Can you detect new exploits with old techniques?
Guest Post: Why aren’t the good guys ahead of the bad guys when it comes to detecting covert channels and exploiting known vulnerabilities?
Guest Post: Why aren’t the good guys ahead of the bad guys when it comes to detecting covert channels and exploiting known vulnerabilities?
Guest Post: RFC8188 provides protocol designers a new option for building multi-party protocols with HTTPS by defining a standardized format for encrypting HTTP message bodies.
Geoff recaps some highlights from the technical presentations at RIPE 75 in Dubai.
Guest Post: New research by NZRS provides more insight into how New Zealand’s .nz domains are secured.
APNIC has resolved a whois security incident resulting from a technical error during the upgrade of APNIC’s whois database.
Guest Post: Transport Layer Security 1.3 has been designed to be more secure in order to prevent the interception of sessions over the Internet.
Topics discussed at day two of DNS OARC 27 included the risks to the DNS associated with IPv6 and a project to reduce unnecessary traffic on the roots.
APNIC is playing a role in coordinating cybersecurity activities in the Pacific to maximize the benefit to the Internet community.
APNIC was invited to attend the launch of the Australian government’s International Cyber Engagement Strategy in Sydney on 4 October 2017.
Professor Shian-Shyong Tseng provides an insight into the history of Taiwan’s Internet registry, TWNIC.