Hot Topics:   Domain Names    Cybersecurity    Policy & Regulation    Whois    ICANN    Access Providers    Internet Governance   

Featured Blogs

The Internet’s Two Bodies: Understanding the Multistakeholder Reign

Alexander Klimburg The reports of multistakeholder Internet governance's demise are greatly exaggerated. This article explores the dual nature of multistakeholderism: its evolving, sometimes contentious practice as the "First Body," and its enduring principle of actor plurality as the "Second Body." Despite criticism and challenges, multistakeholderism remains crucial for a resilient, non-state-led Internet, underscoring the need to adapt and uphold its foundational pluralism. more

The Role of Cloud Resource Provisioning in Web App CICD Pipelines

Evan Morris Thanks to wide adoption of the Infrastructure as Code (IaC) approach, programmatic provisioning of cloud resources is slowly transforming almost every aspect of computing, with administration of web apps having emerged as a key use case. With IaC, it's possible to streamline resource management tasks, shorten time-to-market, control costs, and scale at will. The adoption of continuous integration and continuous delivery (CICD) pipelines is already making a huge difference in web app deployment and cloud resource management. more

Want to Help Ensure the Internet Remains Open? Internet Society Seeks Nominations for 2025 Board of Trustees

Dan York Do you (or someone you know) believe that people everywhere should have access to affordable, reliable, and resilient Internet connectivity? Are you passionate about ensuring that people everywhere have an Internet experience that is safe, secure, and protects them online? Do you have leadership experience in business, government, philanthropy, and/or the nonprofit sector? more

Attacking DNS Abuse: The Next Amendments Needed

Mason Cole Abusive behavior that leverages the domain name system (DNS) continues to be a problem, with a reach that has been widely and credibly documented. There is little doubt that bad actors continue to use the DNS for nefarious and costly purposes. While the amendments made in 2024 to ICANN's Registry Agreement (RA) and Registrar Accreditation Agreement (RAA) were a step in the right direction, more advanced tools are needed to bring abuse rates down. more

How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election

Ihab Shraim As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. more

DNS: The Proven, Eco-Friendly Alternative to Blockchain and NFTs

Ulvi Kasimov As the world races towards digital transformation, the technologies we choose will have a lasting impact on our planet. Blockchain, NFTs, and other crypto assets have garnered much attention for their ability to securely and immutably store records. However, the environmental cost of maintaining these technologies is often overlooked. The energy consumption required to sustain blockchains, particularly those using Proof of Work (PoW), is enormous... more

NIS2 Article 28 Guidance: A Positive Step Toward Reducing DNS Abuse Across Europe

 David Hughes The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS. more

UN’s Global Digital Compact: A Fork in the Road for Internet Governance?

Imad Payande As the United Nations' Global Digital Compact (GDC) approaches its expected adoption, a growing chorus of critics warns that it threatens the very foundations of multistakeholderism in Internet governance. While the GDC aims to foster global cooperation and advance shared objectives for digital transformation, it not only centralizes power within the UN but also sidelines the Internet Governance Forum (IGF) - a platform that has, for years, been instrumental in amplifying diverse voices, especially from marginalized communities and the private sector. more

Verisign and ICANN Renew Root Zone Maintainer Service Agreement

Pat Kane On October 20th, ICANN and Verisign renewed the agreement under which Verisign will continue to act as Root Zone Maintainer for the Domain Name System (DNS) for another 8-year term. The Root Zone sits atop the hierarchical architecture of the DNS and is essential to virtually all internet navigation, acting as the dynamic, cryptographically secure, global directory of all top-level domains that exist in the DNS. more

Why Satellite Cellular Won’t Replace Traditional Cell Networks Anytime Soon

Doug Dawson There was a burst of recent press about cellular service provided from satellites. This was probably prompted by the two recent hurricanes that have disabled terrestrial cellular and broadband networks in the southeast. I've seen speculation and discussion on Reddit and other forums where people have been wondering if satellite is the future of cell service and if the ubiquitous giant cell towers will eventually become obsolete. more

Further Ideas in Mark Similarity Measurement

David Barnett In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection. more

Broadband Labels are Here

Doug Dawson On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website. more

Decoding Internet Governance Stakeholders, Part 2: Private Sector

Mark Datysgeld The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations", as well as to "make full use of the expertise of the academic, scientific and technical communities". more

Further Developing a Word Mark Similarity Measurement Framework

David Barnett Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests. more

Supreme Court Delivers One-Two Punch to Agency Power

Steve Rosen At the end of its 2024 term, the Supreme Court made two landmark rulings that limit federal agencies' regulatory powers. Loper Bright Enterprises v. Raimondo curtails their ability to create new regulations, while SEC v. Jarkesy reduces their capacity to enforce existing laws. These decisions significantly weaken agencies like the FCC in regulating sectors of the national economy, marking a substantial shift in administrative authority. more

What the Global Digital Compact Taught Us About Future Internet Governance Debates

Byron Holland On September 22, the United Nations General Assembly adopted the Global Digital Compact (GDC), marking one of the most significant intergovernmental agreements on digital issues in the past two decades. Appended to the Pact for the Future, the GDC is a non-binding agreement that outlines a global governance framework for a wide range of digital issues, including internet governance and the Internet Governance Forum (IGF). more

Building a “Domain of Trust” - Protecting Online Identity in the Age of AI and 6G

Arnaud Franquinet In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape?  more

The Summit of the Future: A Hope for the Future

Jimson Olufuye The Summit of the Future (SotF) was held at the United Nations Headquarters in New York on September 22 -- 23, 2024. World leaders, in the presence of stakeholders from the private sector, civil society, academic/technical communities, and youths, endorsed a landmark Pact for the Future of mankind. The Pact for the Future (P4F) (A/RES/79/1) was a significant, consensus-driven but non-binding document agreed upon by world leaders specifically on September 22, 2024. more

Further Developing a Colour Mark Similarity Measurement Framework: Building a Database

David Barnett In my recent article on mark similarity measurement, I discussed a possible framework for protecting colour marks. The framework involves the specification of each colour according to its RGB (red-green-blue) specification (in which each component is expressed as an integer value between 0 and 255), with the suggestion that the protection afforded by a colour trademark could incorporate not only this exact colour, but also all similar colours around it up to a certain 'distance'... more

Towards a Quantitative Approach for Objectively Measuring the Similarity of Marks

David Barnett Central to many intellectual property disputes is an assessment of the degree of similarity of two contested marks. A determination of similarity is fundamentally a subjective decision involving a range of relevant tests, which include consideration of the perception of the relevant consumer and recognition of the existence of degrees of similarity within a spectrum (from high to low). more

News Briefs

Chinese Hackers Had Access to Canadian Government Systems for Years, Report Reveals

For five years, Canadian government networks have been vulnerable to Chinese state-sponsored cyber espionage, according to a recent report by Canada's Communications Security Establishment (CSE). more

EU Internet Advocates Push Back Against Telecom “Fair-Share” Fees

In a joint statement to the European Commission's new tech appointee, Henna Virkkunen, a coalition of internet advocacy groups has firmly opposed recent proposals aimed at imposing network fees on content providers. more

Security Shortfalls Exposed in End-to-End Encrypted Cloud Storage Providers

A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more

Senate Urges Domain Registrars to Combat Russian Election Interference

The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more

IPv6 Transition Stalls as Internet Moves Beyond IP Addresses

The shift from IPv4 to IPv6 has been a protracted and complex process, raising questions about why this transition has been so sluggish despite the depletion of IPv4 addresses more than a decade ago. more

Starlink Poised to Enter India After Regulatory Shift

After facing several regulatory obstacles, Elon Musk's Starlink is on the brink of entering the Indian market, a move that could reshape the country's digital landscape. more

Sudanese Nationals Charged in Global Cyberattack Campaign

Two Sudanese nationals have been indicted for allegedly leading Anonymous Sudan, a cybercriminal group responsible for over 35,000 Distributed Denial of Service (DDoS) attacks targeting critical infrastructure worldwide. more

Apple’s New Benchmark, ‘GSM-Symbolic,’ Highlights AI Reasoning Flaws

A recent study conducted by Apple's artificial intelligence (AI) researchers has raised significant concerns about the reliability of large language models (LLMs) in mathematical reasoning tasks. Despite the impressive advancements made by models like OpenAI's GPT and Meta's LLaMA, the study reveals fundamental flaws in their ability to handle even basic arithmetic when faced with slight variations in the wording of questions. more

