Why We All Should Be Concerned About The Sony PlayStation Data Loss Incident

When I first read about the Sony PlayStation incident in which data theft occurred, I thought to myself it didn’t concern me. So what if some hacker obtained the names, addresses, email addresses credit card information of some 77 million users of Sony PlayStation online, since I don’t own such a beast. But as the week progressed and we learned more about the intrusion it became more apparent that this incident could have a far reaching affect for all of us.

Many of us, me included, use our credit cards for online purchases for everything from buying electronic equipment to buying applications for other devices we own. Though Sony has turned over the information about the break in to the F.B.I. and has warned Sony PlayStation users of the break in, what hasn’t been addressed as of yet is why the data was insecure to begin with?

This afternoon I sat down and added up the number of companies that have stored my informatoin on their servers. Information that could compromise my credit card account or my checking account. PayPal has both. I determined that there are 17 companies that have this information including my name, home address, email address, credit card account information and unfortunately my DOB and social security number, in some cases.

What has always amazed me is that social security numbers were never designed to be a secure means of identification. There was a time when it was stated on the social security card that it was not to be used to ID a person. But this has slipped through the cracks over the years and social security numbers are used to identify us. Armed with our DOB and social security number, thieves can steal our identity easily.

We should be concerned because it seems that whenever an incident happens in which consumer identification could be compromised along with credit information, little is ever done to hold the company responsible accountable. Telling the consumer to monitor your credit charges in case of illegal activity is like telling a murder victim to apprehend the suspect who killed them.

I believe that all companies who store our identification on their servers owe us the proper protections to keep prying eyes away from the information. Until this happens we are all at risk of identity theft.

M.A.D.

There should be an image here!Shall we play a game, professor?”

Remember back in the day when there was no worldwide implementation of TCP/IP and the Web, Galaga was #1 in the videogame scene, and a W.O.P.R. wasn’t something you could get with or without the fixings?

Despite the lack of readily available networking technology back in the early eighties, there were still those who had the skills to phreak and hack…

This is a black t-shirt with a flat map of the world in white. Red dotted trajectories interconnect all the continents, and the phrase ‘The only winning move is not to play’ is written in a glow-like, terminal-styled font beneath.

CEH Certified Ethical Hacker Study Guide

There should be an image here!Prepare for the new version of CEH certification with the CEH Certified Ethical Hacker Study Guide.

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That’s the philosophy behind ethical hacking, and it’s a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.

  • Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
  • Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
  • Includes a CD with review questions, bonus exams, and more study tools

This is the ideal guide to prepare you for the new CEH certification exam.

One Hacker Says Apple And Mac Users Don’t Take Security Seriously

Most of us, like myself, who have been using Windows based PCs since Windows was in diapers, know how to effectively protect our systems from attack. Using a variety of third party software, we Windows users know that we must protect our computers from outside attacks. Through the years Windows users have been made fun of by Mac users who like to point out how virus free their machines are. But even with Apple having a few stellar years selling its Mac stuff, Windows still remains the operating system of choice for most of us.

But now Mac users are coming under attack, by those same hackers, that have made Window users cringe. What these hackers are finding is that neither Apple nor Mac users haven’t a clue about security. These same people who had bad mouthed Windows for years are now going to get a taste of infections specifically designed to bring their systems to its knees. One well known hacker states:

Marc Maiffret, currently chief security architect at security firm FireEye first gained a modicum of fame as a hacker targeting Microsoft products. For example, he uncovered the security hole that the Code Red worm exploited back in 2001 to attack Windows servers.

He’s been no stranger to publicity, being one of the hackers featured on MTV’s I’m a Hacker, and named as one of People Magazine’s “Next Wave” of people to watch, back in 2004.

In an interview with CNet, he claims that Microsoft takes security more seriously than does Apple, and excoriates Apple fans as being “ignorant” about security risks.

Maiffret says he believes Microsoft does one of the best jobs in the industry around security, telling CNet:

“From an internal process in how they go about auditing their code and securing software from a technical perspective, they do have one of the best models. The area they still have room for improvement is around time lines of how long it takes for them to fix things.”

As for Apple and its fans, he has very little good to say, saying that the Mac is vulnerable, and its fans ignorant about security risks:

“…they try to market themselves as more secure than the PC, that you don’t have to worry about viruses, etc. Anytime there’s been a hacking contest, within a few hours someone’s found a new Apple vulnerability. If they were taking it seriously, they wouldn’t claim to be more secure than Microsoft because they are very much not. And the Apple community is pretty ignorant to the risks that are out there as it relates to Apple. The reason we don’t see more attacks out there compared to Microsoft is because their market share isn’t near what Microsoft’s is.”

