Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

To Tax or Not to Tax

Well it is not new that the US has always maintained that the Internet should be a tax free zone as per the US Congress's Tax Freedom Act 1998 which following expiry continued to be reauthorized and its most recent re-authorization (legal speak for extension) was in October 2007 where this has been extended till 2014. It is unclear whether there will be another extension post 2014. There is a moratorium on new taxes on e-commerce, and the taxing of internet access via the Tax Freedom Act. more

Consensus Polling: ALAC Shows the Way

ICANN is about to make the jump from "merely excavating" to efficiently mining top-quality jewels. I say this because ICANN's At-Large Advisory Committee (ALAC) has reached unanimous consensus on their internal Self Review. As the New Zealand meeting drew to a close, a weary ALAC was ready to give up on creating a consensus Self Review. The familiar ICANN collaborative process of emailing Word attachments had "excavated" ALAC into the also familiar ICANN mire of "deeply divided over competing versions." more

Four New Generic Top Level Domains

At its meeting in Durban, ICANN signed contracts with the applicants for four new top level domains. The new domains are ????, which means "web" in Arabic, ?????? and ????, which mean "online" and "site" in Russian, and ??, which means "game" in Chinese. They should give us an interesting hint about the future of the new TLDs, because all four are utterly, totally, generic. more

.nxt Conference Inspires and Informs New gTLD Debate

The first-ever .nxt conference recently concluded in San Francisco. The conference featured two days of productive, educational, and passionate discussion about the business of new generic top-level domains (gTLDs). While ICANN's public meetings have recently focused on debating the policies that will go into its gTLD Applicant Guidebook, the .nxt meeting moved the discussion into the future to tackle the issue of what to do when the program has actually launched... more

Name Collisions, Why Every Enterprise Should Care (Part 3 of 5)

Do you recall when you were a kid and you experienced for the first time an unnatural event where some other kid "stole" your name and their parents were now calling their child by your name, causing much confusion for all on the playground? And how this all made things even more complicated - or at least unnecessarily complex when you and that kid shared a classroom and teacher, or street, or coach and team, and just perhaps that kid even had the same surname as you, amplifying the issue! What you were experiencing was a naming collision (in meatspace). more

Three Things Registrars Must Do to Enhance Security

If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals. more

Beyond WHOIS: CircleID and Edgemoor Research Institute Inaugural Event on Balancing Privacy and Legitimate Data Needs

The global debate over Internet privacy and security took center stage in a webinar hosted by CircleID in partnership with the Edgemoor Research Institute. The event marked the first in a series exploring the delicate balance between safeguarding personal data and ensuring legitimate access to domain name registration details. As governments, cybersecurity experts, law enforcement, and intellectual property holders grapple with the evolving regulatory landscape, Project Jake seeks to establish a framework that prioritizes policy clarity, efficiency, and adaptability. more

Fine Grained Mail Filtering With IPv6

One of the hottest topics in the email biz these days (insofar as any topic is hot) is how we will deal with mail on IPv6 networks. On existing IPv4 networks, one of the most effective anti-spam techniques is DNSBLs, blackists (or blocklists) that list IP addresses that send only or mostly spam, or whose owners have stated that they shouldn't be sending mail at all. DNSBLs are among the cheapest of anti-spam techniques since they can be applied to incoming mail connections without having to receive or filter spam. more

Cyber Terrorism Is a Real Threat, and for the First Time Both Russia and the US Acknowledge It

Eugene Kaspersky, CEO and co-founder of Internet security giant Kaspersky Lab said last week that "terrorists could build a botnet that could bring down the entire Internet structure". Mr. Kaspersky ended his speech with the statement that "a global cyber police force, and global cooperation between law enforcement agencies and governments is needed". This goes very much in accordance with some of the conclusions in the Cyberspace Policy Review more

Web Server Botnets and Server Farms as Attack Platforms

Are file inclusion vulnerabilitiess equivalent to remote code execution? Are servers (both Linux and Windows) now the lower hanging fruit rather than desktop systems? In the February edition of the Virus Bulletin magazine, we (Kfir Damari, Noam Rathaus and Gadi Evron (me) of Beyond Security) wrote an article on cross platform web server malware and their massive use as botnets, spam bots and generally as attack platforms. Web security papers deal mostly with secure coding and application security. In this paper we describe how these are taken to the next level with live attacks and operational problems service providers deal with daily. more

Guadeloupe Moves to Set Up Internet Exchange Point

Developments in the Caribbean digital space are fuelling initiatives to strengthen the Internet infrastructure in the region. In Guadeloupe, a recent agreement among three Internet service providers has cleared the way for the island to establish its first Internet exchange point. Commonly called an IX or an IXP, an Internet exchange point is a critical element of Internet infrastructure used to interconnect networks and deliver data traffic between them. more

The Internet as Weapon

One of the most striking and enduring dichotomies in the conceptualization of electronic communication networks is summed up in the phrase "the Internet as weapon." With each passing day, it seems that the strident divergence plays in the press -- the latest being Tim's lament about his "web" vision being somehow perverted. The irony is that the three challenges he identified would have been better met if he had instead pursued a career at the Little Theatre of Geneva and let SGML proceed to be implemented on OSI internets rather than refactoring it as HTML to run on DARPA internets. more

Metrics for New gTLDs Performance

The essay describes six groups of gTLD performance indicators: (1) the presence of a secondary market; (2) uses of second-level domain names; (3) the identity of the owners of parked and not-in-use domain names; (4) domain name renewals; (5) the market size of the supporting complementary assets; and (6) the character of the person in charge of a given registry. A time-trend of these indicators would convey any price inefficiencies and bubbles, and the health of the industry. more

Why Telcos Don’t Get Networks

I've posted to SSRN my paper on why most telecom companies, even though they operate networks, don't appreciate the fundamental business dynamics of network structures. This will be a chapter in a book Wharton is publishing on network-based strategies and competencies. In the paper, I describe two views on telecom and Internet infrastructure... more

The Hack Will Be a Costly Affair for Optus

More and more information is becoming available about the breach of Optus (Australia's second-largest telco). It looks like the hacker is more of an amateur than a professional criminal or a "state actor." This makes the hack even more worrisome. It looks as though Optus didn't have its security house in order. This makes the issue all the more painful for the company. It will dent its reputation, and customers could become somewhat wary about dealing with the company. more

Topics

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days