Ukraine Arrests VPN Operator Facilitating Access to Russian Internet

Ukrainian authorities have arrested a 28-year-old man in Khmelnytskyi for running an illicit virtual private network (VPN) service that enabled access to the Russian segment of the internet, known as Runet. more

Future of .io Domain Uncertain as UK Relinquishes Chagos Islands

The United Kingdom's recent decision to relinquish control over the Chagos Islands as part of a treaty with Mauritius has raised significant questions about the future of the popular .io domain. more

FCC Approves Starlink for Direct-to-Cell Service in Hurricane-Stricken North Carolina

Following the devastating impact of Hurricane Helene on North Carolina, the U.S. Federal Communications Commission (FCC) has approved SpaceX's Starlink to provide direct-to-cell coverage in affected regions. more

NordVPN Introduces Quantum-Resilient Encryption

NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more

Starlink Surpasses 4 Million Subscribers, Cementing Dominance in Satellite Internet

Starlink, SpaceX's satellite-based internet service, has hit a major milestone by surpassing 4 million subscribers worldwide. SpaceX confirmed the news on Thursday after company President Gwynne Shotwell hinted earlier in the week that the service would reach the mark within days. more

Hawaiian Airlines Introduces Free Starlink Satellite Internet on Entire Airbus Fleet

Hawaiian Airlines has completed the installation of Starlink's high-speed satellite internet across its entire Airbus fleet, making it the first major U.S. carrier to offer free Wi-Fi powered by Starlink on transpacific flights. more

NIS 2 Directive Set for Implementation with New Guidelines, But Concerns Remain

The NIS Cooperation Group has released critical guidance for the implementation of Article 28 under the NIS 2 Directive, focusing on registration data accuracy obligations for top-level domain (TLD) registries, registrars, and related services in the EU. more

Colombia Avoids $350 Million Lawsuit Over “.co” Domain Dispute

Colombia has successfully defended itself against a $350 million lawsuit filed by U.S. company Vercara, formerly known as Neustar, in a legal battle over the management of the ".co" internet domain. more

Over 2 Million VPN Passwords Compromised by Malware Attacks

A recent report from Specops Software reveals alarming security vulnerabilities within VPN password systems, highlighting over two million VPN passwords stolen by malware in the past year. more

Apple Under Fire for Removing VPN Apps from Russia’s App Store

Apple has reportedly removed nearly 60 VPN apps from its Russia App Store, significantly higher than the 25 VPNs acknowledged by Russian authorities, according to a recent report by the App Censorship Project. more

FBI Takes Down China-Backed Botnet, Facilitates Ransomware Negotiations

The FBI and international partners dismantled a China-backed botnet run by the Integrity Technology Group, a company linked to Chinese government espionage. more

Internet Domain Shutdowns: Ineffective and Risky, Experts Warn

Efforts to curb illegal online content through domain shutdowns are proving ineffective and carry significant risks, according to a new report by eco and its topDNS initiative. more

White House Launches AI Datacenter Task Force to Boost Policy Coordination

The Biden administration is ramping up efforts to maintain U.S. leadership in artificial intelligence (AI) with a new initiative aimed at bolstering AI infrastructure while addressing national security and environmental concerns. more

Google Partners with Internet Archive for Historical Web Context in Search Results

Google Search is rolling out a new feature that allows users to access historical versions of websites directly through The Internet Archive's Wayback Machine. more

Brazil Enforces Fines for VPN Use to Access Elon Musk’s Platform X

As of September 6, Brazilians caught using VPNs to access Elon Musk's social media platform X will face fines of up to 50,000 reais ($8,943.74) per day, despite false claims online suggesting otherwise. more

Russia Invests $660 Million to Boost Internet Censorship and Block VPNs

Russia's Ministry of Digital Development is set to invest nearly 60 billion rubles ($660 million) over the next five years to enhance its internet censorship system, according to a government proposal revealed by Reuters. more

