Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Towards a Generalised Threat-Scoring Framework for Prioritising Results From Brand Monitoring Programmes

The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more

Extraterritoriality

Black's Law Dictionary defines it as "the extraterritorial operation of laws; that is, their operation upon persons, rights or jural relations, existing beyond the limits of the enacting state, but still amenable to its laws. The term is used to indicate jurisdiction exercised by a nation in other countries, by treaty..." Extraterritoriality is also the most significant emerging development today in the law shaping virtual network architectures and services that includes OTT and NFV-SDN. more

ICANN’s Accountability Mechanisms – in Name Only?

On December 14, 2021, Dot Hip Hop, LLC (DHH) filed an Urgent Reconsideration Request following ICANN staff inaction (for its over four-month delay) of its Assignment Request for the .hiphop Registry Agreement. Not only did the ICANN Board Accountability Mechanisms Committee (BAMC) decide against considering the Reconsideration Request on an urgent basis, but on its last day of business for 2021, ICANN Org decided to retaliate against DHH for filing the Reconsideration Request in the first place ... more

Egypt’s Internet Blocked - I Call on My Friend Tarek Kamel to Unblock It and Join His People

Internet all over Egypt has been blocked in an unprecedented revolt. I call on my friend Tarek Kamel, Egypt's Minister of Telecommunication, to overturn this oppressive decision and to unblock the Internet in all Egypt immediately and to join his people in their peaceful revolt. I have known Tarek Kamel for more than a decade and long before he became minister back in the days when he used to say he had no authority and that the decisions were in the hands of his boss and that he was a mere decision-less adviser to then Minister of Telecommunication, Mr. Nazif. more

Happy World IPv6 Launchiversary! Two Years Of Remarkable IPv6 Growth

Happy Launchiversary! It's been two years since World IPv6 Launch in 2012, the day many major Internet Service Providers (ISPs), home networking equipment manufacturers, and web companies around the world started permanently enabling IPv6 for their products and services. In the last two years, participation and interest in IPv6 has only grown. Today nearly 250 network operators around the world are participating in World IPv6 Launch measurements, and we continue to see increased IPv6 deployment by network operators, websites, and home router vendors. more

ICANN Approves .XXX Again

At Friday's board meeting, ICANN once again narrowly approved the contentious .XXX domain intended for pornography. What this vote primarily shows is that ICANN's processes have been broken for a long time, and aren't getting fixed. Two board members made thoughtful and eloquent statements before the vote outlining the reasons they were about to vote for or against the domain. more

Is NIST’s Recent Letter on o.com a Bureaucratic Coup d’Etat?

Verisign recently informed ICANN that it had received a letter from the National Institute for Standards and Technology (NIST), an agency of the U.S. Department of Commerce, regarding the proposed auction of o.com described in the Second Amendment to the .com Registry Agreement agreed to by ICANN and Verisign in March 2019. This letter, which doesn't appear to be on official letterhead, is from a NIST Grants Officer and purports to overturn a letter raising objections to the auction... more

More on Broadband Router Insecurity and Being Proactive

Fergie replied on NANOG to my recent post on the subject of broadband routers insecurity: "I'll even go a step further, and say that if ISPs keep punting on the whole botnet issue, and continue to think of themselves as 'common carriers' in some sense -- and continue to disengage on the issue -- then you may eventually forced to address those issues at some point in the not-so-distant future..." He is right, but I have a comment I felt it was important - to me - to make. Not just on this particular vulnerability, but on the "war"... more

Domain Name Owner Gets Swift Relief Against Impostor Website

In rem actions over domain names are powerful tools. A trademark owner can undertake these actions when it identifies an infringing domain name but cannot locate the owner of that domain name. In a sense, the domain name itself is the defendant. The Anticybersquatting Consumer Protection Act (which is a part of the federal trademark statute dealing with the unauthorized registration of domain names) says that a court can enter ex parte orders requiring a domain name to be turned over when... more

.XXX Exposes the Naked Truth for ICANN

Internet governance can be a little on the dry side. So when tech policy reporters get a chance to write an ICANN story that features porn stars on picket lines, it's hard to blame them when they run with it. But all the media hype about ICANN's .xxx decision at last week's meeting in San Francisco exposed the real dilemma facing ICANN: how to engage governments in a multi-stakeholder model that's led by the private sector. more

Internet Multistakeholder Model: A Trade Association With Multistakeholder Theater

Did you know that we are swimming in Domain Name System abuse? As an Internet user, you probably were not aware. Apparently, doomsday is near, and the Internet is going to explode in our face if we do not do something about "domain name system abuse." This doomsday narrative has nearly jeopardized multistakeholder governance. However, it may also compel us to reconsider the multistakeholder model and its relevance in governing the Internet and its associated technologies. more

Sensitive Data Discovery: The First Step in Data Breach Protection

Users are tired of hearing about data breaches that put their sensitive information at risk. Reports show that cybercriminals stole 6.41 million records in the first quarter of 2023 alone. From medical data to passwords and even DNA information, hackers have stolen a lot of sensitive information in 2023. more

As WGIG forms, Ideas about Defining its Scope Circulate

The Internet Governance Project (IGP) issued a set of reports analyzing the current "state of play" in Internet governance. The reports were commissioned by the United Nations ICT Task Force as an input into the deliberations of the UN Secretary-General's Working Group on Internet Governance (WGIG). The report identifies the international organizations and agreements affecting the Internet, and points out where there are conflicts and gaps. more

Please, Keep the Core Neutral

Many in the technical community attribute the rapid growth and spread of the Internet to innovation that took place at the "edge" of the network, while its "core" was left largely application neutral to provide a universal and predictable building block for innovation. It is this core neutrality that provides a basis for the security and stability of the Internet as a whole. And it is this same core neutrality that is critical to the continued spread of the Internet across the Digital Divide. Unfortunately, when the politics of censorship rather than solely technical concerns drive the coordination of these "core" Internet resources, it threatens the future security and stability of the Internet. This paper proposes a paradigm upon which all the governments of the world have equal access to these core Internet resources to empower them and their citizens with the rights acknowledged in the WSIS Declaration of Principles. more

From Connecting Computers to Connecting Stakeholders: Stanford Univ. Hosts NetMundial Initiative

1974, Bob Kahn and Vint Cerf checked in the Crown Plaza Hotel in Palo Alto, worked a couple of days and presented to the world the TCP/IP protocol. Stanford hosted one of the four computers connected on equal footing (ARPANET) in 1969... A framed document in the hotel lobby remembers the historic moment. On March 31, 2014 a crowd of about 30 people from all over the world checked in the same Crown Plaza hotel for the first working meeting of the new Coordination Council (CC) of the NetMundial Initiative (NMI). more

Topics

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days