Hot Topics:   Domain Names    Cybersecurity    Broadband    Policy & Regulation    Whois    Internet Governance    Telecom   

Featured Blogs

Elizabeth “Jake” Feinler: The Mother of Whois

Steve Crocker Elizabeth "Jake" Feinler, known as the "Mother of Whois," transformed internet infrastructure as the ARPANET Network Information Center's lead. Her work in organizing data and pioneering Whois set the foundation for modern internet protocols. A trailblazer in technology, she championed inclusivity, mentoring women and minorities, while her legacy endures as a cornerstone of the digital age. more

Cybersecurity Standards Competition

Anthony Rutkowski The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more

UN Cyber Diplomacy II: Cybersecurity and Autonomous Weapon Systems

Wolfgang Kleinwächter Cybersecurity and artificial intelligence were among the key topics at the 79th UN General Assembly (UNGA). UNGA's 1st Committee, responsible for disarmament and international security, concluded its negotiations in mid-November 2024. It discussed the 3rd Annual Progress Report (APR) of the Open-Ended Working Group (OEWG) and adopted a resolution that recommends, inter alia, the establishment of a new permanent cybersecurity mechanism within the UN system. Furthermore, it adopted two resolutions on autonomous weapon systems (AWS). more

Is Verisign a Monopoly? Does It Matter?

John Levine Senator Elizabeth Warren and Rep. Jerry Nadler recently wrote a letter complaining that VeriSign overcharges for .com domains due to its market power. They sent it to the Department of Justice and the National Telecommunications and Information Administration (NTIA). While you can make a reasonable case that the claim is true, two more interesting questions are "Why now?" and "Why bother?" more

Starlink Backhaul for Rural Community WiFi: A Game Changer in Kenya?

Larry Press Starlink launched maritime service in July 2022, and by January 2023 Elcome International LLC, a maritime technology solution provider since 1970, had installed multi-antenna Starlink Maritime arrays on two super yachts with more than 100 passengers and crew. Elcome launched its Starlink maritime service in May 2024 and now has over 3,000 terminals under management. more

Copper Theft Costs $1.5 to $2 Billion Annually: A Growing Crisis with Severe Consequences

Doug Dawson I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more

New Data on Domain Name Contact Availability and Privacy

Scott Schnell Nearly 90% of the internet's generic top-level (gTLD) domain names do not have identifying contact information in the Registration Data Directory Services (RDDS) system, according to a report by Interisle Consulting Group. A key finding of the report is the rapid growth of registrar-provided proxy service offerings and the inclusion of these services for both new and existing registrations. more

Copyright Infringement: a New Worry for ISPs

Doug Dawson Recent court rulings hold ISPs accountable for failing to disconnect users accused of copyright infringement, sparking alarm across the industry. As record labels push for harsh penalties and ISPs warn of the potential for mass disconnections, the debate highlights the flaws of outdated copyright laws and raises critical questions about fairness, enforcement, and the future of internet access. more

The Challenge Facing African TLDs

Daniel Greenberg Africa's digital ecosystem is growing rapidly, with internet access becoming a central driver for innovation, business, and socio-economic development. As this digital adoption expands, so too does the importance of domain governance, particularly the effective management of Top-Level Domains (TLDs). Unfortunately, over the years, African registries have struggled to manage their TLDs, often leading to missed opportunities, inefficiencies, and a loss of competitive edge in the global domain market. more

Shaping the Future of ICP-2: Community Input Extended to December 2024

John Curran In October 2023, the Number Resource Organization initiated a process to undertake a significant update to Internet Coordination Policy 2 (ICP-2); the policy which specifies the criteria for establishing new Regional Internet Registries (RIRs). The Address Supporting Organization Address Council (ASO AC) has been tasked with managing the revision process, emphasizing community engagement and transparency. more

Led by Ted Cruz, the GOP Doesn’t Want Affordable Internet

Tyler Cooper In the coming months, we're set to witness the largest investment in America's digital infrastructure in history: $42.5 billion that should be a true lifeline for millions of Americans struggling with slow, unreliable, or nonexistent internet connections. But as with any massive government spending program, the devil is in the details - and Republican lawmakers, led by Texas Senator Ted Cruz, are doing their best to ensure those details work against their own constituents. more

Global Satellite Surge Intensifies Competition for Low-Orbit Broadband

Doug Dawson The City of Shanghai entered the low-orbit broadband satellite market. Shanghai Spacecom Satellite Technology (SSST) launched 18 satellites in August and a second batch of 18 satellites in October. The satellites are being branded as Qianfan, or 'Thousand Sails.' SSST satellites are being launched by the China Aerospace Science and Technology Corporation (CASC) using the Long March 6A rocket. more

