Featured Blogs

Latest

The Mainsleaze Blog

Mainsleaze is nerdy slang for spam sent by large, well-known, otherwise reputable organizations. Although the volume of mainsleaze is dwarfed by the volume of spam for fake drugs, account phishes, and Nigerian 419 fraud, it causes work for mail managers far out of proportion to its volume... The problem with mainsleaze is that it is generally mixed in with mail that the recipients asked for, and there's no way to tell the difference mechanically. more

Innovating with New gTLDs

One of the primary purposes of the ICANN New generic Top-Level Domain (gTLD) program is to foster innovation in the DNS industry and the wider Internet. While having a desirable TLD string that users can relate to is a good starting point, gTLD applicants may want to bolster their value propositions by offering innovative services and differentiate their TLDs from others. Defining the services to be offered is so central to a gTLD that it should be part of the initial strategy of any prospective applicant. more

DDoS Attacks: What’s in Store for 2012?

According to Kaspersky Lab, 2011 has seen "numerous DDoS attacks with a variety of motives," many of which will "go down in the annals of cybercrime." As we look ahead to 2012, it's worth examining some of those motives to see what they portend. more

Why Brands Need Their Own TLD - The Mulberry-Sale Site that Scammed Me

As a seasoned internet user, even an old 'Domainer', I was there when ICANN launched the first round of New TLDs. I remember the criticism we received from the media back then. We were invited to countless roundtable discussions, press conferences, and local internet events at which we were expected to answer the key media question: "Why are new TLDs necessary?" Dot BIZ, .INFO, and four more were the test bed new TLDs -- I represented .BIZ in EMEA. more

Of Canaries and Coal Mines: Verisign’s Proposal and Sudden Withdrawal of Domain Anti-Abuse Policy

Too many techies still don't understand the concept of due process, and opportunistic law enforcement agencies, who tend to view due process constraints as an inconvenience, are very happy to take advantage of that. That's the lesson to draw from Verisign's proposal and sudden withdrawal of a new "domain name anti-abuse policy" yesterday. The proposal, which seems to have been intended as a new service to registrars, would have allowed Verisign to perform malware scans on all .com, .net, and .name domain names quarterly when registrars agreed to let them do it. more

Federal Cybersecurity Best Practices: FISMA Continuous Monitoring

Studies have found only limited, insufficient agency adherence with FISMA's (Federal Information Security Management Act) continuous monitoring mandates. One survey found almost half of federal IT professionals were unaware of continuous monitoring requirements. A recent GAO report found that two-thirds of agencies "did not adequately monitor networks" to protect them "from intentional or unintentional harm." more

Protecting Intellectual Property is Good; Mandatory DNS Filtering is Bad

It has been about six months since I got together with four of my friends from the DNS world and we co-authored a white paper which explains the technical problems with mandated DNS filtering. The legislation we were responding to was S. 968, also called the PROTECT-IP act, which was introduced this year in the U. S. Senate. By all accounts we can expect a similar U. S. House of Representatives bill soon, so we've written a letter to both the House and Senate, renewing and updating our concerns. more

Facebook and Apps vs. Domains

This debate never got heated during the NewDomains.org conference in Munich last month. One might speculate that it was largely because most in the audience and on the panel, support and believe in the existence of both. There is no need to make a direct either/or comparison. What sets Facebook and Apps apart from existing popular Top-Level Domains (TLDs) is the concept of a closed environment in which users can interact with the technology and each other in a dedicated space. more

Supercookie Debate Offers a Transparent Opportunity

Recent articles in the press have outlined how sites including MSN and Hulu are now using an advanced version of the old cookie file to track user behavior. These "supercookies" are very hard to detect and delete, and can track user behavior across multiple sites, not just one. These tricky little trackers have lawmakers pressing the FTC to investigate, and the IAB scrambling to defend industry practices. more

Bringing Order to The World’s Cybrary: New TLDs Make Sense to Organize the Chaos of the Internet

There has been considerable debate on whether the Internet needs new Top Level Domains. Advertising advocacy groups have objected to the expense of re-investment in online branding. There's a lot of work involved in telling the world .BEYONCE is where you will now find all official Beyonce related information. I'm wondering, why would anyone object to some order being applied to the internet? more

When Cyber Awareness Is Fundamentally Lacking

"Smartphones (and tablets, WdN) are invading the battlefield", reports the Economist on its website of 8 October 2011. On the same day the hacking of U.S. drones is reported on by several news sites. ("They appear friendly". Keyloggers???) Is this a coincidence? more

Visibility of Prefix Lengths in IPv4 and IPv6

Internet routes are specified for an address prefix. The shorter the prefix, the more general the route. A shorter prefix covers more address space and thus a bigger part of the Internet. Very long prefixes cover few addresses and are used for local routing close to the destination address. In general, it is not necessary to distribute very long prefixes to the whole Internet, because a more general, shorter prefix is sufficient to direct packets in the direction of the destination. more

The Internet of Things and User-Generated Internet Energy

One of the key factors in the transformation of the telecommunications industry was the fact that, thanks to the internet, end-users were suddenly able to become active participants in generating content for both private and public use. Companies such as Google, Amazon, eBay, Skype and Apple, followed by a number of national and international social media companies, all became involved in these new developments, and they became the great game-changers of the industry. Telecoms companies were caught off guard... more

Government and Botnets

The US government is looking at telling ISPs how to deal with compromised customers and botnets. They're a bit late to the party, though. Most of the major commercial ISPs have been implementing significant botnet controls for many years now. more

Governing the Internet: The Model is the Message

In 1964, Canadian scholar Marshall McLuhan famously wrote, "The medium is the message." This phrase popped into my head last week as I listened to the opening speakers at the Internet Governance Forum in Nairobi. McLuhan meant that the form in which a message is delivered - the medium - embeds itself in the meaning of the message. The medium influences how the message is perceived and understood and is therefore inseparable from the message itself. What does this have to do with the Internet? more

Topics

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days