If you haven't been reading the news of late, venerable anti-spam service Spamhaus has been the target of a sustained, record-setting Distributed Denial-of-Service (DDoS) attack over the past couple of weeks... Of course, bad guys are always mad at Spamhaus, and so they had a pretty robust set-up to begin with, but whoever was behind this attack was able to muster some huge resources, heretofore never seen in intensity, and it had some impact, on the Spamhaus website, and to a limited degree, on the behind-the-scenes services that Spamhaus uses to distribute their data to their customers. more
Interesting times in the carrier space, for sure. While most readers of this column are focused on the business market, it's hard to ignore what's occurring in the consumer space right now. Being based in Toronto, I happen to be struck by the similar trends shaping on both sides of the border. Over the past few days, we've seen earnings reports from major telcos and cablecos, and these businesses seem to be going in opposite directions. more
The much-anticipated New gTLD Draft Application Guidebook is out! ICANN has released Version 3. Lots of changes, some minor, some large. All worth reading if you're a potential applicant or just interested in the promise of new Top-Level Domains (TLDs). The public comment period clock started October 4, and runs until November 22 of this year. more
Spear phishing is the unholy love child of email spam and social engineering. It refers to when a message is specifically crafted, using either public or previously stolen information, to fool the recipient into believing that it's legitimate. This personalization is usually fairly general, like mentioning the recipient's employer (easily gleaned from their domain name.) Sometimes they address you by name. Much scarier is when they use more deeply personal information stolen from one of your contacts... more
Having a single price index for the domain name industry would be worse than useless. Such an index is presented in a recent study by Thies Lindenthal. The index is intended to be a benchmark for domain owners and investors. But it's out of line with other studies and the common sense of how a market operates. A much better barometer to follow is average prices for groups of domain names with similar characteristics. more
The theory put forward by the IETF was simple enough... while there were still enough IPv4 addresses, use transition technologies to migrate to dual stack and then wean IPv4 off over time. All nice and tidy. The way engineers, myself included, liked it. However those controlling the purse strings had a different idea. more
In my recent write-up I start by discussing some recent threats network operators should be aware of, such as recursive DNS attacks. Then, a bit on the state of the Internet, cooperation across different fields and how these latest threats with DDoS also relate to worms and bots, as well as spam, phishing and the immense ROI organized crime sees. I try and bring some suggestions on what can be done better, and where we as a community, as well as specifically where us, the "secret hand-shake clubs" of Internet security fail and succeed. Over-secrecy, lack of cooperation, lack of public information, and not being secret enough about what really matters. more
Starlink's global reach is distorting conventional IP geolocation, blurring national boundaries and skewing internet usage data. As satellites replace cables, measuring users' precise locations has become an increasingly uncertain and politically charged task. more
Today is the morning of the most revered Thursday in the ICANN meetings calendar -- The public forum. It is tradition personified. It is the day when the show and the showcasing really begin. It is the stage and the choreography of the open microphone that can help influence ICANN decisions one way or another and make the supposed bottom up model appear at its best. more
This article addresses the issues around the planned sale of the PIR .org registry by ISOC. It examines the history and issues plus looks at several possible paths forward, including PIR becoming a Benefit Corporation (B-Corp) and identifying possible alternative buyers who could retain PIR's non-profit status. Before Tim Bernier-Lee brought the HTML markup language to the Internet, starting in 1989, there were few registered domain names. Access for public registration started in 1986, and by December, there were about five dozen registered .com domain names. more
An unprecedented cyberattack on the Canadian government also targeted Defence Research and Development Canada, making it the third key department compromised by hackers, CBC News has learned. ... While there is no definitive proof, of course, that China was behind these attacks, there is a lot of circumstantial evidence that points in that direction. China (allegedly) has a long history of engaging in espionage activities in order to gain access to information. In the United States, this is sometimes referred to as cyber warfare, but I think that cyber espionage is a better choice of terms. more
The ICANN community has been especially concerned about the economic reports used by ICANN to justify its decisions as to whether, and how, to implement applications for new gTLDs. Among the greatest sources of concern has been the failure of ICANN staff to issue a complete public response to the ICANN Board's October 2006 demand that ICANN Staff commission economic studies about gTLDs... more
All the talk early this year seems to be about LTE deployment to alleviate chronic Apple and other smartphones induced indigestion on the AT&T and other major Mobile Networks swamped by data traffic. The telluric shift albeit the user will not care or should not notice is that when he or she will power on that smartphone or whatever the communicating Swiss Knife will be called, it will request an IP address to complete an IP based call. more
Over the last two years, we've all faced supply shortages on items we previously never thought could be in short supply. Most recently, the baby formula and semiconductor markets were hit. Before that, supply chain attacks on Colonial Pipeline and JBS Foods showed us that an attack on one company through a singular point of compromise has the potential to disrupt an entire network of connected companies, products, partners, vendors, and customers. more
Two weeks before depletion of the American Registry for Internet Numbers (ARIN) IPv4 free pool in September 2015, we published an article recommending that the ARIN community adopt transfer policies that encourage trading transparency and improve whois registry accuracy. By eliminating needs justification as a pre-condition to updating the registry, we argued that ARIN could eliminate existing policy-based barriers that have kept many otherwise lawful and legitimate commercial transactions in the shadows. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign