Featured Blogs

Latest

A Look at Mail Patterns from Legitimate Webmail Sources

For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? more

RIPE NCC is Reaching the Last /8 of IPv4

In an earlier article, IPv4 - Business As Usual, we pointed out that the RIPE NCC will reach the last /8 of IPv4 address space (16,777,216 addresses) sometime later this year. On Friday, 14 September 2012 we reached this important milestone; we allocated the last IPv4 addresses from the unallocated pool. From now on, the RIPE NCC can only distribute IPv6 addresses and a one-time /22 IPv4 allocation from the last /8 to those Local Internet Registries (LIRs) that meet the requirements. more

Mobile Infrastructure Running Out of Steam

The enormous growth in mobile usage, doubling each year, is set to continue for several years in a row. According to Ericsson, by 2020 mobile operators will need to provide one thousand times the capacity that was required in 2010. Our assessment at BuddeComm is that the mobile industry has already fallen behind in delivering the capacity needed today, let alone coping with the enormous growth ahead; and that this situation will deteriorate before it improves. more

Report On National Online Cybercrime and Online Threats Reporting Centres

Today I released a report on 'National cyber crime and online threats reporting centres. A study into national and international cooperation'. Mitigating online threats and the subsequent enforcing of violations of laws often involves many different organisations and countries. Many countries are presently engaged in erecting national centres aimed at reporting cyber crime, spam or botnet mitigation. more

Microsoft’s Takedown of 3322.org - A Gigantic Self Goal?

I will first begin this post by emphasizing that this article is entirely my personal viewpoint and not to be considered as endorsed by or a viewpoint of my employer or any other organization that I am affiliated with. Neither is this to be considered an indictment of the sterling work (which I personally value very highly) that several people in Microsoft are doing against cybercrime. Microsoft's takedown of 3322.org to disrupt the Nitol botnet is partial and will, at best, have a temporary effect on the botnet itself... more

Calling Africa: ICANN’s New Approach to Africa Is a Welcome and Significant Opportunity

The announcement last month of a new approach by the Internet Corporation for Assigned Names and Numbers (ICANN) to Africa is welcome, and significant for a number of reasons. Africa must participate in ICANN's activities to help shape its policies, and benefit from the domain name industry (estimated at $2 billion in 2008), where it lags behind other regions, given the few African registrars, and that there are no generic top-level domain names (gTLDs) registries that are African. more

Nitol and 3322.org Takedown by Microsoft

Reading this morning's blog from Microsoft about "Operation b70" left me wondering a lot of things. Most analysts within the botnet field are more than familiar with 3322.org - a free dynamic DNS provider based in China known to be unresponsive to abuse notifications and a popular home to domain names used extensively for malicious purposes - and its links to several botnets around the world. more

Should “Fake” Oakley Websites Be Insulated From UDRP Law?

Oakley, Inc. ("Oakley"), the maker of some very popular and trendy sunglasses, has also become a trend-setter in the area of UDRP law where it has been involved in two important decisions in the last few weeks. First, Oakley lost a UDRP decision last month for the domain name www.myfakeoakleysunglasses.com. In that case, the panelist Mr. Houston Putnam Lowry denied Oakley's Complaint on the basis that the domain was not confusingly similar to the OAKLEY mark. more

Going for Broke: Financial Services Industry Falling Behind on DNSSEC Adoption

Many CircleID readers have been watching the acceleration of DNSSEC adoption by top level domains with great interest, and after many years the promise of a secure and trustworthy naming infrastructure across the generic and country-code domains finally seems within reach. While TLD DNSSEC deployments are major milestones for internet security, securing the top level domains is not the end goal - just a necessary step in the process. more

The Role of Mobile Broadband in the Overall Telecoms Market

The fixed broadband network is the infrastructure needed to meet the needs, both economic and societal, of developed markets. While some people in some developed markets have abandoned their fixed telephone connection in favour of all-mobile solutions, the majority (90% plus) still have both a fixed and a mobile connection... And so wireless broadband and FttH will develop, in a complementary and harmonious way. There are several reasons for this. more

Cost-Effectiveness: The Prerequisite for Cybersecurity Regulation

Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more

Update on AS Path Lengths Over Time - How Interconnected is the Internet?

With the number of ASes connected to the Internet constantly increasing, one could expect that the length of the AS paths would also increase as the network as a whole gets wider. However, this doesn't seem to be the case. Also, with IPv6 being more widely deployed, how does the interconnectedness of the IPv6 portion of the Internet compare to IPv4? more

Musings on Metering: An Update from ICANN’s Latest Meeting

ICANN held another update for new gTLD applicants last week, revealing that the proposal to meter the introduction of new gTLDs received many suggestions during the open comment period. This was just the first step to what I imagine will be a long process - one that will continue on September 12 when ICANN holds a public consultation that will offer more detailed discussion on the many different options for metering. more

Is It Time for a Breakthrough in Securing Cyberspace?

This year in July gen. Keith Alexander, director of the National Security Agency and head of the US Cyber Command participated at DefCon, the hackers conference in Las Vegas. In his address, gen. Alexander said, among other things, "This is the world's best cybersecurity community. In this room right here is the talent our nation needs to secure cyberspace."... As someone, who is regularly meeting the top Russian cyber folks, I already know (unofficially, of course) how the words of gen. Alexander were met in Moscow. more

Setting ICANN’S Governmental Advisory Committee Up to Succeed

ICANN's Governmental Advisory Committee (GAC) - the special stakeholder group responsible for providing government advice to ICANN on issues of public policy - has an important role to play in the remaining evaluation and delegation phases of the new Top-Level Domain (TLD) program. For some applicants, the future of their new TLD projects may rest on the decisions of the 50 or so national government representatives that are active members of the GAC. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days