Featured Blogs

Latest

IPv6 Inside Everything and Everybody

With the market for connected humans reaching saturation in advanced economies, mobile operators now see connected devices as the next growth opportunity. 'Everything that can benefit from being connected will be connected', according to Ericsson's CTO (source). In the meantime, Intel dreams of embedding processors into everything that can gain something from communicating. more

Important Changes in the Proposed Final New gTLD Applicant Guidebook

The new guidebook represents an enormous step forward for the new Top-Level Domain program for a number of key reasons. As we have commented previously, the naming convention as the 'Final' guidebook is of significant importance and reinforces the ICANN Board's intention to get to the finish line with the program. Of equal importance however, is that the number of changes from the previous version of the guidebook is relatively small and focus on a few key issues which shows that the end is indeed near. more

Cyber Crime: It’s All About Data (Part 1)

Cyber crime = crime. How do we make police forces understand this and how to get it prioritized? In this series of blogs I am looking into whether aggregating data can change the way cyber crime is approached and prioritized. At a seminar at the IT Security trade fair in Utrecht detective super intendant Charlie McMurdie, head of the cyber crime unit of the London Metropolitan police, said that cyber crime was recently prioritized by the UK government. She also said the following and I'm allowed to quote this... more

Facebook + email = Facebook

Remember when Gmail launched in 2004, and everyone said it was going to kill Hotmail, Yahoo!, and AOL? Six years later, and this chart shows pretty clearly that while gmail has grown, only AOL's pageviews have fallen. The rest have held fairly steady. So what's everyone freaking out about? more

Data Based Decision Making

A new report was released by the National Telecommunications and Information Administration, part of the US Department of Commerce... It is a 68 page report with a wealth of data to help understand the factors that differentiate levels of adoption and to try to understand the reasons for non-adoption of residential broadband. In the US, people who don't use the internet represent two thirds of non-users of broadband... more

Dan Kaminsky Releases Phreebird for Easy DNSSEC

Today marks another key step in DNSSEC deployment. Congrats to Dan Kaminsky, chief scientist at Doxpara and one of our partners on the Practice Safe DNS campaign, on the release of his new code Phreebird. Announced today at Black Hat Abu Dhabi, Phreebird Suite 1.0 is a free, easy-to-use toolkit that lets organizations "test-drive" DNSSEC deployment. more

.COM - The Riskiest Top-Level Domain? (Part 2)

Following up from my post yesterday, I thought I would take a look at how spammy each particular TLD is. At the moment, I only track 8 TLD's - .cn, .ru, .com, .net, .org, .info, .biz and .name. To check to see which one is the spammiest, I took all of our post-IP blocked mail and determined how many times those messages occurred in email, and how many times that email was marked as spam... more

Best Practices: A Meaningless Term

Chad White wrote an article for MediaPost about best practices which parallels a lot of thinking I've been doing about how the email marketing industry treats best practices. After several conversations recently about "best practices," I'm convinced that the term is now meaningless. It's been bastardized in the same way that the definition of "spam" has shifted to the point that it has very different meanings to different groups of people. more

.COM - The Riskiest Top-Level Domain?

A couple of weeks ago, NetworkWorld published an article indicating that the .com TLD was the riskiest TLD in terms of containing code that can steal passwords or take advantage of browser vulnerabilities to distribute malware... It is unclear to me what they mean by TLD's being risky. The number of domains, 31.3% of .com's being considered risky, what does this actually mean? Is it that 31% of .com's are actually serving up malware or something similar? If so, that seems like a lot because for many of us, nearly 1 in every 3 pages that most people visit would be insecure... more

Vertical Integration of gTLDs Registries and Registrars Now Permitted

While many were expecting a decision of strict Registry/Registrar separation, in an unexpected ruling, it was announced that ICANN will not restrict cross-ownership between Registries and Registrars. While the current set of agreements prohibits Registries from acquiring Registrars, they do not prohibit Registrars from applying for or operating TLDs. The Board Resolutions also made note of the fact that while individually negotiated contracts have included restrictions on Registry ownership of Registrars, cross-ownership provisions have varied over time and no formal "policy" on this topic has ever been recommended by the GNSO or adopted by ICANN. more

AOL Issues This Week to Look Out For

A few issues may affect some senders/outbound mail across the email industry this week... A few folks in the industry said they saw false positives of RLY:B1 blocks since Monday the 8th. If you notice these, ensure you follow necessary procedure: check to see all is good on your end, and then submit a support ticket to AOL's postmaster group. more

The Wall Between Registries and Registrars Comes Tumbling Down

The ICANN Board has just voted to get rid of all co-ownership restrictions between domain registries and registrars. This is major news, with far-reaching consequences... This is the only principled decision the ICANN Board could have come to, and they deserve a lot of credit for doing it. By "principled," I mean taking ICANN's stated institutional principles and following them to their logical conclusion... more

FISMA Focus: Continuously Monitoring the Cyber-Levee

NIST's release of their initial public draft of SP 800-137, Guide for Continuous Monitoring of Information Systems and Organizations will create a set of challenges for the federal cybersecurity community. Agencies and contractors will need to shape the document through the multi-stage revision process while continuing to implement their own continuous monitoring measures. more

Yet Another Unfortunate CAN SPAM Case

The case Melaleuca v. Hansen has been moving slowly through Idaho federal court since 2007. On Sept 30 the court decided in favor of the defendants. Although the outcome is probably correct, the court's decision perpetuates the misreading of CAN SPAM from the infamous Gordon case that makes it in practice impossible to win a CAN SPAM case in the 9th Circuit. more

The New gTLD Program Now Needs Momentum and Focus

Once again, and hopefully for the final time, the internet community has an official time-line for the arrival of new generic top-level domains. ICANN's recent decision to publicly name May 30, 2011 as the planned launch date for new gTLD program was courageous, welcome, and absolutely necessary. The ICANN Board and staff alike should be congratulated for their bold commitment to opening the first-round application window less than seven months from now, and for providing the community with visibility into its working plan. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days