Featured Blogs

Latest

Recovering Domain Names Lost to Fraudulent Transfer

Domain Names composed of generic terms and combinations – dictionary words, random letters, and short strings – have achieved ascending values in the secondary market. DNJournal.com (Ron Jackson) reports on his year to date chart, for example (just a random sampling from the charts) in August 2019 joyride.com was sold for $300,000, in June voice.com sold for $30 million, in July rx.com sold for $1 million, and in January california.com sold for $3 million... The magnitude of the reported sales suggests that businesses have come to depend on resellers than go to the trouble of inventing brand names from scratch. more

A New Cellular Carrier?

One of the most interesting aspects of the proposed merger of Sprint and T-Mobile is that the agreement now includes selling some of Sprint's spectrum to Dish Networks to enable them to become a 5G cellular provider. This arrangement is part of the compromise required by the Department of Justice to preserve industry competition when the major wireless carriers shrink from four to three. more

Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation

Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more

DoT and DoH Guidance: Provisioning Resolvers

As part of a larger effort to make the internet more private, the IETF defined two protocols to encrypt DNS queries between clients (stub resolvers) and resolvers: DNS over TLS in RFC 7858 (DoT) and DNS over HTTPS in RFC 8484 (DoH). As with all new internet protocols, DoT and DoH will continue to evolve as deployment experience is gained, and they're applied to more use cases. more

What Does Blockchain Have to Do With Voting?

Apropos of recent news stories about a blockchain-based voting system that was hacked before its first election, someone asked: "Perhaps final recognition that a lot of blockchain is hype? Or simply an interesting side-story?" A blockchain can ensure that the lies you see are the same lies that were published, but that doesn't have much to do with voting. more

Questions Raised by the Takeover of SNET, Havana’s Community Network

Last May, Cuba's Ministry of Communication (MINCOM) announced resolutions 98 and 99 limiting wireles stransmission power and outdoor cables that made community networks like Havana's SNET, illegal. Since SNET was the world's largest community network that did not have Internet access, implementation of the resolutions was postponed for 60 days for negotiations between SNET administrators and MINCOM. more

Worldwide Broadband Trends as the World Wide Web Turns 30

Hootsuite is the premier tracker of social media usage around the world. They publish numerous reports annually that track broadband statistics and social media statistic from around the world. They report the following statistics for the end of 2018. The world has been seeing one million new users online every day since January 2018. That means there are 11 new users on the web every second. There are now 5.11 billion mobile subscribers in the world, 67% of the world's population. more

Proactive Cybersecurity: What Small Businesses Can Actually Do

In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more

Threat Intelligence in Latter 2019: Overcoming the Same and New Challenges

Does threat intelligence (TI) work? I looked into that question last year, exploring the reasons why it actually doesn't and what can be done to remediate the situation. Since then, more companies have incorporated TI into their security processes, and many are still not getting the benefits they expect. What's causing the dissatisfaction? Interestingly, pretty much the same aspects... more

Almost All 5G Estimates for 2019-2020 Need to Be Doubled

The remarkable take rate in Korea and China is invalidating almost all projections of 5G subscriptions. The 5G promotion has consumers wanting to buy, buy, buy. Huawei Mate 20 5G is selling for only US$30 more than the 4G model. At that price, who would want to buy a 4G phone that could be obsolete in a year or two? In the first two weeks of sale, over a million Chinese bought Huawei's 5G phone. more

Domain Name Registrar Isn’t Liable for Counterfeit Goods – InvenTel v. GoDaddy

InvenTel makes security cams for cars. It is trying to crack down on Chinese counterfeiters. It brought a prior lawsuit against a wide range of defendants, including GoDaddy. InvenTel voluntarily dismissed GoDaddy from that suit. It brought a second round of litigation involving a new counterfeit site allegedly by the same bad guys, www.hdminorcarnbuy.com, a domain name registered via GoDaddy. more

The Pros and Cons of Introducing New gTLDs

Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. more

The Promise of Multi-Signer DNSSEC

DNSSEC is increasingly adopted by organizations to protect DNS data and prevent DNS attacks like DNS spoofing and DNS cache poisoning. At the same time, more DNS deployments are using proprietary DNS features like geo-routing or load balancing, which require special configuration to support using DNSSEC. When these requirements intersect with multiple DNS providers, the system breaks down. more

Call Spoofing: Congress Calls on FCC, Russia and China Answer

It is both amusing and dismaying. Last year, Congress passed Ray Baum's Act telling the FCC to do something about those pesky incoming foreign SPAM calls and texts with the fake callerIDs. The FCC a couple of weeks ago responded with a chest thumping Report and Order claiming it has "extraterritorial jurisdiction" that is does not have, and promising it will do something. Don't hold your breath on that one. more

The 2019 IPv4 Market: Mid-Year Report

After a slow start to 2019, the volume of IPv4 numbers traded is picking up – though still far below the peak trading periods of 2018. By this same time last year, the total quantity of numbers flowing to and from organizations in the ARIN region was just over 27 million. more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days