Featured Blogs

Latest

The Multistakeholder Moment of Truth: Will Stakeholders Hold ICANN Accountable?

During the two-year period preceding the IANA transition in 2016, there was a near-superhuman effort put forth by the community of stakeholders to design, debate, and deploy an accountability framework for ICANN that would serve to check and balance the coordinator of the global DNS. One of the overriding concerns that stakeholders sought to address was the possibility of ICANN being captured, and it was argued that the global community of stakeholders would serve as a "backstop" that would hold ICANN accountable. more

The 6G Hype is Already Starting

Even though 5G hasn't yet made it onto any cellphone, the wireless vendor industry is already off and running looking at the next generation of wireless technology that has been dubbed as 6G. This recent article describes the European Union Hexa-X project that started in January to look at developing specifications for next-generation wireless technology using terahertz spectrum. more

Could Bulk-Registered Typosquatting Domains Be Connected to .ORG DNS Abuse?

Public Interest Registry (PIR) announced the creation of the DNS Abuse Institute about two months ago as it believes that "every .ORG makes the world a better place" and "anything that gets in the way of that is a threat," notably in the form of Domain Name System (DNS) abuse. To show support for the initiative, WhoisXML API analyzed monthly typosquatting data feeds for December 2020, January 2021, and February 2021 to identify .ORG domain trends... more

Cybersecurity, an Essential Weapon in the Cyberwarfare to Protect Our Democracy

We see the problems that we are facing within an increasingly digital society and economy. We cannot go backward; the only way forward is to ensure that this new digital environment is made as safe as possible from a personal, social, political and economic perspective. We are currently struggling on these fronts. Unfortunately, we have now clearly entered a situation of cyber warfare. States now use digital technologies to impose and undermine ideologies. more

What Are the Connections to Identified Hafnium Malicious IP Addresses?

Cyber attackers are very skilled at infiltration. They'd find ways into a house through cracks and holes that the homeowner doesn't know about. Analogically speaking, that's what the new cyber attack group dubbed "Hafnium" did when they identified several zero-day Microsoft Exchange vulnerabilities to get into target networks. With thousands of users for every Microsoft Exchange server, the attack has far-reaching implications. First, it establishes the presence of a new threat actor group in town. What else could they be up to? more

Telling the Truth About 5G

I still run across articles that extol the supposed wonders of 5G. The most recent, published in Gizmodo asks "How 5G Could Replace Your Home Broadband Connection". I was surprised to see an article like this in a tech-oriented site because the article gets most of the facts wrong about 5G - facts that are not hard to verify. This article talks about 5G having "faster download speeds, faster upload speeds, more bandwidth, and lower latency" than landline broadband. more

The Domain Industry Keeps on Growing and Changing

It has become very clear once again: the domain industry won't stop. The scenario we know today is constantly changing, and our industry adapts to the changes taking place in society and the economy. Thanks to its versatility, the domain industry continues to amaze with some big changes year after year. This sector has its own peculiarities, rules, and opportunities for all stakeholders involved. more

The Insult and Injury of the U.S. Government’s Failure to Enforce ICANN’s Contractual Obligation

Someone recently observed that many stakeholders have fallen victim to a "chilling effect" resulting from fear of retaliation by the rich and powerful bullies currently infecting the multistakeholder community, ICANN, and Internet governance. I related to what I was hearing because I've been personally targeted and libelously attacked and it is deeply dismaying enough having to worry about threats to revenue and reputation along with other harmful effects of such thuggery. more

Loose Lips

When I was in the military, we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain that a unit is about to be deployed. more

Why ICANN Rejected ISOC’s Billion-Dollar Attempt At Feathering Its Own Nest With .org Sale?

As I've pointed out in recent articles, the promises and obligations of the Memorandum of Understanding (MOU) are merged by direct reference into the InterNIC licensing agreement between the U.S. Department of Commerce and ICANN. This licensing agreement has been extended twice by mutual consent, most recently until January 2025. Therefore, the MOU's promises and obligations remain in effect through the InterNIC licensing agreement despite the fact that the MOU itself terminated in 2009. more

4G on the Moon

This post is a little more lighthearted than my normal blog posts. An article in FierceWireless caught my eye talking about how Nokia plans to establish a 4G network on the Moon. The primary purpose of the wireless technology will be to communicate between a base station and lunar rovers. 4G LTE is a mature and stable technology that can handle data transmission with ease... more

The Supreme Court Decides that Compatible Software is Still Legal

Back in the 1980s, everyone used the Lotus 1-2-3 spreadsheet on their PCs. In 1989, Borland released a competitor, Quattro Pro. It used the same menu commands as 1-2-3 so that users could import their 1-2-3 spreadsheets with keyboard macros. Lotus sued Borland, and after a loss in the district court, Borland won on appeal, arguing that the keyboard commands are a "method of operation" and not subject to copyright. Lotus appealed to the Supreme Court... more

gTLDs Under the Microscope in Q1 2021: .kpmg Back in Focus and a Look at Past Launches

With the end of March upon us already, we take a fresh look at .kpmg and its ongoing .brand usage strategy in our first quarterly report of the year. A review of Alexa.com rankings for .brands and other new gTLDs is included as well as an examination of the factors that have affected registration rates for new gTLD launches from 2019 and 2020. Our MarkMonitor team of experts also analyzes the ICANN Final Report on the new gTLD Subsequent Procedures Policy Development Process... more

An Anti-Competitive .com Fait Accompli?

In a recent article, Is ICANN Staff Misleading the Board Into Violating Obligations to the U.S. Government, I wrote: The referenced Memorandum of Understanding (MOU) is the vehicle by which the U.S. government delegates to ICANN the responsibilities for overseeing the technical management of the Internet's Domain Name System (DNS)... This is important for many reasons, and much remains to be analyzed for additional context that can help expose the rot at the Internet's root. more

The White House Broadband Plan

Reading the White House $100 billion broadband plan was a bit eerie because it felt like I could have written it. The plan espouses the same policies that I've been recommending. This plan is 180 degrees different than the Congress plan that would fund broadband using a giant federal, and a series of state reverse auctions. The plan starts by citing the 1936 Rural Electrification Act, which brought electricity to nearly every home and farm in America. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days