Featured Blogs

Latest

Small Computers Will Connect Everything

Size and cost have always been restraining factors to the utilization of computers. The first computers occupied whole rooms. When personal computers arrived, they were still rather bulky. Today, we have slim ultrabooks and compact small form factor PCs. Computers are not only getting smaller in this age, they're also becoming cheaper. And single-board computers like the Raspberry Pi are taking cost and size down a step further. These units bring compact and affordable processing to the masses. more

Heartbleed: Don’t Panic

There's been a lot of ink and pixels spilled of late over the Heartbleed bug. Yes, it's serious. Yes, it potentially affects almost everyone. Yes, there are some precautions you should take. But there's good news, too: for many people, it's a non-event. Heartbleed allows an attacker to recover a random memory area from a web or email server running certain versions of OpenSSL. The question is what's in that memory. It may be nothing, or it may contain user passwords (this has reportedly been seen on Yahoo's mail service), cryptographic keys, etc. more

Wrap-up: ICANN 49 Singapore

Given the "going live" of New gTLDs as well as the NTIA's announcement of its intent to transition Internet domain name functions to a multi-stakeholder environment, the 49th ICANN meeting in Singapore was sure to be a busy one. Here's a breakdown of some of the key happenings during the week. more

A Bad Year for Phishing

Here at the Anti-Phishing Working Group meeting in Hong Kong, we've just released the latest APWG Global Phishing Survey. Produced by myself and my research partner Rod Rasmussen of Internet Identity, it's an in-depth look at the global phishing problem in the second half of 2013. Overall, the picture isn't pretty. There were at least 115,565 unique phishing attacks worldwide during the period. This is one of the highest semi-annual totals we've observed since we began our studies in 2007. more

Yahoo Addresses a Security Problem by Breaking Every Mailing List in the World

DMARC is what one might call an emerging e-mail security scheme. It's emerging pretty fast, since many of the largest mail systems in the world have already implemented it, including Gmail, Hotmail/MSN/Outlook, Comcast, and Yahoo. DMARC lets a domain owner make assertions about mail that has their domain in the address on the 'From:' line. It lets the owner assert that mail will have a DKIM signature with the same domain, or an envelope return (bounce) address in the same domain that will pass SPF validation. more

Who Are the Major New gTLD Applicants and… (Part Six: Starting Dot)

Starting Dot ("SD") is a French new gTLD applicant which applied for five strings: .ARCHI, .BIO, .DESIGN, (which has been withdrawn) .IMMO and .SKI. It is the only French applicant to have applied for several open new gTLDs. Some French brands have applied too but as closed Top-Level Domains... While Starting Dot may be one of the smaller portfolio applicants, there is a considerable difference here in the way their projects are handled when compared to some of the larger applicants. more

Interconnection Disputes Are Network Neutrality Issues (of Netflix, Comcast, and the FCC)

A lot of people have been talking about the "interconnection" deal between Comcast and Netflix and whether that deal is related to network neutrality. (It is.) This question comes partly because the FCC's 2010 Open Internet Order (also known as the network neutrality order) was recently struck down. So network neutrality lands back at the FCC, with a new Open Internet proceeding, at the same time Netflix starts working so poorly on Comcast that Netflix had to cut a special deal with Comcast. more

Cisco: Africa in 2017 to Have More Internet Users Than U.S.

Carlos Slim of Telmex tells me the world is about to change. "Two billion more people will connect to the Internet when smartphones cost $50. The phone makers are promising me a $50 phone in 2014." If Spreadtrum and Firefox deliver a $25 smartphone, as promised, that could accelerate takeover. ~310,000,000 Africans will be connected to the Internet in 2017, Arielle Sumits of Cisco predicts... It's inevitable that the U.S. will be dwarfed by the rest of the world. more

Internet Governance Back in the Limelight

In my special role as adviser to the UN Broadband Commission I reported extensively in 2013 on the WCIT-12 conference in Dubai. Unfortunately the world disagreed on a way forward in relation to internet governance. However, despite all the grandstanding of the USA and its western allies, simply ignoring it and saying "there is no room for governments to be involved in internet governance" - will not make the issue go away. more

Black Helicopters for the DNS: What Happens In 2025?

When Steve delBianco from NetChoice testified (April 2, 2014) in the Subcommittee on Communications and Technology of the US House of Representatives on "Ensuring the Security, Stability, Resilience, and Freedom of the Global Internet", he proposed a stresstest for new mechanisms which could substitute the role of the NTIA in overseeing the IANA contract with ICANN. Stresstests are good. It is good for cars, it is good for banks and it is good for new mechanisms... more

Snowshoe Spam: What It Is, and How Not to Look Like You Send It

Have you ever found yourself blocked by a snowshoe spam filter or listed on a snowshoe blacklist? Or perhaps you've been told that one of your mailing practices makes you look like a snowshoe spammer? If so, you're probably wondering what snowshoe spam is, what you're doing to earn this reputation and what you should be doing differently. Here's a brief overview of the history of snowshoe and some suggestions on how to avoid being mistaken for a snowshoe spammer. more

The Rise and Rise of Broadband in China

While there are plenty of articles continuously updating us on the incredible social and economic developments that are taking place in China it is still sometimes good to stand still and have a look at some of these developments. It was 15 years ago that the Chinese Government - in its 5-year plan - stated that it wanted to connect all of its half million villages to the telecommunications network. At that point the plan simply called for narrowband telephone connections. more

Internet Governance: What Does It Mean, Anyway?

Ask anyone involved in Internet policy what "Internet Governance" means and you're likely to get a different answer, despite the fact that a decade ago, after torturous negotiations, the international community agreed on a working definition for the term (if a vague one). The lack of clarity has resulted in a policy space that appears to cover more and more subjects, with less and less agreement the more it spreads. In discussions recently on the /1net email list, I've seen proposals for an 'Internet Governance Roadmap' that includes delivering e-health initiatives, solving mass surveillance, and adopting new measures for taxation of Internet commerce - to name just a few. more

What the US Government Said About IANA in Singapore

Two weeks ago, the US government announced it would transition its role in the IANA functions to the global Internet community. It tasked ICANN with the job of arriving at a transition plan and noted that the current contract runs out in 18 months' time, 30 September 2015. This week, ICANN started that process at its meeting in Singapore. And on the ground were the two key US government officials behind the decision. more

In Defense of Process: Identifying the Problem Before Seeking Solutions

You don't necessarily need to walk before you can run, but you should probably look where you are going before you do either. The U.S. Government's announcement that it would transition out of its unique legacy role in ICANN set off a powder keg at ICANN, as stakeholders from every corner of the community rushed to offer their recommendations on how to fill the impending contractual vacuum with something, new, better, and appropriately reflective of the multi-stakeholder model. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days