Featured Blogs

Latest

New gTLD SSR-2: Exploratory Consumer Impact Analysis (Part 5 of 5)

Throughout this series of blog posts we've discussed a number of issues related to security, stability, and resilience of the DNS ecosystem, particularly as we approach the rollout of new gTLDs. Additionally, we highlighted a number of issues that we believe are outstanding and need to be resolved before the safe introduction of new gTLDs can occur - and we tried to provide some context as to why, all the while continuously highlighting that nearly all of these unresolved recommendations came from parties in addition to Verisign over the last several years. more

The Long Gestation and Afterlife of New gTLDs

ICANN continues to flail, pointlessly. The latest in a series of missteps that could easily have been avoided is its recommendations on what to do about a report on the potential for confusion and misaddressing when someone's internal network names match the name for a new gTLD, and they have misconfigured their routers and/or DNS to the extent that someone typing in a new gTLD name might end up in the middle of someone else's network. more

Network Security: How Attackers Gain Access from Inside

Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more

Singular and Plural New gTLDs: Costly Headaches

ICANN has recently stated that it will allow the public to register plural and singular gTLDs that are variants of words already registered as domain names. .Books will be able to join the currently allocated .book, and .pet will be able to join .pets. Of course, a pair like .blue and .blues, two words that look alike but have different meanings, isn't at issue here. The focus is just plurals and singulars. But that leaves plenty of room for trouble, and ICANN has to tackle some tough questions now, before the policy launch. more

The Sexist Men In Tech Need to Grow Up, Now

These days, I've seen many breathless posts about how 'we' "need" to encourage girls to study math so eventually they become computer or other sorts of geeks. Personally, I don't think technology is the only valuable thing in the world; writing, music, and the rest of the arts, medicine, human relations, politics, and so on are pretty important things too, and let's face it content was, is, and will always be king. That said if men continue to act like jerks, it is no wonder women will go into anything but technology. more

How Safe is FttH?

My blog 'What PRISM, credit card hacking and Chromecast have to do with FttH' led to some very interesting discussions all around the world. One of issues that was discussed was that the sheer capacity of FttH will also allow hackers, criminals and others to use that massive capacity for the wrong reasons. Its volume will make it increasingly difficult to police. more

Internet Society Launches Questionnaire on Multistakeholder Participation in Internet Governance

The Internet Society today announced the launch of a survey to gain greater insights into multistakeholder governance perceptions and processes at all levels - national, regional, and international. The questionnaire is open to all interested participants and is available until 30 September 2013. The survey is one component of the Internet Society's broader initiative focused on the open and sustainable Internet. more

ICANN 47: Policy Debates and Cautious Optimism

A strange feeling came over me after I got home from ICANN 47 in Durban, something I haven't felt after an ICANN meeting before. The feeling? Optimism. I'm optimistic, albeit cautiously so, about the future of ICANN and by extension, hopefully that of Internet governance in general. If the meeting in Durban is any indication, we've come a long way in the past year. There were no indicted war criminals invited to dinner. And though it may be too soon to say for sure, I don't think a letter will be sent to the government of South Africa about the quality of the hotel. more

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more

Polish CERT Polska and NASK Pull the Plug On .pl TLD On Malicious Registrar, Domain Silver

Today we publish an overview of domains registered through Domain Silver, Inc, a registrar operating in the .pl domain. This Registrar started operating in May 2012. Since that time, the CERT Polska team started to observe a large increase in the amount of malicious domains registered in .pl and to receive many complaints concerning domains registered through Domain Silver. more

NXDOMAINS, SSAC’s SAC045, and New gTLDs (Part 4 of 5)

In 2010, ICANN's Security and Stability Advisory Committee (SSAC) published SAC045 [PDF], a report calling attention to particular problems that may arise should a new gTLD applicant use a string that has been seen with measureable (and meaningful) frequency in queries for resolution by the root system. The queries to which they referred involved invalid Top-Level Domain (TLD) queries (i.e., non-delegated strings) at the root level of DNS, queries which elicit responses commonly referred to as Name Error, or NXDomain, responses from root name servers. more

Making Sense of MIIT’s Category of Telecommunications Services

This morning I read a catchy titled article on CircleID "China Closing the Door to New Technologies". I was trying to make sense of what all the fuss is about... So I called up my friends in Ministry of Industry and Information (MIIT) for lunch to find out what's going. more

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more

China Closing the Door to New Technologies

2013 may be a promising year for global trade in technology with the kick-off of the International Technology Agreement expansion discussions, the Trans-Atlantic Trade and Investment Partnership, and as the Trade in Services Agreement gets going. But China calls its own tune, and is now threatening to restrict its market for Internet-enabled technologies through a clever device that could cost its trading partners billions. more

On the Question of Closed Generic Top-Level Domains

The debate over so-called "closed generic" top-level domains has revealed that rarest of semi-mythical beasts, a creature often emblazoned in ICANN heraldry but as elusive as the unicorn on the UK royal coat of arms: an argument on principle. Occasionally an issue arises out of the muck of self-interested manoeuvring to reveal the deep idealism that moves most ICANN participants. You can see it by how it divides camps that usually march along in lock-step, and by how the predictable murmur of shopworn cliches is replaced by arguments of clarity and resonance. more

Topics

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days