Featured Blogs

Latest

From IPv6 Day to IPv6 Everyday

Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more

Water Supply System Apparently Hacked, with Physical Damage

According to press reports, a water utility's SCADA network was hacked. The attacker turned a pump on and off too much, resulting in physical damage to the pump. ... For years, security specialists have been warning that something like this could happen. Although more and more people have started to believe it, we still hear all of the usual reassuring noises -- the hackers don't know enough, we have defenses, there are other safeguards, etc. That debate is now over... more

Why the Lawsuit Against .XXX Maybe the Best Sales Tool Ever For New gTLD Applicants

"There is a serious danger that ICM will establish and monopolize such a distinct market. As consumers seeking adult content become more aware of the .XXX TLD, registering and displaying websites in other generic TLDs may not easily be substituted for registration in the .XXX TLD." No that statement is not from the ICM Registry's sales material. more

New gTLDs and the 1%

While Occupy Wall Street and other groups representing the so-called 99% are getting most of the press, the 1% is raising its profile as well, at least when it comes to gTLDs. They are complaining that introducing global choice and competition to the Internet will cost them money. The chief of the Association of National Advertisers (ANA) now says that it has "spent the last few months" considering the new gTLD program, and has found it lacking. They want ICANN to shut the whole thing down. more

Spotlight on TD-LTE Technology and Spectrum

As handheld devices grow ever more sophisticated and demand for content-rich services such as mobile video increases, mobile data traffic is likely to continue growing at an explosive rate. This represents good news for the industry, but next-generation wireless technologies will need to be ready to meet the challenge and able to cope with these increased demands on bandwidth. A recent TD-LTE spectrum workshop looked at the potential of TD-LTE technology to take us on to the next stage of wireless communication. more

What Chinese DDoS Malware Looks Like

While at that same Virus Bulletin conference that I was talking about earlier in my other post, I also had the chance to check out a session on Chinese DDoS malware put on by some folks from Arbor Networks. As little insight as I have into Android malware, I know even less about Chinese DDoS malware. So what's Chinese DDoS malware like? What are its characteristics? more

Taking the Leap to Cloud-Based Malware Inspection

Is desktop anti-virus dead? Someday I'd love to make that announcement, but it still feels to me that there's a Patron Saint of Voodoo with an affinity for bringing it back to life -- like some macabre mirror image of the malicious zombies it's supposed to provide protection against. It's kind of ironic that today's innovation in desktop anti-virus isn't really happening at the desktop; rather it's occurring in the cloud. more

European Commission in Favour of New IANA Contract - Disapproves of US Only Bidding Process

In a move that shouldn't come as a surprise to anyone, the EU Commission has given a rather mixed welcome to the IANA bid. While they obviously like a lot of what they are seeing, they're also not overly impressed with the contract only being open to US companies. more

What Mobile Malware Looks Like

Last month at the Virus Bulletin Conference in Barcelona, I took in one of the sessions on mobile malware. This type of malware is foreign to me because I mostly stay in the email space at work (and even then, I am focusing more on day-to-day issues of running a large mail provider than I am on spam and abuse). What's mobile malware like? What are the threats? How do users get infected? more

New TLD Spotted - .FUD

In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more

Will Google Search Replace Domain Names?

The growing notion among big advertising agencies and brand marketers is that as search engines find answers instantly, there's no real need to enter a domain name in the browser and therefore domain names are far less important. They're absolutely right. Why would you type www.rolex.com when you can simply enter 'Rolex' and be there before you blink? But where they are seriously wrong is when you enter anything like 'Interlink', 'Pronet', 'National Trust', 'Premier Traders' or 'United Manufacturing', uncontrollable citations will gush out from every corners of the world. more

Biggest Botnet Takedown to Date

Yesterday law enforcement officials arrested 6 people and charged them with running a massive internet fraud ring. Over 4 million PCs were part of the botnet. According to the FBI, "the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA." more

Evaluating the Growth of Internet Traffic

At the opening of NANOG 53, Kevin McElearney of Comcast commented that within Comcast Regional Area Networks (CRANs), the company is regularly pushing 40+ Gbps of traffic out to the global Internet. This is a massive amount of traffic and in many cases, it's more traffic than entire countries around the world push out to the Internet. It got me thinking about just how much traffic there is on the Internet and the rate at which that traffic will grow over the coming years. more

IPv6 RIPEness: More Smaller and Younger Organizations Deploying IPv6

The number of RIPE NCC members [also referred to as Local Internet Registries (LIRs)] that have an IPv6 allocation continues to grow -- in absolute terms as well as in percentages. 46% of all RIPE NCC members have one or more IPv6 RIPEness stars. ... Do new members pick up IPv6? Are older members with more experience, well-established businesses and customer base dominating IPv6 RIPEness scores? And what about the size of a member? Are small and large members adopting IPv6 in equal proportions? In this article we look into answering these questions. more

The Impressive Growth in Global Internet Stats (2011)

The ITU launched its latest statistics report, the World in 2011: ICT Facts and figures, which revealed impressive growth in a number of areas such as global internet use, particularly in developing countries. The report included further key details such as: "One third of the world's population are forecast to be online by the end of 2011..." more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days