11 Information Economy Policy Reversals Coming to a Marketplace Near You!

Rob Frieden In the wake of the election, sweeping policy shifts in the information economy are set to accelerate. Expect fast-tracked FCC reforms, Starlink subsidies, and AI-driven oversight to redefine media, tech, and regulatory landscapes. From relaxed antitrust to intensified media control, these eleven reversals signal a move toward deregulation and Chicago School libertarianism, with lasting impacts on U.S. markets and governance. more

Why We Need to Discard the Word “Multistakeholder”

Milton Mueller A CircleID post by Alexander Klimburg takes aim at my article, "The Power to Govern Ourselves," delivered at the Gig-Arts conference in June. That speech, available here on the blog, argued that: "Multistakeholder does not describe a governance model. It never has. It was always a compromised Public Relations concept," one that muddied the distinction between governance by state actors and non-state actors. What really made the Internet institutions unique was their break with sovereignty. more

DOTZON Study: Digital Company Brands 2024

Katrin Ohlmer DOTZON presents the seventh edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how companies successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness " of a company. For "Digital Company Brands 2024", all companies worldwide that have their own internet extension were once again analysed.  more

The Missing Data: Measuring ISP User Populations

Geoff Huston In our physical world, census information is used to inform the planning processes behind the provision of infrastructure, such as schools, hospitals, housing, and similar. It can be used to assess the impact of natural disasters or to understand a society's needs in terms of food and energy security. Demographic data is also used to inform investment and business decisions. You'd think that the Internet itself would be awash with similar information. more

Enterprise Domain Stargazing: Understanding Your Company’s Galaxy of Domains

Sue Watts In CSC's recent insight paper, we address the trend that many business leaders today don't realize the extent to which their modern enterprise -- and its millions of digital assets -- rely on. It's a vast domain ecosystem that needs to be protected from online threats. Often, to better understand this need for domain security, we need to understand how critical and interconnected domains are within a business. more

Project 2025: The Internet and Cybersecurity

Anthony Rutkowski As the saying goes, elections have consequences. The consequences are underscored in the recent U.S. Presidential election and the potential impact on the Internet, infrastructure and cybersecurity. In the context of the CircleID global community, it seems worth asking where things are headed? It does beg for an analysis of what is actually proposed in Presidential Transition Project 2025 related to things internet and cybersecurity. more

The Internet’s Two Bodies: Understanding the Multistakeholder Reign

Alexander Klimburg The reports of multistakeholder Internet governance's demise are greatly exaggerated. This article explores the dual nature of multistakeholderism: its evolving, sometimes contentious practice as the "First Body," and its enduring principle of actor plurality as the "Second Body." Despite criticism and challenges, multistakeholderism remains crucial for a resilient, non-state-led Internet, underscoring the need to adapt and uphold its foundational pluralism. more

The Role of Cloud Resource Provisioning in Web App CICD Pipelines

Evan Morris Thanks to wide adoption of the Infrastructure as Code (IaC) approach, programmatic provisioning of cloud resources is slowly transforming almost every aspect of computing, with administration of web apps having emerged as a key use case. With IaC, it's possible to streamline resource management tasks, shorten time-to-market, control costs, and scale at will. The adoption of continuous integration and continuous delivery (CICD) pipelines is already making a huge difference in web app deployment and cloud resource management. more

News Briefs

Chinese Hackers Exploit U.S. Telecom Systems, Eviction Efforts Lag

American officials have revealed an ongoing struggle to expel Chinese hackers from telecommunications networks, months after the espionage was first discovered. The campaign, attributed to a group called "Salt Typhoon," has infiltrated major telecom carriers, particularly in the Washington region. more

Meta’s $10 Billion Plan to Build the World’s Largest Subsea Cable Network

Meta, the parent company of Facebook, Instagram, and WhatsApp, is embarking on an ambitious $10 billion project to construct a privately-owned, 40,000-kilometer subsea cable network. Dubbed the "mother of all submarine cables," this endeavor aims to bolster Meta's data infrastructure and sidestep geopolitical risks associated with traditional cable routes. more

FCC Clears SpaceX, T-Mobile Deal to Expand Coverage to Dead Zones

The Federal Communications Commission (FCC) has granted T-Mobile and SpaceX approval to extend mobile coverage to remote areas using satellite technology. This marks the first authorization of its kind, allowing collaboration between a wireless carrier and a satellite operator to utilize spectrum bands traditionally reserved for terrestrial services. more

Wi-Fi 8: Beyond Speed, Towards Seamless Connectivity

As the IEEE 802.11 task force turns its attention to developing Wi-Fi 8, the next iteration of wireless networking standards, the focus has shifted from sheer speed to enhancing user experience. more

