption of DNSSEC?