Featured Blogs

Latest

IP Addresses as Money

It's no secret that the supply of IPv4 addresses, on which the Internet has been based since the dawn of digital time, is rapidly running out. The official replacement is much larger IPv6 addresses, but I can report from experience that the task of switching is not trivial, and for a long time there will be a lot of the net that's only on IPv4. So once the initial supply of IPv4 addresses run out, and the only way to get some is to buy them from someone else, what will the market be like? more

Facebook.com/Brand vs. a New TLD: What’s a Brand to Do?

Last week I published an article in Ad Age that the editors titled "Should your company jump on the dot-brand bandwagon?" I received several emails and LinkedIn requests from advertising and PR agencies as well as brand managers. One of the questions I received had to do with my opinion on whether brands that are currently promoting themselves via Facebook, e.g., "Find us on Facebook.com/brand," should consider the new Top-Level Domains (TLDs). more

The Ugly End of the Phone Network

I was a little early. "By the end of President Obama's first term, there won't be any more copper landlines left in the country, I blogged just after Obama had been elected. Before that I'd prophesized the end of POTS (Plain Old Telephone Service) by 2010. Nevertheless, the end is nigh. And it's gonna be ugly without some planning. more

ICANN Successfully Tiptoes Through Political Minefield With New TLD Applicant Guidebook

ICANN released its sixth version of the draft Applicant Guidebook for the new Top-Level Domain (TLD) program in April following three years of debate surrounding the rules and procedures that will outline how potential applicants will apply to own their own piece of Internet real estate. Overall, the response has been positive. more

The Crimeware Infection Lifecycle

The distribution and installation of malicious and unauthorized software has evolved consistently throughout the 21st Century. The evolutionary path from annoying viruses, to destructive malware and on to financially driven crimeware, is well documented and can even be conveniently traced via the parallel evolution of technologies that were designed to counter each new aspect of the then contemporary threat. more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Understanding the Modern DDoS Threat

The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more

IPv6 RIPEness: One Year Later

A year ago, the RIPE NCC introduced IPv6 RIPEness -- a system that rates IPv6 deployment of Local Internet Registries (LIRs)... Now, one year later, the numbers have gone up... In absolute numbers: more than 3,000 LIRs have IPv6 address space. This means that the RIPE NCC has made more than 1,100 IPv6 allocations within 12 months. more

Creating, Protecting and Defending Brand Equity - Part 3

In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more

The End of the “Skype as Bandit” Era

And so it ends... Skype was always always a fun company to write about because they were always a bit of a rogue. The scrappy little startup that took on the megacorps of the telecom industry... and won in so many ways... look at their leading % of international calls... or the fact that per-minute call costs are now very clearly being commoditized down to zero... more

Responsibilities of the DNS: “Oh YES you will!”, “Oh NO you will not!”

What is the responsibility of the DNS? Should the DNS be responsible for policing traffic across its infrastructure? Should the blocking and blacklisting of names or throttling of query packets be the responsibility of the DNS? From experience I know my opening paragraph has started passionate debates in more than one section of this globe. We at CommunityDNS have found ourselves right in the middle of such heated debates. "Oh YES you will!", "Oh NO you will not!more

Why Isn’t Mobile Malware More Popular?

This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more

Defending the Network Several Times Over

Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more

The ENISA Botnet Report: Thoughts on the State of Play in Smart Phones

At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come home with was: we can still count the numbers of mobile viruses manually, <600; the problem will never be the same as on a fixed network as traffic is monitored and metered: We detect it straight away. We are studying the problem seriously. Are mobile operators really prepared for what is coming? more

The Internet Lost in Translation

In 1949 a Bell Laboratory researcher, Claude Shannon, published a paper on a new science of "Information". Bell Labs had sponsored the research with the goal of improving phone networks but was not prepared to embrace the full implications of the new science which made explicit the distinction between information in the information sense and information encoded in numbers or bits... more

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days