Malaysia Reverses Decision on Controversial DNS Redirection Policy

The Malaysian government has backtracked on its recent decision to require Internet Service Providers (ISPs) to redirect Domain Name System (DNS) traffic away from third-party servers like Google Public DNS and Cloudflare. more

Most Read – Last 30 Days

Recent Comments

Topics

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Industry Updates

A DNS Investigation of the 32 Doppelganger Websites Seized by the U.S. Government

WhoisXML API The U.S. Office of Public Affairs issued a statement on 4 September 2024 regarding the seizure of 32 websites that are believed to be part of the so-called "Doppelganger" campaign. more

Investigating the Proliferation of Deepfake Scams

WhoisXML API While deepfakes may sometimes be perceived as amusing, their potential for harm is significant and far-reaching. One finance worker for a multinational firm, for example, was tricked into paying out US$25 million to a deepfake scammer who pretended to be their company's chief financial officer (CFO) in a video call just this February. more

Five Years of Domain Security Insights: CSC’s Latest Findings on Global 2000 Companies

CSC This year marks the fifth annual release of CSC's "Domain Security Report," which continues to shed light on the evolving landscape of domain security among Global 2000 companies. more

IPv4.Global Recognized with Gold Globee Business Award

IPv4.Global IPv4.Global, the world's largest, most trusted and transparent IPv4 marketplace, was awarded a Gold Globee for Company of the Year at the prestigious 14th Annual 2024 Globee® Business Awards, with judges lauding its new "innovative" audit tool. more

Examining the DNS Underbelly of the Voldemort Campaign

WhoisXML API Toward the end of August 2024, a customized malware dubbed "Voldemort" based on strings found in its code was used in a cyber espionage campaign targeting various countries. more

2024 Domain Intelligence Study of 6 APT Groups Notorious for Targeting Europe

WhoisXML API At least 40 advanced persistent threat (APT) groups have trailed their sights on several European countries over the years, and that isn't surprising, given that the continent serves as the headquarters of renowned international organizations like the European Union Agency for Law Enforcement Cooperation (Europol), INTERPOL, and the North Atlantic Treaty Organization (NATO). more

Stripping Down the BlackSuit Ransomware Network Aided by DNS Data

WhoisXML API Nearly 1 million individuals' information was stolen and exposed when threat actors launched a BlackSuit ransomware attack on 10 April 2024. The investigation revealed that the compromised data included the victims' Social Security numbers (SSNs), birthdays, and insurance claim information. more

2024 .US Town Hall Registration Open: Explore Industry Trends & Policy Insights

GoDaddy Registry We are excited to announce the annual .US Virtual Town Hall on Thursday, October 31, 2024, at 12 PM ET. This event, hosted by Registry Services, the usTLD Administrator, offers a unique opportunity to engage with key voices in the domain industry and contribute to the future direction of .US, America's official country code Top-Level Domain. more

Unstoppable and Radix Launch “.pw” Domain Extension for Public Wallets

Radix Unstoppable Domains, a leading on-chain domain name provider and digital identity platform, today announces a significant partnership with Radix, a prominent registry of Top Level Domains (TLDs), to provide support for .pw domains and bridge the gap between traditional DNS and tokenized blockchain domains.
 more

A DNS Deep Dive into the NetSupport RAT Campaign

WhoisXML API Remote access trojans (RATs) can be considered the malware of choice by the world's most notorious advanced persistent threat (APT) groups. And there's a good reason for that. They are hard to detect, making them ideal for lateral movement, and also difficult to get rid of. more

Industry Guides

Dedicated IP VPN: Complete Guide, Benefits, Setup & More

What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more

Starlink Internet Service (2024 Review)

Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more

Can ISPs See My VPN? (All You Need to Know)

ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more

What is Satellite Internet? (Complete Guide, Costs, Providers, and More)

Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more

Does NordVPN Still Work With Netflix? How to Use It and Fix It If Not Working

Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more

How to Get NordVPN Free Trial (Risk-Free Options for 2024)

NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more

NordVPN Review 2024: Is It Fast, Secure, and Worth It?

NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more

Best VPN Countries for Privacy, Speed, and Streaming (2024)

The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more

Why Are VPNs Important for Remote Work?

VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more

How Does a VPN Protect You?

A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more