Featured Blogs

Latest

Verisign’s Role in Securing the DNS Through Key Signing Ceremonies

Every few months, an important ceremony takes place. It's not splashed all over the news, and it's not attended by global dignitaries. It goes unnoticed by many, but its effects are felt across the globe. This ceremony helps make the internet more secure for billions of people. This unique ceremony began in 2010 when Verisign, ICANN and the U.S. Department of Commerce's National Telecommunications and Information Administration collaborated... more

Fixed Wireless in Cities

I am often asked by cities about the option of building a municipal fixed wireless broadband network. As a reminder, fixed wireless, in this case, is not a cellular system but is the point-to-multipoint technology used by wireless Internet service providers (WISPs). My response has been that it's possible but that the resulting network is probably not going to satisfy the performance goals most cities have in mind. more

Trust and Insecurity

When I was first advocating home networking at Microsoft, we encountered a problem. The existing systems and applications had implicitly assumed they were inside a safe environment and didn't consider threats from bad actors. Early Windows systems hadn't yet provided file system with access control and other protections though there were some attempts to have separate logins to keep some settings separate. more

Domains Under the Most-Abused TLDs: Same Old DNS Abuse Trends?

While threat actors can use any domain across thousands of top-level domains (TLDs), they often have favorites. For instance, you may be familiar with Spamhaus's 10 most-abused TLDs for spamming. WhoisXML API researchers recently built on this list by analyzing 40,000 newly registered domains (NRDs) that sported some of the listed unreputable TLDs. We called this study "DNS Abuse Trends: Dissecting the Domains Under the Most-Abused TLDs." more

Brand Impersonation Online is a Multidimensional Cybersecurity Threat

Brand impersonation happens much more often than people realize. In CSC's latest Domain Security Report, we found that 75% of domains for the Global 2000 that contained more than six characters from the brand names were not actually owned by the brands themselves. The intent of these fake domain registrations is to leverage the trust placed on the targeted brands to launch phishing attacks, other forms of digital brand abuse, or IP infringement... more

Is Fiber Growth Slowing?

In a recent article in LightReading, Mike Dano cites data from industry analyst Cowan that shows that some of the largest fiber builders in the United States have already trimmed back their construction plans for 2023. AT&T has the largest retrenchment and is trimming 2023 plans from 3.5 to 4 million passings back to 2 to 2.5 million. The company says that it is not changing its long-term goal to reach 30 million passings with fiber, but a cutback of this size means it won't likely reach that target in 2025. more

DNSAI Compass: Six Months of Measuring Phishing and Malware

The DNS Abuse Institute recently published our sixth monthly report for our project to measure DNS Abuse: DNSAI Compass ('Compass'). Compass is an initiative of the DNS Abuse Institute to measure the use of the DNS for phishing and malware. The intention is to establish a credible source of metrics for addressing DNS Abuse. We hope this will enable focused conversations, and identify opportunities for improvement. more

Patterns and Trends in Domain Tasting of the Top 10 Global Brands

Domain tasting is a long-established practice involving the short-lived existence of a domain, which is allowed to lapse a few days after its initial registration. The practice arose in response to an Internet Corporation for Assigned Names and Numbers (ICANN) policy allowing a domain to be cancelled -- with all fees refunded -- within a five-day grace period, intended to address the issue of accidental registrations1. However, the practice is open to abuse by infringers. more

Poor Rural Connectivity Costs Lives

The Washington Post wrote an article recently that talked about how poor rural connectivity cost lives during a tornado in Louisiana. Around the country, there are now elaborate alert systems in areas subject to tornados and other dangerous weather events. These alerts have been shown to save lives since they give folks enough time to seek shelter or get out of the path of a storm. more

FTC Comment Period Emphasizes the Need for a Better WHOIS System

Late last year, the U.S. Federal Trade Commission - the governmental arm responsible for protecting Americans from unfair trade practices -- opened a comment period on a proposed "Trade Regulation Rule on Impersonation of Governments and Businesses." It's no surprise that those who are victims of or are battling online impersonation saw this as an opportunity to highlight the importance of a working domain name registration data system ("WHOIS") ... more

The IPv4 Price Inversion

A curious price inversion has occurred in IPv4 markets. The long-term trend that discounted large blocks has reversed. The graph identifies /15 and /16 (large) block pricing per IP address throughout the period in the form of dark spots. It is evident that, for most of the timeframe here (2014 to the first half of 2021), large blocks sold at a significant discount. One might guess that the administrative chores related to large-network needs were most efficiently and cheaply satisfied with large blocks. more

Starlink Comes to Africa - Markets and Competition

SpaceX Starlink Internet service will be available in several African nations in the second quarter of this year, and the price in Nigeria has been announced -- $600 for the "residential" terminal and a monthly fee of $43. Is there a market for Starlink at that price in Nigeria and other Sub-Saharan African nations? The IMF projects a GDP per capita of $2,580 for Nigeria this year (and $1,900 in Sub-Saharan Africa and $2,260 for Africa overall) so the market for individual consumer accounts will be much smaller than in what the IMF refers to as "advanced economies." more

Global Standards Collaboration: Is It Possible?

On 24-27 April, a 33-year-old international organisation of ICT organisations will convene a meeting at London under ETSI auspices after a four-year hiatus. Known today as the GSC or Global Standards Collaboration organisation, it began its existence in the Spring of 1990 at Fredericksburg, Virginia, as an umbrella mechanism for all of the world's ICT standards bodies to collaborate on "high interest subjects." more

Getting Serious About Satellite Texting

One of the more interesting telecom announcements at the CES electronics show in Vegas was the announcement from the partnership of Qualcomm and Iridium of plans to bring satellite texting capability to many more cell phones and other devices. We've already seen a few other announcements recently of the ability to make emergency text calls when out of reach of cell coverage. more

Do You Know Someone Who Should Be in the Internet Hall of Fame? Nominations Now Open Until March 24

Do you know someone who deserves recognition for helping build the Internet in their region or country? Or someone who made the Internet more secure through the work they've done? Or someone who made some major technical innovation that made the Internet faster or better? more

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days