Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Takeaways from the DNS-OARC’s 28th Workshop

March has seen the first of the DNS Operations, Analysis, and Research Center (OARC) workshops for the year, where two days of too much DNS is just not enough! These workshops are concentrated within two days of presentations and discussions that focus exclusively on the current state of the DNS. Here are my impressions of the meeting. more

Multistakerholderism and Its Discontents: A Reply

Twenty years after multistakeholderism helped save the Free Internet and present-day Internet governance from a potentially existential crises, the term is again triggering some strong emotions. There are very real questions around definitions, accountability, participation, and even legitimacy in all multistakeholder models. Within Internet governance, there are declared enemies of the multistakeholder approach... more

Partnerships Can Enhance Security in Connected Health and Beyond

Like the poetic prose of Bob Dylan, the reality of modern technology cannot be ignored: "the times they are a-changin'." Transitioning from the novelty of the Internet, society is embracing connected technology as the new digital frontier. Dominated by the Internet of Things ("IoT"), the future will be one of increased interconnection of wireless and computing devices in everyday objects, allowing these devices to send and receive personal data. IoT's limits appear boundless, extending from physical devices and home appliances to vehicles and medical implants. more

Good News from Three Spam Cases in the U.S.

They say (whoever "they" are) that good things come in threes, and that certainly seems true for law enforcement against spammers this week. In New York, Adam Vitale was sentenced to 30 months in prison and ordered to pay $183,000 in restitution for a week of spamming AOL back in 2005... In Illinois, an FTC settlement requires Spear Systems and company executives Bruce Parker and Lisa Kimsey to give up $29,000, stop making "false or unsubstantiated claims about health benefits" of their products, and bars them from violating CAN-SPAM ever again... And finally, in Seattle, the Robert Soloway case continues... more

A Review of Broadband Over Power Lines (BPL) or Power Line Telecommunication (PLT)

The OECD has published a detailed report, Broadband over Powerlines: Developments and Policy Issues, on what was once considered a potentially interesting and disruptive technology that might have rivaled DSL. It notes that having largely failed in that, it is instead being applied to "smart grid" applications. more

Another Day, Another Set of Hacking Attacks. News At 11.

While reading Reuters I came across a news article indicating that a number of high profile agencies - from the United Nations to the Canadian Government to government of Taiwan - were broken into over a period of the past five years. ... I'll say it right now, even though I haven't been briefed on it. It was China. more

Illusory Correlation and Security

Fear sells. Fear of missing out, fear of being an imposter, fear of crime, fear of injury, fear of sickness ... we can all think of times when people we know (or worse, people in the throes of madness of crowds) have made really bad decisions because they were afraid of something. Bruce Schneier has documented this a number of times. For instance: "it's smart politics to exaggerate terrorist threats" and ... more

ICANN vs Epag/Tucows: German Court Rules Against ICANN

German courts seem to be pretty fast, so instead of having to wait weeks or months to see how they'd rule, we've already got the answer. The German court in Bonn has ruled that EPAG (Tucows) is not obliged to collect extra contacts beyond the domain name registrant. The decision, naturally, is in German, but there is a translation into English that we can use to understand how the court arrived at this decision. more

Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation

Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more

Opposition Mounts in Europe to Three-Strikes Proposals

Multiple reports today indicate that opposition is growing in Europe to plans for three-strikes policies that could lead to the termination of Internet access for some subscribers. In the U.K., protests are mounting over those plans in the recently introduced Digital Economy Bill. The BBC reports that thousands of people have signed a petition urging the government to reconsider its approach, while the Open Rights Group says it has seen a big spike in membership. more

Spam Volumes In 2010

I started hearing various people comment about lower spam volumes sometime in mid December. This isn't that unusual, spam volumes are highly variable and someone is always noticing that their spam load is going up or going down. The problem is extrapolating larger trends from a small selection of email addresses. more

IPv4: Business As Usual

This year, we expect that the RIPE NCC's pool of unallocated IPv4 addresses will reach the "last /8", meaning that we have 16,777,216 IPv4 addresses left in the available pool. At that point it will no longer be possible for RIPE NCC members to obtain the amount of IPv4 addresses they will require to expand their current and future networks. When we hit the last /8, the RIPE NCC will only be able to distribute IPv6 addresses and a one-off allocation of IPv4 address space... Has this caused a last minute rush? more

Join InterCommunity 2015 on July 7/8 to Talk Future of Internet Governance, Security, Access

What are the most pressing Internet governance issues in the next 2-5 years? What are the biggest priorities in terms of making the Internet more secure and trusted? What are the best ways to bring the next 3 billion people online? Those will all be topics of discussion at the "InterCommunity 2015" meeting taking place this week on July 7 and 8. The meeting will not take place at any one physical location... more

EU CRA: Regulatory Extremism and Exceptionalism

European Union (EU) legislators, like most of the world, are troubled about the increasing number and severity of cybersecurity incidents. However, unlike most of the world, which is taking a flexible, adaptive Zero Trust Model approach of continuous controls for cyberdefense, the EU government is pursuing a vastly expanded version of the failed Common Criteria certification model coupled with regulatory extremism and exceptionalism strategies. more

ICANN SSAD Proposal Poised to Succeed?

The GNSO Council and the ICANN Board both seem poised to grant sufficient runway to the community to refine an idea for a simple ticketing system designed to centralize requests for registrant information disclosures and provide meaningful data that is likely to help ICANN staff enhance its assessment of the SSAD proposal. This is very good news for those who advocate for consumer safety and trust on the Internet, and it is very good news for the ICANN multistakeholder model. more

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days