Interesting take from one hacker’s perspective. But what do you think? If you are a Mac user do you give a second thought about security or do you think your system is exempt from being hacked?

Comments welcome.

Source – PC World

Don’t Let Malware Score This March

There should be an image here!Are you ready for March Madness? Have you filled out your bracket selections? This is the time of year when people want to check the latest scores, follow their favorite teams and, perhaps, watch that impossible last second shot that somehow found the hoop. You even may have signed up to receive the scores from some Internet service.

Criminals and hackers know there is an increased interest in basketball at this time of year. They have geared their malware to meet this interest. These cybercriminals take March Madness just as another opportunity to spread their malware trash and infect computers.

When your interest is occupied with quickly finding out the basketball score or how your favorite team is doing, you may not be as focused on computer security. You may be rushing. You may be distracted. Criminals count on that. This is just an example of how Internet activity can be used to victimize the computer user. The examples really are many and these hackers are good at taking advantage of each and every opportunity.

If you want to be safe on the Internet, firewalls, and security products are absolutely necessary. This space makes it a regular habit of reminding our readers of the need to be active in protecting your computer and personal, confidential information. While we recommend the very best programs that are available, no anti-virus or anti-malware product can guarantee that they are a hundred percent effective. It would be just an impossible guarantee for any company to make. The speed of the Internet is too dynamic and the opportunities for crime arise too quickly. Besides, there is always the factor of ‘user error.’

There is a final line of defense, though. There is one product that we believe is necessary and that we recommend. That product is WinPatrol Plus and there is really good reason for using it.

Some malware can install without you having to do anything. These are the so-called “drive-by” downloads. You probably would not know that a malware program has been installed. The hackers are that good at compromising your system, but there is a way to protect your machine constantly. WinPatrol Plus is like a watchdog for your computer, and, like a great watchdog, it alerts you if there are any attempted changes on your machine. That means that you have a chance to stop a malware installation because WinPatrol Plus has your machine under constant surveillance.

You decide whether to allow any changes on the machine. Even the changes that legitimate programs attempt to make will be noted, and you will have to allow permission. For example, some programs you use now may ‘phone home’ and want to update. WinPatrol Plus will alert you to see if you want this update. It is an extra layer of security — and it prevents a load of problems.

Bill Pytlovany is giving our readers a terrific discount on WinPatrol Plus. Bill is a recognized security expert, with decades of experience. Bill is a recognized expert by Microsoft in its MVP program and, fortunately, a friend of this publication. Bill is reducing the cost of this program by ten dollars. WinPatrol Plus supports “Windows 98 – Windows 7 including x64 systems.”

This offer is valid from March 16 – 24, 2010.

This is affordable protection. Malware still needs to install on your machine for it to work. WinPatrol Plus gives you that final, last chance to stop an infection, even though you have a firewall and other security programs. We use this product. There are many Gnomies who would not be without WinPatrol Plus on any of their computers. We recommend it without any hesitation — and it is a huge bargain at this price. Consider this a “must have” program.

March Malware Madness

There should be an image here!Are you ready for March Madness? Have you filled out your bracket selections? This is the time of year when people want to check the latest scores, follow their favorite teams and, perhaps, watch that impossible last second shot that somehow found the hoop. You even may have signed up to receive the scores from some Internet service.

Criminals and hackers know there is an increased interest in basketball at this time of year. They have geared their malware to meet this interest. These cybercriminals take March Madness just as another opportunity to spread their malware trash and infect computers.

When your interest is occupied with quickly finding out the basketball score or how your favorite team is doing, you may not be as focused on computer security. You may be rushing. You may be distracted. Criminals count on that. This is just an example of how Internet activity can be used to victimize the computer user. The examples really are many and these hackers are good at taking advantage of each and every opportunity.

If you want to be safe on the Internet, firewalls, and security products are absolutely necessary. This space makes it a regular habit of reminding our readers of the need to be active in protecting your computer and personal, confidential information. While we recommend the very best programs that are available, no anti-virus or anti-malware product can guarantee that they are a hundred percent effective. It would be just an impossible guarantee for any company to make. The speed of the Internet is too dynamic and the opportunities for crime arise too quickly. Besides, there is always the factor of ‘user error.’

There is a final line of defense, though. There is one product that we believe is necessary and that we recommend. That product is WinPatrol Plus and there is really good reason for using it.

Some malware can install without you having to do anything. These are the so-called “drive-by” downloads. You probably would not know that a malware program has been installed. The hackers are that good at compromising your system, but there is a way to protect your machine constantly. WinPatrol Plus is like a watchdog for your computer, and, like a great watchdog, it alerts you if there are any attempted changes on your machine. That means that you have a chance to stop a malware installation because WinPatrol Plus has your machine under constant surveillance.

You decide whether to allow any changes on the machine. Even the changes that legitimate programs attempt to make will be noted, and you will have to allow permission. For example, some programs you use now may ‘phone home’ and want to update. WinPatrol Plus will alert you to see if you want this update. It is an extra layer of security — and it prevents a load of problems.

Bill Pytlovany is giving our readers a terrific discount on WinPatrol Plus. Bill is a recognized security expert, with decades of experience. Bill is a recognized expert by Microsoft in its MVP program and, fortunately, a friend of this publication. Bill is reducing the cost of this program by ten dollars. WinPatrol Plus supports “Windows 98 – Windows 7 including x64 systems.”

This offer is valid from March 16 – 24, 2010.

This is affordable protection. Malware still needs to install on your machine for it to work. WinPatrol Plus gives you that final, last chance to stop an infection, even though you have a firewall and other security programs. We use this product. There are many Gnomies who would not be without WinPatrol Plus on any of their computers. We recommend it without any hesitation — and it is a huge bargain at this price. Consider this a “must have” program.

Botnet Detection: Countering the Largest Security Threat

There should be an image here!Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on botnets. This edited volume represents the state-of-the-art in research on botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.

Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science.

Inside Cyber Warfare: Mapping The Cyber Underworld

There should be an image here!You may have heard about “cyber warfare” in the news, but do you really know what it is? Inside Cyber Warfare: Mapping the Cyber Underworld provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You’ll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social Web are mined by the intelligence services of many nations
  • Read about China’s commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who’s responsible
  • Learn how hackers are “weaponizing” malware to attack vulnerabilities at the application level

About the Author

Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, a columnist for Symantec’s Security Focus, and an author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.

Inside Cyber Warfare: Mapping The Cyber Underworld

There should be an image here!You may have heard about “cyber warfare” in the news, but do you really know what it is? Inside Cyber Warfare: Mapping the Cyber Underworld provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You’ll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social Web are mined by the intelligence services of many nations
  • Read about China’s commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who’s responsible
  • Learn how hackers are “weaponizing” malware to attack vulnerabilities at the application level

About the Author

Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, a columnist for Symantec’s Security Focus, and an author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.

Hackers Suffer In This Economy?

There should be an image here!One of the absurdities that is circulating is that even hackers are suffering in this economy. With the tough economic situation, supposedly hackers are having more competition. This is just one of the theories to explain why there is a steady increase in malware and criminal activity such as phishing and identity theft.

Whether it is a natural disaster or the death of a celebrity, hackers / criminals are almost always first responders, ready to exploit the situation at hand for personal gain. For example, you may find email that supposedly gives you the latest news about a tragic situation that just occurred. The news story itself may have happened, but that email is dangerous. It could carry malware.

The email is just one venue. Are you on Facebook? Have you joined Twitter? These are just some of the examples of social media where people are sharing and clicking on links. If you are on Twitter and have a good number of followers, there are links posted every minute. It would be so easy for a hacker to play the social network and drop some malicious link there — and it will happen more and more often.

There’s even a spam campaign on YouTube. Reports say that the this spam does not contain malware, however, it may be a matter of time before slick malware infections find their way onto this popular video site.

This should be frightening to you. These hackers / criminals want to exploit you and your computer. You may think you are careful enough, however, no one can be vigilant 100% of the time. There are drive-by downloads that can install things on your machine without your even having to click a link. This is the type of incidence that calls for an excellent security regime on your computer. You should have an anti-virus, a firewall, and at least one anti-spyware program running at all times. It is foolish to be online without security protection. For an anti-spyware program, we are recommending SUPERAntiSpyware. We have an excellent deal for you that offers real time protection:

SUPERAntiSpyware has “Real-Time Blocking of threats! Prevent potentially harmful software from installing or re-installing! First Chance Prevention examines over 50 critical points of your system each time your system starts up and shuts down to eliminate threats before they have a chance to infect and infiltrate your system.”

SUPERAntiSpyware offers much, much more and you can read about it at the links provided. This program is being offered at a special rate for our readers of ten dollars ($10.00) off until October 15, 2009.

Use this link for the discount when buying.

This is a program that is highly recommended within the security community. People who work on these pages use it and recommend it, too. We use it. We need it and so do you. SUPERAntiSpyware will detect and remove spyware, adware, malware, Trojans, dialers, worms, keyloggers, hijackers, rootkits, and many other types of threats. This program is easy to use and it is effective. If you have any problems with SUPERAntiSpyware, let us know. We will tell the founder / director of the company and have any problems addressed. Nick Skrepetos is well known in the security community and he stands behind his products. If you need this program in large numbers, let us know. We will see if we can help with pricing for your company.

You may be wondering why we are recommending security programs when there are programs that are available for free. There is an old adage: ‘You get what you pay for.’ SUPERAntiSpyware has been doing Internet security for years. It is excellent. It works. It protects our machines and has for years. That’s why we recommend it.

SUPERAntiSpyware Discount For Gnomies

There should be an image here!One of the absurdities that is circulating is that even hackers are suffering in this economy. With the tough economic situation, supposedly hackers are having more competition. This is just one of the theories to explain why there is a steady increase in malware and criminal activity such as phishing and identity theft.

Whether it is a natural disaster or the death of a celebrity, hackers / criminals are almost always first responders, ready to exploit the situation at hand for personal gain. For example, you may find email that supposedly gives you the latest news about a tragic situation that just occurred. The news story itself may have happened, but that email is dangerous. It could carry malware.

The email is just one venue. Are you on Facebook? Have you joined Twitter? These are just some of the examples of social media where people are sharing and clicking on links. If you are on Twitter and have a good number of followers, there are links posted every minute. It would be so easy for a hacker to play the social network and drop some malicious link there — and it will happen more and more often.

There’s even a spam campaign on YouTube. Reports say that the this spam does not contain malware, however, it may be a matter of time before slick malware infections find their way onto this popular video site.

This should be frightening to you. These hackers / criminals want to exploit you and your computer. You may think you are careful enough, however, no one can be vigilant 100% of the time. There are drive-by downloads that can install things on your machine without your even having to click a link. This is the type of incidence that calls for an excellent security regime on your computer. You should have an anti-virus, a firewall, and at least one anti-spyware program running at all times. It is foolish to be online without security protection. For an anti-spyware program, we are recommending SUPERAntiSpyware. We have an excellent deal for you that offers real time protection:

SUPERAntiSpyware has “Real-Time Blocking of threats! Prevent potentially harmful software from installing or re-installing! First Chance Prevention examines over 50 critical points of your system each time your system starts up and shuts down to eliminate threats before they have a chance to infect and infiltrate your system.”

SUPERAntiSpyware offers much, much more and you can read about it at the links provided. This program is being offered at a special rate for our readers of ten dollars ($10.00) off until October 15, 2009.

Use this link for the discount when buying.

This is a program that is highly recommended within the security community. People who work on these pages use it and recommend it, too. We use it. We need it and so do you. SUPERAntiSpyware will detect and remove spyware, adware, malware, Trojans, dialers, worms, keyloggers, hijackers, rootkits, and many other types of threats. This program is easy to use and it is effective. If you have any problems with SUPERAntiSpyware, let us know. We will tell the founder / director of the company and have any problems addressed. Nick Skrepetos is well known in the security community and he stands behind his products. If you need this program in large numbers, let us know. We will see if we can help with pricing for your company.

You may be wondering why we are recommending security programs when there are programs that are available for free. There is an old adage: ‘You get what you pay for.’ SUPERAntiSpyware has been doing Internet security for years. It is excellent. It works. It protects our machines and has for years. That’s why we recommend it.

Hacking: The Next Generation

There should be an image here!With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You’ll not only find valuable information on new hacks that attempt to exploit technical flaws, you’ll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

  • Learn how “inside out” techniques can poke holes into protected networks
  • Understand the new wave of “blended threats” that take advantage of multiple application vulnerabilities to steal corporate data
  • Recognize weaknesses in today’s powerful cloud infrastructures and how they can be exploited
  • Prevent attacks against the mobile workforce and their devices containing valuable data
  • Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
  • Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

Pre-Order Hacking: The Next Generation
Download Kindle version of Hacking: The Next Generation

Hacker Arrested By The Department Of Justice

The Feds have arrested a 28 year old Miami, FL. man for hacking into systems and trying to steal some 130 million credit card numbers. The arrest and charges against Albert Gonzalez also includes fraud and conspiracy charges as well.

