Featured Blogs

Latest

Will Harding’s Mistakes in International Telecommunication Cooperation be Repeated?

The International Telecommunication Union recently began a well-deserved celebration of one of the real success stories in international cooperation -- the 110th anniversary of the Radio Regulations as a treaty instrument. An ITU publication describes the historical highlights. Global cooperation among governments in managing radio spectrum via the Radio Regulations has been generally regarded as essential from the outset in the early years of the 20th Century and remains so today. more

A Three Minute Guide to Network Automation Bliss

The cloud computing paradigm has been making steady progress in 2016. With the DevOps model making its way from cloud to networking, the business upside of fully automated service architectures is finally beginning to materialize. The associated service agility is expected to unleash new business models that transform the ways in which applications and connectivity can be consumed. more

All About the Copyright Office’s New DMCA System

Website publishers that want to protect themselves against claims of copyright infringement must participate in a new online registration system created by the U.S. Copyright Office for the Digital Millennium Copyright Act ("DMCA") -- even if they have participated previously. The new program, launched on December 1, 2016, offers a mandatory online registration system for the DMCA that replaces the original (and clunky) "interim" designation system, which was created in 1998. more

Sledgehammer DDoS Gamification and Future Bugbounty Integration

Monetization of DDoS attacks has been core to online crime way before the term cybercrime was ever coined. For the first half of the Internet's life, DDoS was primarily a mechanism to extort money from targeted organizations. As with just about every Internet threat over time, it has evolved and broadened in scope and objectives. The new report by Forcepoint Security Labs covering their investigation of the Sledgehammer gamification of DDoS attacks is a beautiful example of that evolution. more

Where is the Standard ‘Socket’ for Broadband?

When you plug into a broadband socket, what you are accessing is a distributed computing service that supplies information exchange. What is the service description and interface definition? For inspiration, we can look at the UK power plug. One of the great unsung fit-for-purpose innovations in British society is the BS1363 13 ampere power plug and socket. This is superior to other plugs by virtue of its solid construction and safe design. more

From ICANN57 Hyderabad to the 3rd WIC Wuzhen Summit: A Moment of Consensus on Internet Governance

Two events that happened last month deserve an additional note. One is the ICANN57 conference held in Hyderabad on November 3-9. The other is the 3rd World Internet Conference Wuzhen Summit held in Zhejiang Province on November 16-18. Though being completely overwhelmed by the result of President election in the United States, both events mark the victory of non-state actors and serve as good news for the community. more

Overseas TLD Registries Licensed by Chinese Government

It was reported that .XYZ, .CLUB and .VIP have obtained official license from the Chinese government. The approval notices can be found on the website of the Ministry of Industry and Information Technology ("MIIT"), the domain name regulator in China. It is the first batch of overseas top-level domains (TLD) being officially approved. Previously, only two legacy TLDs -- .COM and .NET -- have been issued such approval. The "green light" means that Chinese registrars are able to sell these domains legally in China. more

NTP: The Most Neglected Core Internet Protocol

The Internet of today is awash with networking protocols, but at its core lie a handful that fundamentally keep the Internet functioning. From my perspective, there is no modern Internet without DNS, HTTP, SSL, BGP, SMTP, and NTP. Of these most important Internet protocols, NTP (Network Time Protocol) is the likely least understood and has the least attention and support. Until very recently, it was supported (part-time) by just one person. more

Deadline of Dec 11 for Nominations for Public Interest Registry (.ORG Operator) Board of Directors

Would you be interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nominations deadline is Sunday, December 11, 2016.,,, In 2017 there are three positions opening on the PIR Board. Directors will serve a 3-year term that begins in April 2017 and expires in April 2020. more

Google Fiber in Havana - Wishful Thinking?

This post is conjecture, but it is informed conjecture... Consider the following: When Google Fiber started in Kansas City, most people assumed that it was a demonstration project, intended to spur investment by the incumbent US Internet service providers (ISPs). Few thought that Google wanted to become a retail ISP. Google Fiber garnered a lot of publicity and Google, began speaking of it as a real, profit-making business. They announced other cities and started laying fiber in some of them. more

The Purple Team Pentest

It's not particularly clear whether a marketing intern thought he was being clever or a fatigued pentester thought she was being cynical when the term "Purple Team Pentest" was first thrown around like spaghetti at the fridge door, but it appears we're now stuck with the term for better or worse. Just as the definition of penetration testing has broadened to the point that we commonly label a full-scope penetration of a target's systems with the prospect of lateral compromise and social engineering as a Red Team Pentest -- delivered by a "Red Team" entity operating from a sophisticated hacker's playbook. more

Likely and Behind the Scenes Changes at the FCC

It should come as no surprise that the Federal Communications Commission will substantially change its regulatory approach, wingspan and philosophy under a Trump appointed Chairman. One can readily predict that the new FCC will largely undo what has transpired in previous years. However, that conclusion warrants greater calibration. more

Shadow Regulations and You: One More Way the Internet’s Integrity Can Be Won

Even those who care about net neutrality might not have heard of the aptly-called Shadow Regulations. These back-room agreements among companies regulate Internet content for a number of legitimate issues, including curbing hate speech, terrorism, and protecting intellectual property and the safety of children. While in name they may be noble, in actuality there are very serious concerns that Shadow Regulations are implemented without the transparency, accountability, and inclusion of stakeholders necessary to protect free speech on the Internet. more

Is the Internet Becoming a Vast Wasteland?

I've written posts about trolls in Cuba, where Operation Truth is said to use a thousand university-student trolls and trolls in China where government workers fabricate an estimated 488 million social media posts annually. Now we are reading about Russian government trolls... The fake news and trolling revealed during the last few months of the US political campaign has sowed doubts about everything we see and read online. We're beginning the transition from "critical thinking" to "paranoid thinking." more

Excessive Offers to Sell Domain Names: Evidence of Bad Faith or Bona Fide Business Practice?

Not infrequently heard in domain name disputes are cries of shock and gnashing of teeth that domain name holders may lawfully offer their inventory at excessive prices. Take for example TOBAM v. M. Thestrup / Best Identity, D2016-1990 (WIPO November 21, 2016) (<tobam.com>). Respondent accused Complainant of bullying which Complainant denied... more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days