Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more
ICANN is preparing to search for its next CEO. In the past and again now, each of us has been asked for advice about applying for the job. We have willingly offered our perceptions of what the job requires. The general thrust of our advice is to alert the potential applicant about the complexities and demands of the job so they can assess for themselves whether they might be a viable candidate. Our comments in these situations are, of course, purely our own opinions, and are not connected to the official posture of ICANN. more
A recent article by Joe Brock for Reuters describes a new geopolitical battle over undersea fibers. There are about 400 undersea fiber routes that cross oceans and that connect the world with fiber. This is a huge business, and about 95% of all international broadband traffic passes through the undersea fibers. more
The Domain Name System (DNS, aka Web 2) and Web3 platforms are two different naming systems available to internet users. While the DNS (Web2) has been a reliable and trusted internet standard for decades, Web3 platforms (such as ENS, Handshake and Unstoppable) are a relatively new technology deployment that presents unique and different features. more
When Russia invaded Ukraine, SpaceX had around 2,000 satellites in orbit. It was clear from the first day of the war that a low-Earth orbit (LEO) constellation of around 2,000 satellites would be a valuable military and civilian asset. The first truckload of Starlink terminals arrived in Ukraine on February 28, 2022, four days after the invasion. By March 19, there were 5,000 terminals in Ukraine and 150,000 active daily users by May 2nd.China and Taiwan have both seen the strategic value of 2,000 Starlink satellites. more
Despite previous attempts1 I think it is safe to say that the discussion about Human Rights in ICANN was, until recently, fairly dead, even taboo. Nowadays, there seems to be a renewed demand for ICANN to have a future, and it needs to take Human Rights considerations seriously. During the ICANN Cancun meeting, representatives from several stakeholder groups mentioned HR and how they might support ICANN by informing its policy-making processes. more
At regular intervals, I have discussed the cybersecurity situation in Australia. In those assessments, I wrote about my frustration that the previous government policies more or less resembled a fire brigade approach. Trying to address individual incidents with regulations and legislation rather than coming up with a holistic strategy. more
In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices. more
The Domain Name System (DNS) root zone will soon be getting a new record type, called ZONEMD, to further ensure the security, stability, and resiliency of the global DNS in the face of emerging new approaches to DNS operation. While this change will be unnoticeable for the vast majority of DNS operators (such as registrars, internet service providers, and organizations), it provides a valuable additional layer of cryptographic security to ensure the reliability of root zone data. more
According to UN Secretary-General Antonio Guterres, the forthcoming UN World Summit on the Future", scheduled for September 2024, should adopt a "Global Digital Compact" (GDC).1 The GDC is part of the so-called "UN Common Agenda." The compact is expected to "outline shared principles for an open, free and secure digital future for all" and to cover issues as digital connectivity, avoiding Internet fragmentation, providing people with options as to how their data is used... more
I'm writing this as the 5G hype cycle reaches a new crescendo. What is most striking is how few of those touting 5G (or "private 5G") is how little technical detail there is beyond saying it is the next generation of cellular protocols. Yes, one can look at volumes of specifications with myriad options and flavors but no sense of 5G as such. That alone should make one suspicious - why does one have to eschew wires to get 5G? more
There is an interesting recent discussion in Europe about net neutrality that has relevance to the U.S. broadband market. The European Commission that oversees telecom and broadband has started taking comments on a proposal to force content generators like Netflix to pay fees to ISPs for using the Internet. I've seen this same idea circulating here from time to time, and in fact, this was one of the issues that convinced the FCC first to implement net neutrality. more
It is almost 25 years since the Internet was privatized by the U.S. government. ICANN was formed by Esther Dyson and Jon Postel as a California-based non-profit with the responsibility to administer the Internet. However, the U.S. government retained limited control, primarily through the Internet Assigned Numbers Authority (IANA). It was the revelations, in 2013, of highly classified National Security Agency (NSA) documents by Edward Snowden that sparked global concerns over the U.S. dominance of the Internet. more
In today's digital age, securing your website and ensuring your users' safety has never been more critical. Secure sockets layer (SSL) certificates are the go-to solution for securing websites by encrypting the data transmitted between web servers and browsers. Historically, SSL digital certificates could be valid for years, after which they had to be renewed or replaced. more
Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com