Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Understanding the Threat Landscape: Cyber-Attack Actors and Motivations

The threat landscape has rapidly expanded over the past few years, and shows no signs of contracting. With major establishments in both the public and private sectors falling victim to cyber-attacks, it is critical for organizations to identify the motivations, modus operandi (MO) and objectives of adversaries in order to adequately and effectively defend their networks. Understanding the taxonomy of cyber-attacks is the first step in preparing an organization against exposure to them. more

Put Security Alongside .XXX

Isn't security as important to discuss as .XSS? The DNS has become an abuse infrastructure, it is no longer just a functional infrastructure. It is not being used by malware, phishing and other Bad Things [TM], it facilitates them. Operational needs require the policy and governance folks to start taking notice. It's high time security got where it needs to be on the agenda, not just because it is important to consider security, but rather because lack of security controls made it a necessity. more

Domain Tasting: Big Multifaceted Action on Bad Actors

Reported in the Washington Post no less: "Dell Takes Cybersquatters to Court". As reported a few weeks ago, this is a very thorough action targeting certain practices and practitioners... I'm surprised a suit this thorough didn't name Google as a co-defendant. Then again, maybe it's not that surprising because Google offers a well liked product, has a lot more money; and a search partnership with Dell that allows Dell to share in the profit when its users engage in "right of the dot" typosquatting on Dell keyboards. It's funny, because one day, Dell could find itself on the defendant's side of the courtroom... more

The Internet’s Weakest Link

This week two major transoceanic cables experienced outages that may last several days. The outages provide a reminder that several Internet bottlenecks exist where these cables make landfall. When one thinks of bottlenecks in telecommunications the first and last mile come to mind. Yet equally vulnerable are the last few 1000 feet of submarine cable links. more

In China, Email Addresses Are Irrelevant

Great article by the BBC about email vs. mobile apps in China -- and why email is losing out to the most popular apps. It's important for Westerners such as myself to remember that most of the world did not first interact with the Internet via desktop computer. In most emerging markets, people leapfrogged computers altogether on their way to using mobile apps. more

Comcast Fires Back at E360

Back in January, bulk mailer E360 filed a suit against giant cable ISP Comcast. This week Comcast responded with a withering response... Their memorandum of law wastes no time getting down to business: "Plaintiff is a spammer who refers to itself as a "internet marketing company," and is in the business of sending email solicitations and advertisements to millions of Internet users, including many of Comcast's subscribers." Comcast's analysis is similar to but even stronger than the one I made in January... more

Mandatory Provision of Abuse Contact Information in WHOIS

An industry professional at Abusix is the backbone behind a proposal to improve and create better mitigation of abuse across different global internet networks. Basically, this introduces a mandatory "abuse contact" field for objects in global Whois databases. This provides a more efficient way for abuse reports to reach the correct network contact. Personally - as a Postmaster for a leading, white-label ISP, I applaud this with great happiness for multiple reasons. I also feel people who handle abuse desks, anti-abuse roles, etc. should closely follow this. more

Email and Social Media Accounts Under the Spotlight in UK’s Proposed New ‘Spy’ Plan

It would be reasonable to assume that your employer is archiving your email communications. But what about your personal emails, texts, phone calls and Facebook posts. Are these really private? Not for long, if the UK government has its way. It has been reported that its new anti-terror plan, if passed, would require Internet providers and phone companies to store all online communications by UK citizens for one year. more

When Will The Internet Be Divided Among Nations?

The desired goal of most of the other countries other than US is to end up with their own local language suffixes, own local language domain names, basically their own Internet, with its own domain registration policies -- in a nutshell, a very big and a very complex global mess, indeed. This fight over ICANN, the Internet Corporation for Assigned Names and Numbers, is all about a golden key, as without it, the Internet is completely useless. ...It's also ICANN, the organization that from the start has made some very stringent and often very weird policies about such issues as the golden keys. Now its global authority is being challenged, and such fights could divide the power of this controlling body, and any adverse outcome will simply split the Internet.  more

Do New gTLDs Disrupt .com?

This post examines whether the new gTLDs program is a disruptive innovation to the dominance of .com. I then use the idea of disruptive innovation to explain the relative adoption failure of previous generic Top-Level Domains (gTLDs), such as .biz, .info and .mobi. Harvard Professor Clayton Christensen's theory of disruption explains battles between market entrants and incumbents. Examples of markets transformed by disruptive innovations include classified ads (Craigslist), long-distance calls (Skype), record stores (iTunes), research libraries (Google), encyclopedias (Wikipedia), and taxis (Uber). more

Insight: .JOBS and New TLD’s - Are You Paying Attention?

A lot of the people are planning to attend the .nxt conference next month ask me to point out the benefits of new Top-Level Domains (TLDs), and today gave me a fantastic opportunity... If you are thinking of applying for a new TLD and haven't been paying attention to the latest happening with .JOBS, maybe you should be. Though .JOBS has been a bit of a quiet TLD, they've been a favorite of mine because of the specific focus of the extension. more

ICANN Threatens RegisterFly Termination

ICANN sent a 10-page letter to RegisterFly on February 21st threatening to terminate its accreditation. The letter is available here. ICANN's not exactly advertising this -- no conspicuous notice appears on its home page and, more curiously, no update has been posted by the Ombudsman despite two prior postings about RegisterFly in the past week. A member of the general public would be hard pressed to find out that any action has been threatened. more

10 Main Internet Governance Developments in 2011

Here is the provisional list of the main Internet governance developments in 2011 and we need your help to compile a final list. Please let us know your views by: Making comments and adding any other development you think should be on this list. Join the webinar discussion on 20 December 2012 at 15.00 (CET). more

Sovereignty and the Geography of Cyberspace

The cross-border nature of the Internet challenges an international system based on separate national jurisdictions. Unfortunately, discussions among governments on this growing tension easily spiral into ideological infighting about the application of sovereignty. Early November however, 1600 participants from 100 countries gathered for the 7th annual Internet Governance Forum (IGF)... Several sessions showed that it is possible to address the relations between the Internet and sovereignty in a responsible manner. more

Trend Towards Liberalization Of Country Domain Names: Enters .CN

On Monday 17 March, domain name registrations under the new Chinese Internet address, .cn, were available for the first time to registrants both inside and outside of China. As China's equivalent of .uk, or .us, the .cn domain space will be the Internet address of choice for Chinese consumers and for corporations interested in operating in one of the largest Internet markets. more

Topics

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days