When a brand goes so far as to ask a domain name registrar for Whois (the registration contact details) of a potentially abusive domain name, there's likely a lot at stake. Most often, the request is prompted by consumer safety concerns, such as the risk to consumers posed by a malicious site. Other times, the demand has a simple goal: to have a dialog with the registrant about the use of trademarks or other intellectual property in order to avoid extreme action. more
As outlined in CSC's recent 2020 Domain Security Report: Forbes Global 2000 Companies, cybercriminals are disrupting organizations by attacking the protocol responsible for their online presence -- their domain name system (DNS). When a DNS is overwhelmed with traffic due to a distributed denial of service (DDoS) attack or configuration error, content and applications become inaccessible to users, affecting both revenue and reputation. more
Just when you thought the .xxx affair couldn't get any worse, it does. I'm beginning to think that ICANN's approach to TLD approval was cooked up by a demented sergeant from Abu Ghraib... Now, after the triple x people negotiated with ICANN's staff a contract that met all prior objections, and heads into what should be its final approval, word is that a few ICANN Board members are leaning in a negative direction. What is the reason? A group of pornographers has organized a campaign against .xxx, flooding ICANN's comment box with overwhelmingly negative remarks. more
I've often found truth in the famous George Santayana quote, "Those that cannot remember the past are doomed to repeat it." That's an apt warning for what is currently happening - again - with the hundreds of new generic Top Level Domains (gTLDs) that are launching ... and failing to work as expected on the Internet. First, a quick refresher: As most CircleID readers know, in the early 2000s, seven new gTLDs were launched: .AERO, .BIZ, .COOP, .INFO, .MUSEUM, .NAME and .PRO. Aside from Country Code TLDs (ccTLDs), these were the first top-level changes to the DNS since the early days of the Internet. more
Recently I was asked by a customer how they can easily set up rollback capabilities on the endpoints in their corporate network. They had seen the marketing hype by various security technology providers that their products included rollback capabilities they could utilize if/when one of their workstations or servers was infected by malware. Having gotten this question more than once, I thought it would be a good subject to share with a broader audience. more
Some individual appears to have hijacked more than a 1,000 home computers starting in late June or early July and has been installing a new Trojan Horse program on them. The Trojan allows this person to run a number of small websites on the hijacked home computers. These websites consists of only a few web pages and apparently produce income by directing sign-ups to for-pay porn websites through affiliate programs. Spam emails messages get visitors to come to the small websites.
To make it more difficult for these websites to be shut down, a single home computer is used for only 10 minutes to host a site. After 10 minutes, the IP address of the website is changed to a different home computer... more
As you read this, please keep in mind that I say it all with a track record nearly 14 years of being proactive and having a zero-tolerance policy toward criminal activity and network abuse on our system. We have great relationships with Law Enforcement Agencies both here in Canada and abroad. We are always helpful and (usually) happy to answer questions, and help LEA understand the complexities and nuances of the internet. We've had the good fortune to meet some really intelligent and clued in cybercrime units. We participate in numerous communities in combating net.abuse and cybercrime. more
With just over 2.4 million New gTLDs registered, abuse trends are beginning to emerge. Earlier this month we conducted a review of the top 100 most highly-trafficked Web property names across the top 5 most popular new gTLD registries. It is apparent that the abuse we had expected has occurred -- just not where we had anticipated. more
AI is bringing changes to the domain registration process by enhancing user experience, improving registrar operations, and empowering registries. In recent years, AI has entered the industry via the huge growth of new website builders. Today, new developments in the field offer an opportunity to align the interests of all stakeholders, from end user to registry. more
Some of the root server operators post public statistics for their domain name traffic at the top-level. For example, the graph (which can take a bit of time to generate, given ICANN's slow servers) for the L-root server's most popular Top-Level Domain (TLD) queries demonstrates, to no one's surprise, that .com is king. What's more interesting, though, especially given the new generic Top-Level Domain (gTLD) debate, is to look at the most popular invalid (non-existent) TLDs. more
When a sniper ends the life of soldier Paul Bäumer in Remarque's "All Quiet on the Western Front," a laconic situation report from the frontlines recounts an unusually quiet day. In the grand scheme of things, nothing worth reporting has happened. Reading David Kravets' recent article in Wired brought this upsetting ending to mind. U.S. authorities taking down individual domains based on copyright infringement charges is the online equivalent of Remarque's allied snipers: picking off the occasional domain - for better or worse - has little effect on the overall situation. more
As the steward of .ORG, Public Interest Registry is committed to serving as an "exemplary registry" for the DNS. As part of that mission, PIR published our Anti-Abuse Principles last year that serve as our north star to address questions of abuse. As PIR has stated on many occasions, generally speaking, the DNS is not the appropriate place to address questions of website content abuse because of the blunt tool we as a registry have and the collateral damage that can be caused by suspending a domain name for a piece of content. more
Three years ago, the first Internet-Draft on Registry Maintenance Notifications for the Extensible Provisioning Protocol (EPP) was published, which will become a Request for Comments (RFC). The IETF Registration Protocols Extensions (REGEXT) working group is the home of the coordination effort for standards track EPP extensions. They released eight RFCs over the last couple of years, and they are currently working on more than 15 Internet-Drafts. more
Remember the old email hoax about Hillary Clinton pushing for email taxation? When we first heard AOL's plans for Goodmail today, we thought maybe the hoax had re-surfaced and a few industry reporters got hooked by it. But alas, this tax plan seems to be true. AOL has long held the leading standard in email whitelisting. Every email sender who cares about delivery has tried to keep their email reputation high so that they could earn placement on AOL's coveted Enhanced Whitelist. Now, AOL may be saying that those standards don't matter as much as a postage stamp when it comes to email delivery. more
In an article by Sheldon Burshtein, published in the Journal of Intellectual Property Law & Practice, the author examines the view on whether domain names are properties. The following is the abstract of this article: "...Domain names have become increasingly valuable assets, in some respects more valuable than trade marks. A domain name may identify not only the source of the goods, services, business or information, but also the virtual location of the source, much as an address or telephone number does. However, there is still a significant unresolved issue as to whether a domain name is a form of intangible property or merely a contractual right." more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byDNIB.com