In a press release from The Department of Justice it further states:

The indictment, which details the largest alleged credit and debit card data breach ever charged in the United States, alleges that beginning in October 2006, Gonzalez and his co-conspirators researched the credit and debit card systems used by their victims; devised a sophisticated attack to penetrate their networks and steal credit and debit card data; and then sent that data to computer servers they operated in California, Illinois, Latvia, the Netherlands and Ukraine. The indictment also alleges Gonzalez and his co-conspirators also used sophisticated hacker techniques to cover their tracks and to avoid detection by anti-virus software used by their victims.

If convicted, Gonzalez faces up to 20 years in prison on the wire fraud conspiracy charge and an additional five years in prison on the conspiracy charge, as well as a fine of $250,000 for each charge.

Gonzalez is currently in federal custody. In May 2008, the U.S. Attorney’s Office for the Eastern District of New York charged Gonzalez for his alleged role in the hacking of a computer network run by a national restaurant chain. Trial on those charges is scheduled to begin in Long Island, N.Y., in September 2009.

In August of 2008, the Justice Department announced an additional series of indictments against Gonzalez and others for a number of retail hacks affecting eight major retailers and involving the theft of data related to 40 million credit cards. Those charges were filed in the District of Massachusetts. Gonzalez is scheduled for trial on those charges in 2010.

The charges announced today relate to a different pattern of hacking activity that targeted different corporate victims and involved different co-conspirators.

Get the rope! 20 years isn’t enough time as far as I am concerned.

Comments welcome.

Source.

A Hacker Is A Good Choice For Homeland Security Advisory Council

In what some are seeing as a surprise move, Jeff Moss the founder of Black Hat and Defcon hacker and security conferences, was named to the panel of 16 others. The panel will made up what will be known as the Homeland Security Advisory Council.

In a recent article it states that the others who were selected are:

Former CIA (Bill Webster) and FBI directors (Louis Freeh), Los Angeles County sheriff, Miami mayor, New York police commissioner, governors of Maryland and Georgia, former Colorado Sen. Gary Hart, and the president of the Navajo Nation.

Moss, who is genuinely humble, said he was “fantastically honored and excited to contribute” to the HSAC and not concerned with losing any street cred among what some would call his fan base. He did concede that his new position would give him an unfair advantage in Defcon’s “Spot The Fed” contest in which people win prizes for successfully outing undercover government agents.

Choosing a hacker as one of the members of the council is a smart move. Who better to keep an eye out for other hackers than to have a hacker keep watch?

Comments welcome.

Source.

3G Chromakey

eGreetings!

How can you become an ethical hacker?

Do you recall Heathkit?

Does overpriced equipment give you overpriced performance?

Are you a guru when it comes to fixing permission problems?

Make your dining room festive with assorted LED gadgets!

Always perform regular backups of your important data! Save yourself 10% off of SpiderOak while you’re at it!

If you’re looking for the best way to maintain your home or office network, look no further than SolarWinds.

Check out BlackBlaze for all of your online backup needs – now at 10% off!

Do Linux or OS X need defragmentation software?

If you want to dabble with Linux, check out Wubi for your first time.

What happens when you cannot bridge your DSL connection?

Edit Chromakey (Green Screen) videos with ease.

GoToMeeting allows you to network with coworkers in real-time from anywhere in the World.

Stop spam from ever reaching your computer.

Don’t use the Web interface on Gmail – there’s a security risk involved.

Are you aware of the most common myths related to dieting and eating habits?

Where is the Google Earth data stored?

Have you checked out all of the new features on Ustream?

Capturing images on your screen is pretty simple, right? But what if you want to do more with them. Then you want to snag a copy of SnagIt. How did you ever get along without screen capture software? This one even integrates with AOL instant messenger and potentially your blog, too! Start your next screen capture the right way – manage it with TechSmith’s SnagIt.

Increasing levels of a rare element is being found worldwide.

Have you ever wondered how a battery works?

I hate Adobe Flash today!

Apple has an interesting message for netbook owners.

The AT&T 3G network continues to grow, even though the quality is going downhill fast.