Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Maintaining Security and Stability in the Internet Ecosystem

DDoS attacks, phishing scams and malware. We battle these dark forces every day - and every day they get more sophisticated. But what worries me isn't just keeping up with them, it is keeping up with the sheer volume of devices and data that these forces can enlist in an attack. That's why we as an industry need to come together and share best practices - at the ICANN community, at the IETF and elsewhere - so collectively we are ready for the future. more

Running DNSBLs in an IPv6 World

DNS blacklists for IPv4 addresses are now nearly 15 years old, and DNSBL operators have gathered a great deal of expertise running them. Over the next decade or two mail will probably move to IPv6. How will running IPv6 DNSBLs differ from IPv4? There aren't any significant IPv6 DNSBLs yet since there isn't significant unwanted IPv6 mail traffic yet (or significant wanted traffic, for that matter), but we can make some extrapolations from the IPv4 experience. more

The Growing Threat of Cybersquatting in the Banking and Finance Sector

The apparent cyber heist of of $81 million from the Bangladesh central bank's U.S. account may cause some people to question the security of online banking. While the online theft prompted SWIFT - a cooperative owned by 3,000 financial institutions around the world -- to make sure banks are following recommended security practices, the incident also could have ramifications for banking customers worldwide. more

Wireless Broadband vs Fixed Broadband - The Story Continues

This never-ending story is used by opportunistic telcos and their lobbyists to confuse the issue in order to gain regulatory or political advantage. The debate is now raging again in the USA. In an attempt to talk down their monopolistic position in the market the three telcos - and this time in particular, Comcast - are claiming that real competition does in fact exist in the American broadband market, citing competition from the mobile 4G LTE services as an example. more

Why Are Internet Security Standards Badly Deployed and What to Do About It?

In 2019 under the aegis of the Internet Governance Forum, a pilot project was conducted into the causes of and solutions for the, in general, slow deployment of internet security standards. Standards that on mass deployment make the Internet and all its users safer, indiscriminately, immediately... Recently the report 'Setting the standard. For a more Secure and Trustworthy Internet. The Identification of Pressure Points in Society to Speed up Internet Standards Deployment', was published on the IGF website. more

Examples of Where ICANN Can Be More Accountable

During the "GNSO Discussion with the CEO" at the recent ICANN meeting in Durban, I stated that ICANN talks a lot about the importance of supporting the public interest, but in reality the organization's first priority is protecting itself and therefore it avoids accountability and works very hard at transferring risks to others. In response to my comments, ICANN CEO Fadi Chehadé asked me to provide him examples of where ICANN can be more accountable. Copied below is my response letter to Chehadé, which provides seven examples. more

Does China’s Digital Silk Road to Latin America and the Caribbean Run Through Cuba?

China's Belt and Road Initiative (BRI) is an ambitious, long-term, global investment and development program. It was launched in 2013 with a focus on infrastructure -- roads, railroads, pipelines, undersea cables and ports. Since then China has invested $80 billion and signed 173 BRI agreements with 125 countries and 29 international organizations. more

Uniform Rapid Suspension Not Appropriate for .com Domain Names

The Internet Commerce Association has been actively involved for the last four years on the ICANN Working Group reviewing the Uniform Rapid Suspension (URS) policy and the Uniform Domain Name Dispute Resolution Policy (UDRP). The Working Group is currently wrapping up its review of the URS. The UDRP will be reviewed in an upcoming second phase. more

Words and Descriptive Phrases as Trademarks Registered as Domain Names

In a trademark context, who owns or controls, or would prevent others, from using words and phrases commonly available to speakers in a language community, is in persistent tension. While common words alone or combined may become protected from infringing uses under trademark law, their protection is contingent on factors such as linguistic choices and strength or weakness of marks in the marketplace. more

Irish Government To Kill IE ccTLD?

While I was in LA last week John sent me details of the Communications Regulation (Amendment) Bill 2007. While there are some potentially positive aspects in the Bill some of the Bill's contents are, for lack of better word, simply crazy... more

University of California Identifies the Next Hard Target in a Never Ending War

This is, of course, about the recent NYT article that showcases the results of Prof Stefan Savage and his colleagues from UCSD/Berkeley. As my good friend and longtime volunteer at CAUCE, Ed Falk, points out, this is a great find, but hardly a FUSSP. The nice thing about the fight against bots and spammers is these little victories people on "our" side keep having in an endless series of skirmishes and battles... more

Blocking a DDoS Upstream

In the first post on DDoS, I considered some mechanisms to disperse an attack across multiple edges (I actually plan to return to this topic with further thoughts in a future post). The second post considered some of the ways you can scrub DDoS traffic. This post is going to complete the basic lineup of reacting to DDoS attacks by considering how to block an attack before it hits your network -- upstream. more

Macabre Result Avoided in Mortician Domain Name Case

If a court won't let you use your own name, you might feel like you're a mere ghost of your former self. That happened to Ed Kalis of Broward County, Florida. In a recent case, Florida's court of appeal considered whether a trial court's order against Kalis, enjoining him from using his own last name in various means of advertising and in the URL for his company's website, was proper. The appellate court held that the injunction was overkill. more

Introduction Of A New Domain: The Sweden Way

Network Information Centre Sweden AB (NIC-SE), which is the organization that administers .se domain names, will be introducing a new regime for registration of .se domain names.

Under the new regime, applicants from all over the world will be able to apply for registration of a .se domain name without needing to prove that the desired domain name reflects a company or organization name. There will no longer be preliminary examination of applications for registration of .se domain names nor any restriction on the number of .se domain names per applicant. It will also be possible to register geographical names as .se domain names. However, non-Swedish applicants (those without a permanent business place or address in Sweden) must provide a local contact (i.e. person or entity who is permanently resident in Sweden). more

The Third Stage of the VoIP Rocket Never Fired

Ten years ago was the dawn of Voice over IP (VoIP). The pioneering Israeli company VocalTec had just released its VoIP software for PCs (it was named iPhone, BTW). Industry guru Jeff Pulver (whom I now partner with in FWD) had begun to hold his Voice on the Net (VON) shows. As the founder of VoIP startup ITXC, I was invited to give a keynote at VON in Boston. The evolution of VoIP, I opined with the requisite PowerPoint slides, will be like a three stage rocket. I was right about the first two stages and dead wrong about the third... more

Topics

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days