A recent news story, following research from security provider Infoblox, highlighted the case of the 'Revolver Rabbit' cybercriminal gang, who have registered more than half-a-million domains to be used for the distribution of information-stealing malware. The gang make use of automated algorithms to register their domains, but unlike the long, pseudo-random ('high entropy') domain names frequently associated with such tools, the Revolver Rabbit domains instead tend to consist of hyphen-separated dictionary words (presumably so as to obfuscate their true purpose), with a string of digits at the end. more
The domain name system (DNS) is vital for businesses as it facilitates customer access to online services and resources. Strategic DNS management plays a pivotal role in cybersecurity, safeguarding against threat vectors and ensuring secure global connectivity across online channels including apps, email, websites, application programming interfaces (APIs) and more. more
There have been a number of occasions when the Internet Engineering Task Force (IETF) has made a principled decision upholding users' expectations of privacy in their use of IETF-standardised technologies. (Either that, or they were applying their own somewhat liberal collective bias to the technologies they were working on!) The first major such incident that I can recall is the IETF's response to the US CALEA measures. more
In 2019, I wrote that Amazon would be a formidable satellite-ISP competitor. I still think so, but I didn't expect it would be over four years until they launched the first test satellites. In the meantime, SpaceX has put over 5,000 satellites in orbit and has over two million Starlink customers. Amazon has permission to launch 3,236 satellites. more
The Optus outage in Australia from last year was immediately on my mind when on Friday afternoon a similar event swept, this time, across the world. Also, in this case it was a software update that caused the problem. This time from global security software provider CrowdStrike. The culprit appears to be an update to the CrowdStrike Falcon platform, a security monitoring tool widely deployed by businesses and organisations on Microsoft desktop computers and notebooks. more
Global leaders gathered in New York at the Summit of the Future and adopted the "Pact for the Future" on Sunday 22nd September. This is a historic milestone as the Pact is the first international agreement aimed at securing a better digital future for all, grounded in human rights. The recent adoption of the "Pact for the Future" at the United Nations General Assembly marks a significant step toward revitalizing multilateral cooperation in an increasingly fragmented world. more
On July 22, the FCC's open Internet order - which transforms Internet access service from a lightly regulated information service into a heavily regulated telecommunications service - will take effect. This article describes the policies and legal theories underlying the Order and the Order's effect on consumers of Internet services and providers of the service, including a number of entities that had previously escaped FCC regulation. more
When it comes to breach disclosures, today's chief information security officers (CISOs) are struggling with an especially turbulent regulatory environment. Security teams are understaffed, and systems are more extensive, making them harder to monitor and defend, while threats are becoming more sophisticated, more frequent, and more varied. It's at precisely this difficult juncture that regulations and enforcement are rapidly changing, leaving CISOs feeling like they are running up the down escalator. more
In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape? more
In the Converse.co dispute, a three-member UDRP panel unanimously ordered the transfer of the disputed domain name to the Complainants, All Star C.V. and Converse, Inc., owners of the well-known brand CONVERSE for shoes and apparel. The panel drew the inference that the Respondent, by setting of an asking price of around $300,000 after having acquired the domain name for $306, was primarily motivated by a bad faith intent to target the Complaint. more
Anybody not involved in the telephone business will probably be surprised to find that the old TDM telephone networks are still very much alive and in place. The old technologies were supposed to be phased out and replaced by digital technologies. The FCC started talking about this before 2010. In 2013, Tom Wheeler, the FCC Chairman at the time, announced an effort to force the needed changes, which was dubbed the IP Transition. more
During CSG Open Working Session at ICANN79, Members from the ICANN Community were invited to an open meeting to share their experiences with Registration Data Request System (RDRS) from the Requestor side. As President of the Edgemoor Research Institute (ERI), I had the honor to present the keynote address and I am pleased to be able to provide you with ERI's report of the meeting. more
Over the next two years, several global dialogues about our shared digital future are taking place -- and big changes could be in the cards. An intensive series of negotiations will see United Nations (UN) Member States weigh in on the future of digital cooperation -- and multistakeholderism finds itself under the spotlight. The multistakeholder model allows everyone who has a stake in the internet to meaningfully engage in discussions and decisions about its future on equal footing, but a number of critics are calling for change. more
One of the most common questions I've been asked lately is what I think the impact AI will have on the broadband industry. All of the big ISPs in the industry have actively been pursuing the use of AI. For example, AT&T Labs says it is investigating the use of AI to optimize the customer experience and auto-heal the network. Comcast says that it is using AI to help process petabytes of data every day. more
Do human rights come into the picture when technology and policy work are involved? If so, where? This is a question that has come up multiple times during the last dozen years, and occasionally even before, in Internet Governance discussions. These discussions have included debates on whether human rights were specifically applicable to protocol design or to the organizations developing protocol standards. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix