Featured Blogs

Latest

Microsoft’s Size Means Malicious Cyber Actors Thrive

Last month, the Russian state-sponsored hacking group "Midnight Blizzard" gained access to the email accounts of Microsoft leadership, even exfiltrating documents and messages. The group reportedly used a simple brute-force style attack to access a forgotten test account and then exploited the permissions on that account to access the emails of employees in the cybersecurity and legal teams. more

Digital Governance Discussion Group (DGDG): One World, One Internet, Many Voices

On February 12–13, 2024, the first round of the final consultations for a Global Digital Compact (GDC) took place online and offline at the UN Headquarters in New York City. Around 50 governments and 50 speakers from non-governmental institutions took the floor. It was not really a dialog; it was a formal presentation of three-minute statements. more

Lies, Damn Lies, and Selective Statistics About Our Great Wireless Marketplace Thanks to the T-Mobile

In the February 13th edition of the Wall Street Journal, Professor Thomas W. Hazlett offers a breathless endorsement of market concentration with the T-Mobile acquisition of Sprint, his go-to example. Apparently, mergers and acquisitions benefit consumers because they enhance competition and generate all sorts of positive outcomes that could not possibly have occurred but for the reduction in the number of industry players. more

What is Bring Your Own IP (BYOIP)?

An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more

GAC Communiqués and Community Activity on DNS Abuse

This blog post and the associated report aim to provide an overview of DNS Abuse 1related issues the Governmental Advisory Committee (GAC), part of the ICANN multi-stakeholder model, has identified. We also summarize the relevant community activity taking place to address these areas of interest and highlight remaining gaps. From 2016 to June 2023, the GAC referenced four primary categories of activity related to DNS Abuse. more

A Call to Help Disrupt the Spread of Child Sexual Abuse Materials

The Internet Watch Foundation (IWF) leads the charge to combat child sexual abuse material (CSAM) online, and we at Public Interest Registry (PIR) are dedicated to supporting their efforts. We are honored to work with them across two important programs: Domain Alerts and TLD Hopping List. IWF services have been extremely successful in addressing CSAM on .ORG over the past five years more

The End of Rural Landlines?

Recent coverage by CBS News on Channel 13 in Sacramento, California documented how AT&T had cut off landline telephone from 80-year-old Patricia Pereira in Camp Seco. She called at the beginning of 2023 to ask if landline service could be transferred from a neighboring home to hers. Instead of transferring the service, AT&T cut the copper lines dead on both properties. more

Would the “Mensch” in the Room Please Stand Up!

Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more

Supporting Rural Cell Towers

I work with a lot of ISPs that own rural fiber. Some rural network owners have been successful in providing fiber to cell sites near their networks over the last decade. A few sell directly to a cellular carrier, but most of these connections are sold to an intermediate carrier that bundles together cellular connections across a large geographic area. more

Do You Need a License to Look for Spam?

Jay Fink had an interesting little business. If you lived in California, you could give him access to your email account; he'd look through the spam folder for spam that appeared to violate the state anti-spam law and give you a spreadsheet and a file of PDFs. You could then sue the spammers, and if you won, you'd give Fink part of the money as his fee. more

UN Cybercrime Convention: Time Is Running Out to Address Draft’s Urgent Risks to Human Rights

In two weeks, final negotiations will begin on the UN's proposed Cybercrime Convention, a document which has elicited widespread concern from civil society, industry groups, and some states due to the serious risks it poses to human rights, including privacy and freedom of expression. Since 2022, GPD and other groups, including EFF, Human Rights Watch and Privacy International, have sought to alert stakeholders within the process to the need for substantial revisions... more

Amazon Project Kuiper vs SpaceX Starlink

In 2019, I wrote that Amazon would be a formidable satellite-ISP competitor. I still think so, but I didn't expect it would be over four years until they launched the first test satellites. In the meantime, SpaceX has put over 5,000 satellites in orbit and has over two million Starlink customers. Amazon has permission to launch 3,236 satellites. more

Internet Governance Outlook 2024: “Win-Win-Cooperation” vs. “Zero Sum Games”?

The 2024 "To-Do-List" for all stakeholders in the global Internet Governance Ecosystem is a very long one. Not only the real world but also the virtual world is in turmoil. Vint Cerf once argued that the Internet is just a mirror of the existing world. If the existing world is in trouble, the Internet world has a problem. more

ACPA Dilemma: Federal Court Denies Injunction in Landmark Case - Cybersquatting Loophole or Legal Oversight?

This case had a bit of a weird result -- even though the brand owner had a mark that was 20 years old, and the alleged cybersquatter, in the meantime, acquired a domain name on the open market identical to that mark, because the domain name was first registered (by an unrelated party) before the brand owner's trademark rights arose, there was no relief under federal trademark law. more

Sensitive Data Discovery: The First Step in Data Breach Protection

Users are tired of hearing about data breaches that put their sensitive information at risk. Reports show that cybercriminals stole 6.41 million records in the first quarter of 2023 alone. From medical data to passwords and even DNA information, hackers have stolen a lot of sensitive information in 2023. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days