When you use an Amazon Echo or other Alexa device, it stores bits of what you say on a server. What does this mean for your privacy? What are the legal implications?
When a user comes across a captive portal, how do browsers operating systems identify it is not a security threat? Here’s how each one handles captive portals and reports that intermediate state to users.
Network security and Fraud have been around for a long time in Cable Operations. As many posts related to this subject have stated, this is a big concern for MSOs. The most common fraud type in unsecured networks is still cloned cable modems. This is not new and there are many topics related to how this affects customer experience and the legal aspect of this practice.
One of the biggest problems Internet Service Providers (ISP) have nowadays is the existence of fraud in their DOCSIS networks. Tracking these “users” is almost an impossible mission. Lately, blocking them manually is proving to be more and more difficult. But what do we really know about fraud in DOCSIS networks? Can it be controlled? Here we’ll give you some quick tips about it.