Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/2/2008
07:10 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Will Comcast's New Bandwidth Limits Bring Rise In Wireless Broadband Hijacking?

Starting next month, Comcast says it will start metering the amount of bandwidth its customers can consume each month, and users that exceed the threshold may be cut. If I understand anything about human nature, this means that more people will steal the additional bandwidth they need.

Starting next month, Comcast says it will start metering the amount of bandwidth its customers can consume each month, and users that exceed the threshold may be cut. If I understand anything about human nature, this means that more people will steal the additional bandwidth they need.From a recent story by K. C. Jones:

This week, Comcast announced that it would phone customers who transfer more than 250 gigabytes of data each month. The company plans to ask those users to cut back.

As the announcement came out, Comcast explained that it wasn't a change in policy. The company said it is simply clarifying the gigabyte limit after customers who received calls asked for a specific threshold for data usage.

The limit will appear in an amended Acceptable Use Policy, which takes effect Oct. 1.

While announcing the limit, Comcast said the median monthly average for data use among its customers is about 2 or 3 GB. To reach the 250 GB threshold, a customer would have to send 50 million e-mail messages (at 0.05 KB), download 62,500 4 MB songs, download 125 standard movies (2 GB each), or upload 25,000 high-resolution photos (10 MB each), Comcast said.

I don't believe this policy has anything to do with limiting Internet usage so much. I think it has everything to do with curbing its customers from accessing the increased competition coming from iTunes, Netflix, and YouTube when it comes to video content. Comcast's core revenue still from cable TV subscriptions and pay-per-views. Now, after years of hype about movies over the Web, it's gearing up to get the status quo a real run for value.

But I digress, and I predict that this cap will not provide much any benefit to its customers, or even keep its competition at bay. But it will increase broadband theft, especially wireless broadband theft. People looking to get a few extra gigs of songs, or an extra HD move, or that copy of the mega-graphics suite from Pirate's Bay will more likely now hop in their car and drive until they find an open, unsecured WiFi connection. Hopefully not yours, and steal your WiFi for this big download.

It's all the more reason to make sure your wireless connection is secure , and that includes you Mr. Schneier.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27621
PUBLISHED: 2020-10-22
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inab...
CVE-2020-27620
PUBLISHED: 2020-10-22
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
CVE-2020-27619
PUBLISHED: 2020-10-22
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVE-2020-17454
PUBLISHED: 2020-10-21
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the "publisher" component's admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal b...
CVE-2020-24421
PUBLISHED: 2020-10-21
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.