Biden Administration to Back UN Cybercrime Treaty Amid Controversy

The Biden administration is poised to support a contentious United Nations cybercrime treaty, a move likely to spark debate over potential abuses, according to top officials.  more

PIR Reaches 11 Million .ORG Domains, Citing Growth and Online Safety Efforts

Public Interest Registry (PIR), the nonprofit managing the .ORG domain, recently announced it now oversees 11 million registrations. Jon Nevett, PIR's CEO, attributes this growth to what he describes as a "responsible" expansion, emphasizing a focus on security and community support. more

Internet Visionaries Honored with Postel Service Award

The Internet Society has announced the 2024 Jonathan B. Postel Service Award recipients, honoring Steve Crocker and Xing Li for their pioneering work in advancing the global Internet infrastructure. more

T-Mobile Breaks Upload Speed Record with New 5G Dual Connectivity

T-Mobile has claimed a new world record in 5G upload speeds, achieving an impressive 2.2 Gbps in tests conducted at California's SoFi Stadium. Partnering with Ericsson and Qualcomm, the telecommunications firm leveraged an emerging technology, 5G Dual Connectivity (5G DC), which combines mid-band and millimeter-wave (mmWave) spectrum bands. more

OpenAI Buys Chat.com, Redirected to ChatGPT

OpenAI has acquired Chat.com, a domain name previously purchased for $15.5 million by HubSpot's co-founder Dharmesh Shah. Initially registered in 1996, the domain saw significant investment due to its prime fit with the rapidly growing AI chatbot sector, especially as tools like ChatGPT gain mainstream attention. more

Chinese Hackers Had Access to Canadian Government Systems for Years, Report Reveals

For five years, Canadian government networks have been vulnerable to Chinese state-sponsored cyber espionage, according to a recent report by Canada's Communications Security Establishment (CSE). more

EU Internet Advocates Push Back Against Telecom “Fair-Share” Fees

In a joint statement to the European Commission's new tech appointee, Henna Virkkunen, a coalition of internet advocacy groups has firmly opposed recent proposals aimed at imposing network fees on content providers. more

Security Shortfalls Exposed in End-to-End Encrypted Cloud Storage Providers

A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more

Senate Urges Domain Registrars to Combat Russian Election Interference

The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more

IPv6 Transition Stalls as Internet Moves Beyond IP Addresses

The shift from IPv4 to IPv6 has been a protracted and complex process, raising questions about why this transition has been so sluggish despite the depletion of IPv4 addresses more than a decade ago. more

Starlink Poised to Enter India After Regulatory Shift

After facing several regulatory obstacles, Elon Musk's Starlink is on the brink of entering the Indian market, a move that could reshape the country's digital landscape. more

Sudanese Nationals Charged in Global Cyberattack Campaign

Two Sudanese nationals have been indicted for allegedly leading Anonymous Sudan, a cybercriminal group responsible for over 35,000 Distributed Denial of Service (DDoS) attacks targeting critical infrastructure worldwide. more

Apple’s New Benchmark, ‘GSM-Symbolic,’ Highlights AI Reasoning Flaws

A recent study conducted by Apple's artificial intelligence (AI) researchers has raised significant concerns about the reliability of large language models (LLMs) in mathematical reasoning tasks. Despite the impressive advancements made by models like OpenAI's GPT and Meta's LLaMA, the study reveals fundamental flaws in their ability to handle even basic arithmetic when faced with slight variations in the wording of questions. more

Ukraine Arrests VPN Operator Facilitating Access to Russian Internet

Ukrainian authorities have arrested a 28-year-old man in Khmelnytskyi for running an illicit virtual private network (VPN) service that enabled access to the Russian segment of the internet, known as Runet. more

Future of .io Domain Uncertain as UK Relinquishes Chagos Islands

The United Kingdom's recent decision to relinquish control over the Chagos Islands as part of a treaty with Mauritius has raised significant questions about the future of the popular .io domain. more

FCC Approves Starlink for Direct-to-Cell Service in Hurricane-Stricken North Carolina

Following the devastating impact of Hurricane Helene on North Carolina, the U.S. Federal Communications Commission (FCC) has approved SpaceX's Starlink to provide direct-to-cell coverage in affected regions. more

NordVPN Introduces Quantum-Resilient Encryption

NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more

Starlink Surpasses 4 Million Subscribers, Cementing Dominance in Satellite Internet

Starlink, SpaceX's satellite-based internet service, has hit a major milestone by surpassing 4 million subscribers worldwide. SpaceX confirmed the news on Thursday after company President Gwynne Shotwell hinted earlier in the week that the service would reach the mark within days. more

