Featured Blogs

Latest

11th Registration Operations Workshop (ROW), June 21th, 2022, Online

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The 11th ROW will be held online on Tuesday, June 21st, 2022 at 13h00 -- 16h00 UTC. The discussion topics will be... more

Data, DNS Abuse and What to Do Next

To the annoyance of some, surely, the issue of abuse in the domain name system (DNS) has been high on the list of critical issues in internet governance circles. Personally, in my more than 20 years of internet governance experience, tackling DNS abuse is one of the more important issues I've participated in and seen debated. Despite this intense scrutiny, common-sense solutions (such as contract improvements) have been so far elusive, even as they fall squarely within its ICANN's remit. more

IPv4 and Education: The Basics

An IP address is a unique identifier for a device on a network, including the internet. IP stands for Internet Protocol (IP) which is a set of rules (a protocol) for addressing and routing data so it can travel through networks and arrive at its intended destination. Hence, "address." Internet-connected devices such as computers and smartphones each have a unique IP address. more

Getting Ready for the Metaverse

In a recent article in LightReading, Mike Dano quotes Dan Rampton of Meta as saying that the immersive metaverse experience is going to require a customer latency between 10 and 20 milliseconds. The quote came from a Wireless Infrastructure Association Connect (WIAC) trade show presentation. Dano says the presentation was aimed at big players like American Tower and DigitalBridge, which are investing heavily in major data centers. more

Cyber Diplomacy History at Foggy Bottom: The Latest Chapter

Foggy Bottom is the local affectionate name for the U.S. State Department -- because of its location near a former low-lying Potomac River lagoon in Washington DC. It recently announced the appointment of Nate Fick as the head of its "Bureau of Cyberspace and Digital Policy," pending Congressional approval because it is wrapped up with ambassadorial status. The term "cyber" in this international diplomacy context has come to include all manner of electronic communication and information systems and services, i.e., ICT. more

The Politics of Submarine Cable in the Pacific

There was a naive idealism in the early days of the Internet that attempted to rise above the tawdry game of politics. Somehow, we thought that we had managed to transcend a whole set of rather messy geopolitical considerations that plagued the telephone world and this new digital space that the Internet was creating was simply not going to play by the old rules. more

The UDRP “Celebrates” Its 500th Reverse Domain Name Hijacking Case

Today, for the 500th time, an expert panel under the Uniform Domain Name Dispute Resolution Policy or "UDRP", issued a decision finding a Complainant guilty of Reverse Domain Name Hijacking or "RDNH". RDNH is an attempt to egregiously misuse the UDRP to unjustly seize a domain name from its lawful owner... To-date, the UDRP has adjudicated over 80,000 domain name disputes. The vast majority of them result in the transfer of a cybersquatted domain name to the rightful trademark owner. more

More Mysterious DNS Root Query Traffic from a Large Cloud/DNS Operator

With so much traffic on the global internet day after day, it's not always easy to spot the occasional irregularity. After all, there are numerous layers of complexity that go into the serving of webpages, with multiple companies, agencies and organizations each playing a role. That's why when something does catch our attention, it's important that the various entities work together to explore the cause and, more importantly... more

CIDR in Networking: Improved IP Routing Efficiency

CIDR (Classless Inter-Domain Routing) is a routing system in which network engineers can distribute IP addresses based on the size of their specific network. This is more efficient than the previous system, which assigned IP addresses depending on whether the size of a network fits into one of only three sizes: Class A, Class B, and Class C. more

Do You See What I See? Geotargeting in Brand Infringements

Geotargeting is a well-established online technique for delivering tailored web content based on a user's geographic location. From an internet technology point of view, this is usually based on the user's IP address, which is converted to a physical location through a standard look-up process performed by network infrastructure. Geotargeting is commonly used by websites for several legitimate reasons, including providing users with relevant advertising and other content... more

World Economic Forum Davos 2022: War in Ukraine, Metaverse und Splinternet

The war in Ukraine, Metaverse and Splinternet were among the most discussed items during the recent World Economic Forum (WEF) in Davos. The topic of cyber security was primarily about the role of cyberattacks in the Ukraine war. Cyber is not the focus of day-to-day public war reporting but is an integral part of warfare on both sides. This applies above all to the use of "social media." more

Putin’s Iron Firewall Is Porous

In 1946 Winston Churchill declared that Russia had lowered an iron curtain across Europe, and in 2022 Vladimir Putin created an iron firewall between the Russian Internet and media and the rest of the world, but, like its precursor, it is porous. Information wants to be free. more

Branded Domains Are the Focal Point of Many Phishing Attacks

As a long-established online attack strategy, phishing remains a popular tool for fraudsters because of its effectiveness. The Anti-Phishing Working Group reported more than 300,000 distinct phishing attacks in December 2021 -- more than three times the number reported in early 2020, and the highest monthly total ever identified. more

Law as Unusual: Quantum Computing’s Five-Dimensional Challenge to the Legal Establishment

Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? more

Broadband for Communities

When talking about the benefits of broadband, it's easy to overlook how broadband has become the glue that brings people and communities together. This is becoming particularly important for rural communities but matters to people everywhere. Rural communities have been rapidly losing other forms of media that were the focal point in the past. 2004 was the peak of the newspaper business in terms of readership and revenues. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days