The Arctic region has largely been left out of the broadband arena in the past due to the high cost of building last-mile broadband infrastructure. The primary broadband available in the region has been provided for decades by Iridium Communications, which provided only low-bandwidth connections capable of supporting satellite phones and low-bandwidth monitoring devices. more
Starlink now has nearly 500,000 users and is available in 32 countries and nine languages. It is either available, wait-listed, or coming soon in every nation except Afghanistan, Belarus, Cuba, China, Iran, North Korea, Russia, Syria, and Venezuela. There are now 15,000 Starlink terminals in Ukraine with service throughout the nation through connections to ground stations in Poland, Lithuania, and Turkey and they have made a significant contribution in the war with Russia. more
There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more
It wasn't too many years ago when you couldn't read an article about broadband infrastructure without hearing about the need for smart highway infrastructure that was going to enable self-driving cars. There were various versions of how this would happen, but the predominant concept was that 5G networks along roads would communicate with cars and would enable efficient and safe travel by eliminating driver error by taking the driver out of the equation. more
The answer to the question in the title depends on the availability of SpaceX's new Starship spacecraft and Super Heavy booster rocket, collectively referred to as Starship. Elon Musk says he is highly confident about getting Starship to orbit this year. He also says, "At SpaceX, we specialize in converting things from impossible to late." Starship is critical to Starlink because the version 2 satellites are seven meters long and weigh about 1.25 tons... more
The 2022 edition of the DOTZON study Digital City Brands has just been published. After having introduced the study in early 2017, DOTZON has mapped for the sixth year in a row how successful cities are in using their Digital City Brands. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was the reason why Digital City Brands came into being in the first place. more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The 11th ROW will be held online on Tuesday, June 21st, 2022 at 13h00 -- 16h00 UTC. The discussion topics will be... more
To the annoyance of some, surely, the issue of abuse in the domain name system (DNS) has been high on the list of critical issues in internet governance circles. Personally, in my more than 20 years of internet governance experience, tackling DNS abuse is one of the more important issues I've participated in and seen debated. Despite this intense scrutiny, common-sense solutions (such as contract improvements) have been so far elusive, even as they fall squarely within its ICANN's remit. more
An IP address is a unique identifier for a device on a network, including the internet. IP stands for Internet Protocol (IP) which is a set of rules (a protocol) for addressing and routing data so it can travel through networks and arrive at its intended destination. Hence, "address." Internet-connected devices such as computers and smartphones each have a unique IP address. more
In a recent article in LightReading, Mike Dano quotes Dan Rampton of Meta as saying that the immersive metaverse experience is going to require a customer latency between 10 and 20 milliseconds. The quote came from a Wireless Infrastructure Association Connect (WIAC) trade show presentation. Dano says the presentation was aimed at big players like American Tower and DigitalBridge, which are investing heavily in major data centers. more
Foggy Bottom is the local affectionate name for the U.S. State Department -- because of its location near a former low-lying Potomac River lagoon in Washington DC. It recently announced the appointment of Nate Fick as the head of its "Bureau of Cyberspace and Digital Policy," pending Congressional approval because it is wrapped up with ambassadorial status. The term "cyber" in this international diplomacy context has come to include all manner of electronic communication and information systems and services, i.e., ICT. more
There was a naive idealism in the early days of the Internet that attempted to rise above the tawdry game of politics. Somehow, we thought that we had managed to transcend a whole set of rather messy geopolitical considerations that plagued the telephone world and this new digital space that the Internet was creating was simply not going to play by the old rules. more
Today, for the 500th time, an expert panel under the Uniform Domain Name Dispute Resolution Policy or "UDRP", issued a decision finding a Complainant guilty of Reverse Domain Name Hijacking or "RDNH". RDNH is an attempt to egregiously misuse the UDRP to unjustly seize a domain name from its lawful owner... To-date, the UDRP has adjudicated over 80,000 domain name disputes. The vast majority of them result in the transfer of a cybersquatted domain name to the rightful trademark owner. more
With so much traffic on the global internet day after day, it's not always easy to spot the occasional irregularity. After all, there are numerous layers of complexity that go into the serving of webpages, with multiple companies, agencies and organizations each playing a role. That's why when something does catch our attention, it's important that the various entities work together to explore the cause and, more importantly... more
