Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

New TLDs: Time For a Do-Over on Plural Similarity

Mandarin is a tricky language, but ICANN may want to learn the expression chóngfù before leaving the Beijing meeting. Chóngfù means "do-over" and that's what ICANN needs to forestall an entirely preventable disaster in the delegation of new top-level domains (TLDs). The issue of "string similarity" seems straightforward. Nobody inside ICANN or out there in the real world wants Internet users to be confused by new TLDs that are confusingly similar. Imagine hearing an ad offering low rates at car.loans but you encounter something completely different at car.loan instead? more

9 Thoughts on Stepping Up Spam and Malware Enforcement

In a tweet, EU commissioner for the Information Society Neelie Kroes congratulates OPTA on the spam fine for the golf ball printing company Backsound. Since 2004 the Dutch OPTA is the number one spam and malware fighter of the EU with a total of €1.9 million in fines. It made me ask two question to myself: How come that we seldom hear of other spam fines in the EU? And can the EU change this in any way? more

Here’s How We Can Truly #SaveDotOrg

Many of my friends in the civil-liberties and Internet-law communities have been criticizing the Internet Society's agreement to sell the Public Interest Registry, which administers the .ORG top-level domain. I'm a free-speech guy, so I support their right to raise all these criticisms. But they often ask me directly – knowing that my track record as an Internet civil-libertarian is longer than most – why as a member of the Internet Society (a.k.a. ISOC) board I decided to join the board's unanimous approval of the deal. more

Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation

Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more

What Could the RIAA’s Switch in Strategy Mean?

The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more

UDRPs Filed - Brand Owners Take Note

After being in the domain industry for over 15 years, there aren't too many things that catch me by surprise, but recently a few UDRP filings have me scratching my head. Both ivi.com and ktg.com have had UDRPs filed against them, and I have to say for anyone holding a valuable domain name, it's a cautionary tale and one that should have folks paying attention to the outcome of each. more

Cisco’s Kevin Shatzkamer Discusses the Future of Mobile Video

Kevin Shatzkamer, Chief Architect for Cisco Mobility, speaks to the mobile research Cisco has developed in helping Mobile Service Providers reach their ROI goals and objectives in projecting an increasingly demand driven market. ... There has been speculation for years that increased demand for mobile video would tax and possibly crash current networks and infrastructures of mobile operators. A predictor may be The World Cup games held in South Africa. more

Traceability

At a recent workshop on cybersecurity at Ditchley House sponsored by the Ditchley Foundation in the U.K., a primary topic of consideration was how to preserve the freedom and openness of the Internet while protecting against the harmful behaviors that have emerged in this global medium. That this is a significant challenge cannot be overstated... That these harmful behaviors can and do cross international boundaries only makes it more difficult to fashion effective responses. more

DNS Tunneling: Is It a Security Threat?

DNS tunneling -- the ability to encode the data of other programs or protocols in DNS queries and responses -- has been a concern since the late 1990s. If you don't follow DNS closely, however, DNS tunneling likely isn't an issue you would be familiar with. Originally, DNS tunneling was designed simply to bypass the captive portals of Wi-Fi providers, but as with many things on the Web it can be used for nefarious purposes. For many organizations, tunneling isn't even a known suspect and therefore a significant security risk. more

America Will Not Win the Global Race to 5G

Several weeks ago, the White House published a document asserting that "America Will Win the Global Race to 5G." The White House should get over it. This is not about America winning any global race to 5G, but the world working together on fundamentally different, complex, new communication networks and services. There are four important points, however. more

Internet Governance Forum in Hyderabad, India

Tomorrow Internet Governance Forum (IGF) starts. The overall discussion topic this year is How to reach the next billion(s), and that builds on the fact that today we have around one billion Internet users. A number that will explode when all different kinds of devices, from cellphones, to TV sets to toasters will be Internet connected... Some workshops have been cancelled and panelists have been replaced as many people and organisations have made the decision to not go to India. more

Where to Search UDRP Decisions

Searching decisions under the Uniform Domain Name Dispute Resolution Policy (UDRP) is important - for evaluating the merits of a potential case and also, of course, for citing precedent when drafting documents (such as a complaint and a response) in an actual case. But, searching UDRP decisions is not always an easy task. It's important to know both where to search and how to search. Unfortunately, there is no longer an official, central repository of all UDRP decisions that is freely available online. more

Proving and Protecting Rights to Domain Names

At their best, UDRP panelists are educators. They inform us about the ways in which parties win or lose on their claims and defenses. What to do and not do. In addressing this issue, I'm referring to less than 10% of cybersquatting disputes. For 90% or more of filed complaints, respondents have no defensible answer and generally don't even bother to respond. But within the 10%, there are serious disputes of contested rights (contested even where respondent has defaulted). more

IPv6 for the Masses

As the first semester of 2010 comes to a close, the IPv4 address pool has dropped to 6%. Another year and we will probably celebrate (mourn?) the end of the IANA IPv4 pool. As Vint Cerf commented on the topic of depletion in an e-mail to Bob Hinden: 'Sic transit Gloria Mundi'. The view of an abyss or the fear of judgment day always focuses attention and as a result IPv6 adoption is finally picking up speed. The Google invitational IPv6 Conference in Mountain View clearly illustrated the point. more

Declaring IPv6 an Internet Standard

I've already shared my thoughts following a session of the IPv4 Sunset Working Group at IETF 95 that considered whether to declare IPv4 an "Historic" specification. Of course, as one would expect for a meeting of a Standards Development Organization (SDO), that wasn't the only standards process discussion through the week. Another session, this time in the IPv6 Maintenance Working Group, considered the related topic of whether to make the IPv6 specification a full Internet Standard. Let's look at that proposal. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days