Hawaiian Airlines Introduces Free Starlink Satellite Internet on Entire Airbus Fleet

Hawaiian Airlines has completed the installation of Starlink's high-speed satellite internet across its entire Airbus fleet, making it the first major U.S. carrier to offer free Wi-Fi powered by Starlink on transpacific flights. more

NIS 2 Directive Set for Implementation with New Guidelines, But Concerns Remain

The NIS Cooperation Group has released critical guidance for the implementation of Article 28 under the NIS 2 Directive, focusing on registration data accuracy obligations for top-level domain (TLD) registries, registrars, and related services in the EU. more

Colombia Avoids $350 Million Lawsuit Over “.co” Domain Dispute

Colombia has successfully defended itself against a $350 million lawsuit filed by U.S. company Vercara, formerly known as Neustar, in a legal battle over the management of the ".co" internet domain. more

Most Read – Last 30 Days

Recent Comments

Is Verisign a Monopoly? Does It Matter?
Is Verisign a Monopoly? Does It Matter?
Is Verisign a Monopoly? Does It Matter?

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Industry Updates

New WhoisXML API Study Highlights Business Insights from ASN and ISP Data

WhoisXML API As unique identifiers of entities that control IP ranges, autonomous system numbers (ASNs) provide valuable data. Understanding ASN distribution and deriving insights from it can significantly enhance strategic business and market analyses. more

A DNS Deep Dive into FUNULL’s Triad Nexus

WhoisXML API Silent Push has been monitoring the FUNULL content delivery network (CDN) for two years now. They believe the network has played host to various cybercriminal campaigns, including investment scams, fake trading app distribution, suspect gambling networks, and the Polyfill supply chain attack. more

Uncovering Potential Black Friday and Thanksgiving Threats with DNS Data

WhoisXML API Thanksgiving is right around the corner. With it, of course, come celebrations with family and friends and the biggest Black Friday sales. All seems well and good but that's not always the case, isn't it? more

New RomCom Variant Spotted: A Comparative and Expansion Analysis of IoCs

WhoisXML API The threat actors behind the RomCom malware, known for extorting government agencies, recently resurfaced with a new RomCom variant called "Snipbot" or "RomCom 5.0" by Palo Alto Networks Unit 42. more

Global Domain Activity Trends Seen in Q3 2024

WhoisXML API WhoisXML API analyzed close to 22 million domains registered in Q3 2024 to uncover global domain activity trends. more

A DNS Investigation into Mamba, the Latest AitM Phishing Player

WhoisXML API Phishing has been around for years, yet it still proves to be a major online threat. To continue profiting, cybercriminals must continuously adapt their techniques. more

BRG to Share .Brand TLD Updates and Insights for Applicants at ICANN81 in Istanbul

Brand Registry Group The Brand Registry Group (BRG) is the global association of companies and organizations working together to champion the use of .brand top-level domains and includes some of the world's most recognized consumer and B2B brands. In advance of the ICANN81 meeting in Istanbul Türkiye next week, the BRG is providing an update on ICANN's new gTLD program in several sessions that may be of interest to prospective .brand applicants. more

A DNS Investigation of the 32 Doppelganger Websites Seized by the U.S. Government

WhoisXML API The U.S. Office of Public Affairs issued a statement on 4 September 2024 regarding the seizure of 32 websites that are believed to be part of the so-called "Doppelganger" campaign. more

Investigating the Proliferation of Deepfake Scams

WhoisXML API While deepfakes may sometimes be perceived as amusing, their potential for harm is significant and far-reaching. One finance worker for a multinational firm, for example, was tricked into paying out US$25 million to a deepfake scammer who pretended to be their company's chief financial officer (CFO) in a video call just this February. more

Five Years of Domain Security Insights: CSC’s Latest Findings on Global 2000 Companies

CSC This year marks the fifth annual release of CSC's "Domain Security Report," which continues to shed light on the evolving landscape of domain security among Global 2000 companies. more

Industry Guides

Dedicated IP VPN: Complete Guide, Benefits, Setup & More

What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more

Starlink Internet Service (2024 Review)

Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more

Can ISPs See My VPN? (All You Need to Know)

ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more

What is Satellite Internet? (Complete Guide, Costs, Providers, and More)

Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more

Does NordVPN Still Work With Netflix? How to Use It and Fix It If Not Working

Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more

How to Get NordVPN Free Trial (Risk-Free Options for 2024)

NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more

NordVPN Review 2024: Is It Fast, Secure, and Worth It?

NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more

Best VPN Countries for Privacy, Speed, and Streaming (2024)

The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more

Why Are VPNs Important for Remote Work?

VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more

How Does a VPN Protect You?

A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more