CIDR (Classless Inter-Domain Routing) is a routing system in which network engineers can distribute IP addresses based on the size of their specific network. This is more efficient than the previous system, which assigned IP addresses depending on whether the size of a network fits into one of only three sizes: Class A, Class B, and Class C. more
The DNS Abuse Institute (DNSAI), the entity created by Public Interest Registry (PIR), today announced the launch of NetBeacon, a centralized DNS Abuse reporting service. NetBeacon was developed in collaboration with CleanDNS, an anti-abuse solution developer, which has donated the development and technology behind NetBeacon. more
The latest CENTRstats Global TLD Report has been released, covering the global status and registration trends in all top-level domains (legacy gTLDs, new gTLDs and ccTLDs), with a specific focus on the European ccTLD market. According to the report, domain name sales, deletions and registrar transfers slowed down for European ccTLDs over 2021; however, demand for new domains is still outpacing deletes, keeping growth in the positive. more
CENTR, which represents European national top-level domain name registries (ccTLDs) such as .si or .eu, has published its comments on the European Commission's DNS abuse study, calling out some of the "misleading analysis and unfortunate conclusions in the study." more
New research paints a rapidly deteriorating picture of the Internet in Ukraine since Russia's invasion. Published by BroadbandNow, the research analyzes internet access and quality in Ukraine over the past six weeks beginning February 1st. more
A letter sent to ICANN and IANA by a Ukrainian representative to ICANN’s Government Advisory Council (GAC) asks for urgent and strict sanctions against the Russian Federation in “the field of DNS regulation.” The letter urges ICANN to permanently or temporarily revoke Russia’s top-level domains “.ru”, “.рф” and “.su” and to shut down DNS root servers located in Saint Petersburg and Moscow. more
Join the upcoming discussion today on the past, present and future of the Internet in Afghanistan in the context of the Middle East. Panelists will address the national and international challenges and opportunities Afghans face in the changing environment of global Internet governance and sanctions laws. more
CENTR has published the latest edition of its CENTRstats Global TLD report, a quarterly publication that presents statistics and trends in domain name registrations of European country-code domains and the wider global market. more
Google Cloud has landed its muchly anticipated subsea cable, Grace Hopper in Bude, Cornwall. The 16-fiber pair Google-funded cable will connect New York (United States) to Bude (United Kingdom) and Bilbao (Spain). more
CENTR has just published the latest edition of its CENTRstats Global TLD report, a quarterly publication that presents statistics and trends in domain name registrations of European country-code domains and the wider global market. more
Colonial Pipeline, which accounts for close to half of the United States East Coast's fuel, has shut down its operations due to a cyberattack. The incident, believed to be the largest successful cyberattack on oil infrastructure in the U.S., was disclosed over the weekend. more
A multi-year investigation into 2017 net neutrality rulemaking finds 18 million fake comments were filed with the US Federal Communications Commission (FCC) and half a million fake letters were sent to Congress. more
SpaceX on Tuesday disclosed that it has received 500,000 preorders for its Starlink satellite internet service and that it anticipates no technical problems meeting the demand. more
New Zealand's .nz operator, InternetNZ, on Wednesday disclosed a vulnerability against authoritative DNS servers. The vulnerability called TsuNAME was first detected in February 2020 in the .nz registry and found that it could be exploited to carry out Denial-of-Service (DoS) attacks across the world. more
The Department of Telecommunications (DoT), Government of India, approved permissions today to Telecom Service Providers (TSPs) for conducting trials for use and applications of 5G technology. more
Internet service was down for nearly 900 customers in Tumbler Ridge, British Columbia, over the weekend after beavers chewed through a crucial fiber cable, resulting in "extensive" damage. According to a statement from the area's telecom provider, Telus, the outage also affected some cable TV customers and caused disruptions to local cell phone services. more
The US Department of Defense gave a small unknown Florida company control to millions of its dormant IP addresses, minutes before President Trump left office. According to reports, the unknown Florida company, Global Resource Systems LLC, initially obtained control of 56 million Pentagon-owned IP addresses on January 20 and later increased to near 175 million IP addresses. more
The celebrated security researcher, Dan Kaminsky, widely known for his work on discovering cruicisl DNS security flaws, Sony Rootkit infections and pupular talk at the Black Hat Briefings. more
ISPs in the U.S. saw a significant surge in both downstream and upstream traffic, increasing at least 30% and as much as 40% during peak business hours and as much as 60% in some markets, according to a new report from the Broadband Internet Technical Advisory Group (BITAG). more
