Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Google: Not All ccTLD’s Are Created Equally in Generic Search Rankings

There is a very interesting video posted on YouTube.com from Matt Cutts of Google who answered the question about how ccTLD's are viewed by Google especially when they are being used as domain hacks. Here is the question: "We have a vanity domain (http://ran.ge) that unfortunately isn't one of the generic TLDs, which means we can't set our geographic target in Webmaster Tools. Is there any way to still target our proper location?" more

Securing the DNS in a Post-Quantum World: New DNSSEC Algorithms on the Horizon

One of the "key" questions cryptographers have been asking for the past decade or more is what to do about the potential future development of a large-scale quantum computer. If theory holds, a quantum computer could break established public-key algorithms including RSA and elliptic curve cryptography (ECC), building on Peter Shor's groundbreaking result from 1994. more

Euro 2020: An Illustration of the Link Between Real-World Events and Online Infringements

In the run-up to the postponed Euro 2020 football championships, we've analyzed historical registration trends in domains containing the terms "euro2020" or "euro2021." A number of previous studies -- looking at events as diverse as the COVID pandemic, the annual holiday season shopping events, and the Reddit campaign relating to the manipulation of the stock price of U.S.-based retailer GameStop -- show a link between real-world events and spikes in online activity. more

P2P: Boon, Boondoggle, or Bandwidth Hog?

Depending on whom you ask, peer-to-peer (P2P) services may be the best thing that ever happened to the Internet or a diabolical arbitrage scheme which will ruin all ISPs and bring an end to the Internet as we think we know it. Some famous P2P services include ICQ, Skype, Napster, and BitTorrent. Currently a new P2P service called iPlayer from BBC is causing some consternation and eliciting some threatening growls from British ISPs... more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more

Why Is Verisign Ignoring New Revenue?

Last month saw a much-anticipated decision handed down in the Independent Review Panel (IRP) proceeding examining the controversial 2015 auction for the .web generic top-level domain name registry (gTLD). This decision has been covered by others, including Kevin Murphy's DomainIncite, and has been the subject of unsurprisingly incongruous statements by both Verisign and Afilias, who are both contending for the .web concession privilege. more

Assessing Current Generic New gTLDs

If we are already familiar with new generic Top-Level Domains from the ICANN new gTLD program, also called "new gTLDs", are we just as familiar with these new domain name extensions, which are called "generic" and which could be an alternative to the existing ".com" domain name extension? Not so many... As the list of new gTLDs is very long, we can easily say that there is a Top-Level Domain for any kind of business: a ".club" for Clubs, a ".news" for News, a ".dentist" for Dentists, a ".actor" for Actors, etc... more

Spam Is Never Timely Nor Relevant

One of the ongoing recommendations to improve deliverability is to send email that is timely and relevant to the recipient. The idea being that if you send mail a recipient wants, they're more likely to interact with it in a way that signals to the mailbox provider that the message is wanted. The baseline for that, at least whenever I've talked about timely and relevant, is that the recipient asked for mail from you in the first place. more

Smart Phishing for Smartphones

A common security prediction for 2010 is the continued rise of malware and phishing attacks on mobile phones. The MarkMonitor Security Operations Center recently detected an interesting twist on this theme involving a popular smartphone and the latest smart technologies used by cybercriminals. In this case, instead of compromising a smartphone to steal its information, cybercriminals used phishing techniques to clone smartphones. more

Dot Brands Should Not Rush to Market, but Build Effective Strategies First

Brands applied for their new gTLDs to protect their brand and ensure they didn't miss an important new opportunity, but few had a clear business case for how they would use the gTLD platform when they applied. As brands approach the July 29th contracting deadline, the inevitable question is arising: "What do we do with this?" more

Graph Shows Decline of IPv4 Has Been Mostly Linear

As the free pool of IPv4 addresses reaches its end, we looked at the evolution of the amount of unassigned IPv4 address space over time. By 'unassigned', we mean address space not yet allocated to a Local Internet Registry (LIR) or assigned to an end user. LIRs are typically Internet Service Providers or enterprises operating an IP network. See our findings in the graph below... more

Apple Requires All iOS Apps to Work on IPv6-Only Networks as of June 1

Yesterday Apple declared that as of June 1 all iOS apps submitted to the AppStore MUST support IPv6-only networking. Back at their June 2015 WWDC event, Apple announced that all iOS 9 applications must support IPv6 - the news this week is reinforcing that requirement... As Apple continues to point out, the vast majority of application developers will not need to do anything to support IPv6. more

Aging the Internet Prematurely, One PDP at a Time

After blogging about ICANN's new gTLD policy or lack thereof [also featured on CircleID], I've had several people ask me why I care so much about ICANN and new top-level domains. Domain names barely matter in a world of search and hyperlinks, I'm told, and new domains would amount to little more than a cash transfer to new registries from those trying to protect their names and brands. While I agree that type-in site-location is less and less relevant, and we haven't yet seen much end-user focused innovation in the use of domain names, I'm not ready to throw in the towel. I think ICANN is still in a position to do affirmative harm to Internet innovation. more

ARIN Takes Steps Toward Greater Diversity

For some time, the board of the American Registry for Internet Numbers (ARIN) has expressed a desire to have greater diversity across its leadership structures. Finally, steps are being taken to have representation that better reflects the diversity of the ARIN community... since ARIN was founded on April 18, 1997, two of its main oversight structures -- the Board of Trustees and Advisory Council -- have only been populated with persons from North America. At last, that changes. more

Network Neutrality in the Wireless Space

There's been a tremendous amount written about the Google-Verizon joint proposal for network neutrality regulation. Our commentary at the EFF offers some legal analysis of the good and bad in this proposal. A lot of commentary has put a big focus on the exemption for wireless networks, since many feel wireless is the real "where it's gonna be," if not the "where it's at" for the internet. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days