Featured Blogs

Latest

The Exponential S-Curve Hastens Decline of Asset Values

At the moment we are facing the end stage of a relatively large range of traditional products and services. The reason for this is that for a long time traditional industries have been able to delay the arrival of the decline phase of many of their products, basically because of the monopolistic, or at least dominant, structures of many of the industry sectors -- and in particular telecoms, media, energy and banking. more

Network Neutrality and the FCC’s Inability to Calibrate Regulation of Convergent Operators

For administrative convenience and not as required by law, the FCC likes to apply an either/or single regulatory classification to convergent operators. Having classified ISPs as information service providers, the Commission unsuccessfully sought to sanction Comcast's meddling with subscribers' peer-to-peer traffic. Now Chairman Genachowski wants to further narrow and nuance regulatory oversight without changing the organic information service classification. more

Why Aren’t There More Spam Lawsuits?

The CAN SPAM act has been in place for five and a half years. Compatible state laws have been in place nearly as long. Anti-spam laws in the EU, Australia, and New Zealand were enacted years ago. But the number of significant anti-spam lawsuits is so small that individual bloggers can easily keep track of them. Considering that several billion spams a day are sent to people's inboxes, where are all the anti-spam lawsuits? more

Say No to WIPO’s Proposal to Amend the PDDRP to Create New Law

A number of comments to ICANN's proposed Post Delegation Dispute Resolution Process for new gTLD Registry Operators support a proposal by the World Intellectual Property Organization (WIPO) to hold a registry operator accountable for trademark infringement that occurs within a TLD if it "knowingly permitted, or could not have reasonably been unaware of" infringing domain names within the TLD. more

When Registrars Look the Other Way, Drug-Dealers Get Paid

Since November of last year we have been discussing the problem of illicit and illegal online pharmacy support by ICANN-accredited Registrars. In several articles and direct contact with the Registrars we have tirelessly tried to convey the seriousness of this problem, many listened, some did not... With the background information already known, the case presented here is much more specific and concerns EvaPharmacy, which was until recently, the world's largest online criminal pharmacy network. more

DNSSEC Root Signature, Almost There!

IT security specialists have known for years that the plain DNS is not to be trusted. Any hope for improvement rests on the DNSSEC protocol deployment. In this post, I will review the current status in one critical aspect, namely the DNS root signature key management. The other two foremost are the application usage of DNSSEC protocol functionality and the operational front, or the extent of deployment in the DNS infrastructure. The operational front includes the support by the DNS root nameservers, but my focus on signature key management leaves this issue aside. more

One Big Cheer for ICANN - But Still a Way’s from Our “Gooool”

As we approach the World Cup in South Africa this June it's heartening to see the amount of attention being paid to the continent. As with ICANN's recent Nairobi meeting, the eyes of the world are focusing on Africa in a new way -- as a sophisticated marketplace, and as a destination for investment, technology, and yes, sports... Still, as we prepare for the Cup and as we celebrate ICANN's recent approval of more Internationalized Domain Names (IDNs), our job as an Internet community remains unfinished. Too many scripts and thus too many key voices remain "off the pitch". more

Resources for Cleaning Your Network

The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more

Set-Top-Box Revisited: How Does the Gateway Solution Increase Competition?

The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more

Open Broadband Infrastructure… And Why There’s No Business Case for FttH to Sell TV

Those advocates of a free market approach to fiber to the home (FttH), rather than a utilities-based one, often point to entertainment as the way to make that happen. And they then immediately point to the USA, where FttH rollouts have indeed been driven by competition between the cable TV companies... The telcos who were initially less enthusiastic about broadband (because it required them to abandon their lucrative ISDN services and replace them with the simpler and cheaper DSL technology) suddenly found themselves bested in the broadband market by the cable TV companies - a trend we also saw in some of the European markets - for instance, the Netherlands... more

Tackling Cyber Security: Should We Trust the Libertarians?

One of the RSS feeds that I read is Reason magazine, which is a web site for libertarians. In general, libertarians want less government intervention both in our personal lives and in the economy. The idea behind libertarians is that today's Republicans want less government intervention in our economy but are perfectly fine to have them dictate some aspects of morality. Similarly, today's Democrats want less government intervention in our personal lives but are perfectly fine with creating government bureaucracy to deliver social services. That's an oversimplified summary, but is more or less correct. About two months ago I got an article in my RSS feed where Reason was commenting on the government's response to the cyber war threats. more

Infrastructures on the Next Web

Werner Vogels, CTO of Amazon, explains how web applications will be built in the future. His point is twofold. The bad news is that expectations for good web applications are sky high. It has to have rich media, available on multiple devices, very scalable, social networking and that is just the beginning. The good news is that a lot of this can be done by services that are readily available on the web, with reasonable usage based pricing. more

The Domain Aftermarket Redux: Are Domainers “Investors” Yet?

What better way to kick things off than to review the domain aftermarket, three years after my then infamous "Domain Aftermarket Overdue For An Asset Repricing" article which caused a bit of a stir at the time. I said then that there was a big recession coming, in it everything would suffer severe price declines, and that domain names would not be exempt. I went on to say that the low-hanging fruit in the domain industry had been picked: type-in activity would go into secular decline over time, and that domainers would face increasing competition from other avenues such as DNS resolvers, ISPs and web browsers. It didn't go over well. more

DEFCON 1 Status at ICANN

Defense Readiness Condition (DEFCON) is a measure of the activation and readiness of the United States armed forces. The DEFCON scale is a numerical ranking from 5 (standard peacetime protocol) to DEFCON 1 (expectation of actual imminent attack). Today ICANN should find itself at a DEFCON 1 status with the announced pending departure of Doug Brent, ICANN's Chief Operating Officer, effect at the end of July. more

Old Dog, New Tricks: Gift Card Scams in Social Networks

In the past few months, a flurry of gift card scams leveraging such high-profile brands as Best Buy, Whole Foods and IKEA have emerged on Facebook. These scams often use the brand's logo, website URL, or general "look and feel" on Facebook "fan" pages to give the impression that these offers are legitimate. Some scams are even bold enough to include bogus, non-interactive fan comments to add a greater sense of authenticity to the gift card offer. To date, these scams have been successful at tricking tens of thousands of consumers. In just one day, for example, a fan page titled "IKEA Get a FREE $1000 IKEA Gift Card! (ONLY AVAILABLE 1 DAY)" registered 40,000 fans before being shut down. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days