Public Interest Registry (PIR), the non-profit operator of the .org top-level domain, today launched the DNS Abuse Institute, a centralized effort to combat DNS Abuse. In its news release, PIR said the Institute "will bring together leaders in the anti-abuse space to fund research, publish recommended practices, share data, and provide tools to identify and report DNS Abuse." more
Despite several groundbreaking technical achievements over the past nine years, Google's parent company Alphabet has decided to end the Loon project. The company said the road to commercial viability has proven much longer and riskier than hoped. more
Sponsored byWhoisXML API
Sponsored byMarkMonitor
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPXO
The GoDaddy Registry Podcast offers regular insights into a variety of topics important to brands and organizations involved in the domain name industry. Episode 7 is now available and continues our deep dive conversations with industry experts from around the world. more
Threat actors don't rest. Their malicious campaigns operate 24/7, especially when special occasions are approaching. Last May, we discovered over a thousand web properties related to Mother's Day, many of which either hosted questionable content or have been flagged as malicious. more
Threat actors have found a way to make phishing websites appear more legitimate by employing chatbots. The newly discovered tactic starts with an email about a delivery from DHL. more
In an earlier post, we looked at how cybersquatters took advantage of the popularity of seven car manufacturers to lure unwitting victims to fake sites. Since then, we were alerted to a phishing campaign this time targeting several German car dealers via age-old but still effective phishing. more
I've often written about the innovative marketing campaigns Radix has come up with to successfully promote their various new gTLDS (Radix administers .tech, .online, .store, .site, .website, .host, .space, .fun and .press). For each of their end-user targeted campaigns, they have created a novel approach that has caught people's attention. more
The Brand Registry Group (BRG) is the global association of companies and organisations working together to champion the use of .brand top-level domains and includes some of the world's most recognised consumer and B2B brands. In advance of the upcoming ICANN 74 meeting, the BRG has been actively discussing a wide range of topics that we consider are a priority for our members. more
In the past, security experts typically made a distinction between a cybercrime and an advanced persistent threat (APT). While cybercrime focused on obtaining financial gain, APTs trailed their sights on specific organizations, often to steal nation-state secrets. more
AliExpress is among the most visited business-to-customer (B2C) e-commerce sites globally, with millions of visitors daily. Therefore, a recent cybersquatting campaign targeting the platform could lure many victims into buying counterfeit products, divulging their login credentials, downloading malware, and many other actions that could jeopardize their data and devices. more
Pricing of IPv4 addresses over the last few months has taken an interesting turn. In recent years, the price per address for small blocks (/17 and smaller) has been greater than the price per address of large blocks (/16 and larger). more
When Facebook changed its parent company name to Meta in October 2021, we detected more than 5,500 newly registered domains (NRDs) a week after the announcement. In more recent news, a judge dismissed the company's cybersquatting and trademark infringement case against Namecheap. more
There's a new phishing-as-a-service (PaaS) solution in town, and it's called "Frappo." This new phishing toolkit enabled threat actors to launch impersonation attacks on at least 19 companies in the financial, entertainment, and telecommunications industries. more
.FUN embarked on a journey to meet the people of Boring, Maryland - one of the 'least fun' cities in the US -- a campaign developed with Fred & Farid New York more
Twitter was recently abuzz with news regarding an ongoing Cardano scam via a downloadable phishing app. Posing as a giveaway promo, which is how cybercriminals have frequently been victimzing cryptocurrency owners these days, users who get tricked into downloading the rogue app end up with stolen credentials instead. more
Non-fungible token (NFT) companies like Dapper Labs and Yuga Labs were recently seen performing defensive domain registration. While this strategy is only a part of a broader brand protection program, large companies in other industries implement it as well. more
Threat actors the world over have long been employing website defacement as a tactic to further their political, environmental, or even personal agenda. They essentially replace the content of target sites to display their messages through various means, including SQL injection, cross-site scripting (XSS), and other initial compromise techniques. more
It is quite natural to get prompts from software manufacturers saying you need to update your installed apps every so often for better security or to fix bugs. But you should know, too, that threat actors often use program update notifications as malware distribution vehicles. more
Fake news and disinformation have been significant issues for some time now, even urging the U.S. government to push back against proliferators who, some opine, do the malicious deed for political or financial gain. Amid this scenario, many have begun doubting what's real and what's not on the Web not just in the U.S. but worldwide. more