Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Google Chrome: Cloud Operating Environment

Rather than blathering on to the blogosphere about the superficial features of Google's new Chrome browser I've spent some time studying the available material and [re]writing a comprehensive Wikipedia article on the subject which I intend for anyone to be free to reuse under a Creative Commons Attribution 3.0 license rather than Wikipedia's usual strong copyleft GNU Free Documentation License (GFDL). This unusual freedom is extended in order to foster learning and critical analysis, particularly in terms of security. more

Think ICANN Will End Up Rolling in New gTLD Cash? Think Again!

January 2014. The first registry contracts have been signed. The first Sunrise priority registration periods have been opened. The new gTLD program is well on the way. So maybe now, at last, we can start to find out the real costs of opening up the Internet root? And how much revenue doing so has brought ICANN! Short answer: ICANN has taken in USD 344.958 million from the first round of new gTLD applications. The figure comes from the first of ICANN's quarterly financial statements, covering the three months up until September 30th. more

Number Misuse, Telecommunications Regulations and WCIT

Another twenty five years has just zoomed by, and before you know it, it's all on again. The last time the global communications sector did this was at the WATTC in 1988, when "the Internet" was just a relatively obscure experiment in protocol engineering for data communications. At that time the Rather Grand telephone industry bought their respective government representatives... to the Rather Grandly titled "World Administrative Telegraph and Telephone Conference (WATTC) in November 1988 in Melbourne, Australia and resolved to agree to the Rather Grandly titled "International Telecommunication Regulations." more

New Study Revealing Behind the Scenes of Phishing Attacks

The following is an overview of the recent Honeynet Project and Research Alliance study called 'Know your Enemy:Phishing' aimed at discovering practical information on the practice of phishing. This study focuses on real world incidents based on data captured and analyzed from the UK and German Honeynet Project revealing how attackers build and use their infrastructure for Phishing based attacks. "This data has helped us to understand how phishers typically behave and some of the methods they employ to lure and trick their victims. We have learned that phishing attacks can occur very rapidly, with only limited elapsed time between the initial system intrusion and a phishing web site going online..." more

Carriers Skirting Rules on Network Neutrality vs. Free’s Innovative Network

From will they ever learn department, we are once again seeing attempts by incumbent carriers to skirt rules around network neutrality. They tried and failed with UBB. Now they are at it again with "speed boost" technologies. The two technologies at question are Verizon's "Turbo" service and Roger's "SpeedBoost". more

Afilias’ Cynical Attempt to Secure a Windfall at Community Expense

On Friday, October 28, Afilias issued a public statement urging the Internet Corporation for Assigned Names and Numbers (ICANN) to nullify the results of its July 27, 2016 public auction for the .web new generic top level domain (gTLD) -- in which Nu Dotco, LLC (NDC) submitted the highest bid for .web -- and disqualify NDC from participation in the .web contention. The real issue here is whether ICANN should enforce the results of a fair and competitive public auction... more

Unlicensed Wireless Broadcasting Spectrum in the USA

New developments that have been announced by the FCC in the United States have rekindled the decade-old debate on the use of the so-called 'white spaces' in broadcast spectrum that are to be used for telecoms purposes. In September 2010, the FCC adopted a Second Memorandum Opinion and Order that updated the rules for unlicensed wireless devices that can operate in broadcast television spectrum at locations where that spectrum is unused by licensed services. This unused TV spectrum is commonly referred to as television 'white spaces'. The rules allow for the use of unlicensed TV devices in the unused spectrum to provide broadband data and other services for consumers and businesses. more

New gTLD Registration Strategies: Preparing for the Inevitable

As we draw closer to the first new gTLD registry launch, many companies are beginning the arduous task of developing their new gTLD registration and blocking strategies. And after speaking with dozens of clients, I can tell you that the planned approaches are ranging from very minimal registration and blocking strategies for one or two core brands, all the way through to registrations of multiple brands in every single new gTLD registry. more

Skype’s End User License Agreement

I was looking at the End User License Agreement to which Skype wants people to assent. I noticed the following odd provision (Section 3.2.4): You hereby grant to Skype a non-exclusive, worldwide, perpetual, irrevocable, royalty-free, sublicensable and transferable licence to Use the Content in any media in connection with the Skype Software, the Products and the Skype Website. more

Confusing New gTLDs

Choosing the right domain name is like choosing a Trademark, it has to be taken seriously because it is a long time image investment. If new gTLDs have brought new options to those in charge of creating a name (precision, availability, novelty) and registering its (their) domain name(s), they also brought the possibility to make a terrible mistake when choosing the right extension for a domain name. more

Where is Metadata Anyway?

I can't help but think that the situation in this rather old joke applies very precisely to the current Australian efforts to compel network operators, through some contemplated regulatory instrument, to record and retain network-collected data about their customers' online activities. What I'd like to examine here the emerging picture that while networks, and network operators, make convenient targets for such surveillance efforts, the reality of today's IP network's are far more complex, and Internet networks are increasingly ignorant about what their customers do. more

Results of ICANN’s Special Meeting

As a follow up to ICANN's Special Meeting of the Board on February 18, 2004, previously reported here on CircleID, the following resolution was reached on the WLS Negotiations with VeriSign: "During this Board Meeting, the Board authorized the public posting of the 26 January 2004 letter setting forth the results of the negotiations and asked that this matter be placed on the Board's agenda for the publicly-held Board Meeting for 6 March 2004 in Rome, Italy." more

Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?

The President and Congress are deliberating how best to ensure appropriate cybersecurity protection for private sector critical infrastructure. Legislative action and Executive Order are both under consideration. It is possible, however, that the White House Office of Management and Budget (OMB) already has sufficient statutory authority to enact new cybersecurity regulations through the normal notice-and-comment rulemaking process. more

New TLDs: Can You Say .Never?

ICANN continues at its snail's pace on introduction of new top-level domains. At the Montreal meeting, staff sprung this RFP for new sponsored TLDs. As if "a few" and "sponsored" weren't limitation enough, it further narrowed the applicant pool to those who had applied unsuccessfully as sponsored TLDs in November 2000. more

Here’s Looking at You…

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services... These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads into one of these clouds, then it's no longer necessarily entirely your data; it may have become somebody else's data too... more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days