Featured Blogs

Latest

2012: The Year of Securing Websites?

In a seemingly never-ending row of news on hacks of websites now the news in which 2.3 million individual cases of privacy sensitive data were accessible through a leak in the websites of most public broadcasting stations in the Netherlands. To make the news more cheerful, the accessible data was, if compiled, sufficient to successfully steal a complete identity. What were thoughts that came to my mind after hearing this news on Friday? more

Another Thanksgiving and Another 131 Domain Names Seized by Homeland Security

Last year I wrote a post right after Thanksgiving entitled: "While You Were Eating You're Turkey Homeland Security Was Seizing 9 Domains". Well I could have repeated the headline today except the number would be 131 domains rather than just 9. Looks like Homeland Security is going to make domain seizures on Thanksgiving as common in the US as Turkey and Stuffing. more

Brazil: The Newest Up and Comer

The Virus Bulletin Conference last month had some good presentations, including this one by Fabio Assolini of Kaspersky. He spoke about how Brazil is the the newest up-and-comer on the cyber crime block. The tale begins with the story of Igor and Emily, two cyber criminals operating out of Brazil. Together, the two of them stole $300,000 US from a single Brazilian bank in one year. more

IPv6 Deployment from a Different Perspective

Often when looking at IPv6 deployment statistics, the size of the organisation or the network is not taken into account. In this article, we look at IPv6 deployment of Local Internet Registries (LIRs) per country in correlation to the size of the LIR. When looking at IPv6 deployment at the LIR level, we can look at the following two metrics... more

ICANN and Monopolies

One thing that ICANN clearly lacks is a set of well documented and often referenced founding principles. This leaves the awkward position where everyone who has been around since the beginning has a different position on what those principles should have been and all those that have joined later know that there is something fundamental missing. The missing principle vexing me this week is that of fair competition. Even now, long after the gTLD vote, the argument still runs on... more

Sovereign Debt Crisis: A Catalyst for IPv6 and Virtualized Network Services

Virtualization of core network services such as DDI has created a lot of controversy over the last couple of years. Perhaps most notably, Infoblox and Gartner have been both claiming that virtualized network services are not on the agenda of larger organizations, nor will they ever be. I'm not sure I have ever seen a convincing technological reasoning for this position. Rather, the logic has always been circular: it's not going to happen because we're not seeing it happening. more

Taking the Anti-SOPA Message to the People

It was fascinating last week to read coverage of congressional hearings around the SOPA bill, or Stop Online Privacy Act. The bill has strong support from the Motion Picture Association of America, the U.S. Chamber of Commerce and big pharmaceutical companies. It's opposed by most technology and telecom companies, plus consumer advocate groups like the Electronic Frontier Foundation and Public Knowledge. more

From IPv6 Day to IPv6 Everyday

Quite a number of articles and blogs including one I contributed had IPv6 haruspices dissect the entrails and divine the future of the internet in the wake of the june 8th IPv6 World Day. It came and went with some trepidation, the internet did not go comatose and some marveled at and reported on traffic peaks they witnessed. Preparation of a keynote for the Gogonet Live conference in San Jose, provided me the opportunity to have a look at how some variables evolved since June... more

Water Supply System Apparently Hacked, with Physical Damage

According to press reports, a water utility's SCADA network was hacked. The attacker turned a pump on and off too much, resulting in physical damage to the pump. ... For years, security specialists have been warning that something like this could happen. Although more and more people have started to believe it, we still hear all of the usual reassuring noises -- the hackers don't know enough, we have defenses, there are other safeguards, etc. That debate is now over... more

Why the Lawsuit Against .XXX Maybe the Best Sales Tool Ever For New gTLD Applicants

"There is a serious danger that ICM will establish and monopolize such a distinct market. As consumers seeking adult content become more aware of the .XXX TLD, registering and displaying websites in other generic TLDs may not easily be substituted for registration in the .XXX TLD." No that statement is not from the ICM Registry's sales material. more

New gTLDs and the 1%

While Occupy Wall Street and other groups representing the so-called 99% are getting most of the press, the 1% is raising its profile as well, at least when it comes to gTLDs. They are complaining that introducing global choice and competition to the Internet will cost them money. The chief of the Association of National Advertisers (ANA) now says that it has "spent the last few months" considering the new gTLD program, and has found it lacking. They want ICANN to shut the whole thing down. more

Spotlight on TD-LTE Technology and Spectrum

As handheld devices grow ever more sophisticated and demand for content-rich services such as mobile video increases, mobile data traffic is likely to continue growing at an explosive rate. This represents good news for the industry, but next-generation wireless technologies will need to be ready to meet the challenge and able to cope with these increased demands on bandwidth. A recent TD-LTE spectrum workshop looked at the potential of TD-LTE technology to take us on to the next stage of wireless communication. more

What Chinese DDoS Malware Looks Like

While at that same Virus Bulletin conference that I was talking about earlier in my other post, I also had the chance to check out a session on Chinese DDoS malware put on by some folks from Arbor Networks. As little insight as I have into Android malware, I know even less about Chinese DDoS malware. So what's Chinese DDoS malware like? What are its characteristics? more

Taking the Leap to Cloud-Based Malware Inspection

Is desktop anti-virus dead? Someday I'd love to make that announcement, but it still feels to me that there's a Patron Saint of Voodoo with an affinity for bringing it back to life -- like some macabre mirror image of the malicious zombies it's supposed to provide protection against. It's kind of ironic that today's innovation in desktop anti-virus isn't really happening at the desktop; rather it's occurring in the cloud. more

European Commission in Favour of New IANA Contract - Disapproves of US Only Bidding Process

In a move that shouldn't come as a surprise to anyone, the EU Commission has given a rather mixed welcome to the IANA bid. While they obviously like a lot of what they are seeing, they're also not overly impressed with the contract only being open to US companies. more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days