Several years ago, vulnerability disclosure programs, also called "bug bounty" programs, were novel and eyed with suspicion. Given sensitivities and potential liabilities, companies are wary of public disclosure and hackers seeking to exploit research. When a hacker presented a flaw to a company, the company was more likely to be concerned about taking legal action than making a public announcement or offering a reward. That is changing. more
I think it's fair to say that quite a few people -- both within the domain name industry and beyond -- have an opinion on whether the new TLD program is succeeding or struggling. But are things really all that bad? Are we forecasting doom before it has really had a chance to run? Crunching the numbers... Let's consider the (relatively short) history to this point and take a look at some statistics. more
The new domains are coming! ?Dot-biz is going to be the next coming of dot-com?, I recently read in an article in the Denver Post. The buzz has begun. Seven new top-level domains have been approved by ICANN, the organization that governs domains, and could be available as early as spring of this year. The new domains approved are .biz, .info, .aero, .coop, .musuem, .pro, and .name. more
The more I read, the more I see conflicting views on the state of the criminal cybercrime world. On the one hand, the Russian criminal cybercrime underworld is a scary, organized place... On the other hand, there is the position that that position is an exaggeration of what it is actually like and that it's a bunch of ragtag folks who have some advanced computer skills but they are not formally organized. ... I see this very similarly to how I see cyber warfare... more
Because DNS is such an omnipresent part of modern networking, it's easy to assume that functional DNS infrastructure can be left running with minimal adjustments and only needs to be investigated in the event of a malfunction. Yet there are small telltale signs that precede DNS issues -- and knowing what they are can help to prevent disruption before it happens. more
We are getting closer to using alternative broadband solutions offered by international companies. Local telecommunication entities will, in this respect, be relegated to resellers. The reality of accessing low Earth-orbiting satellite (LEO) services is now clearly on the horizon. Most of the telcos and governments are not prepared for the potential shock this might cause to the structure of local telecommunications markets. more
The bring-your-own-device (BYOD) trend continues to make corporate inroads. According to Security Intelligence, more than 60 percent of enterprises now allow or "tolerate" employee mobile device use in the workplace. But companies still have significant security concerns, especially when it comes to the specter of lost data. Here are seven tips to boost BYOD security in 2015. more
President Sarkozy of France recently managed to get his 'Création et Internet' law passed by the National Assembly, and if all goes well in the Senate then French internet users will soon find their activities being supervised by HADOPI, the grandly named 'Haute Autorité pour la Diffusion des Œuvres et la Protection des Droits sur Internet.' The rights it is concerned with are not those of ordinary net users but of copyright owners, and especially the large entertainment companies that have lobbied so hard and so successfully for the power to force internet service providers to terminate the accounts of those accused of downloading unlicensed copies of music, films and software... more
Verisign posted preliminary public comments on the "Mitigating the Risk of DNS Namespace Collisions" Phase One Report released by ICANN earlier this month. JAS Global Advisors, authors of the report contracted by ICANN, have done solid work putting together a set of recommendations to address the name collisions problem, which is not an easy one, given the uncertainty for how installed systems actually interact with the global DNS. However, there is still much work to be done. I have outlined the four main observations... more
ICANN has opened the Generic Names Supporting Organization (GNSO) Whois study on privacy/proxy abuse for public comment. Performed by the National Physical Laboratory (NPL), this study is one of many commissioned by the GNSO to examine the current, disparate, and often maligned registration directory service, and aims to measure the hypothesis that "a significant percentage of the domain names used to conduct illegal or harmful Internet activities are registered via privacy and proxy services to obscure the perpetrator's identity." more
The Internet Service Provider (ISP) community is carefully watching the impending depletion of the unassigned IPv4 address pool. Most estimates place the depletion of the central pool of unassigned IPv4 addresses by mid-2011. After that, each Regional Internet Registry (RIR) will continue to satisfy requests for additional IPv4 space for a limited time (depending on the rate of incoming requests and the amount of address space on hand in the RIR at the time of central pool depletion). more
A couple of weeks ago, NetworkWorld published an article indicating that the .com TLD was the riskiest TLD in terms of containing code that can steal passwords or take advantage of browser vulnerabilities to distribute malware... It is unclear to me what they mean by TLD's being risky. The number of domains, 31.3% of .com's being considered risky, what does this actually mean? Is it that 31% of .com's are actually serving up malware or something similar? If so, that seems like a lot because for many of us, nearly 1 in every 3 pages that most people visit would be insecure... more
More than six hundred brands have applied for their own dotBrand (a new top level domain associated with a trademarked brand). These represent every segment of our economy: banks, tech companies, media, food, luxury goods, etc. Quite a few dotbrands have already gone live. The current application period is closed, but the next round will likely begin in 24 months or so. more
Today we have sent following to the Minister of Industry Canada, James Moore, as well as the Canadian Internet Registration Authority (CIRA) Board of Directors. This is in response to the revelation that CIRA is positioning to enter the managed DNS space. As we outline in the letter, we are fine with more competition (in fact Google just entered the domain and DNS space too... No, competition is a fact of life, what we want is more of it, not less. Here's what we wrote to The Honourable James Moore. more
As governments ask themselves whether they should not be the only ones in charge, and everyone else is more determined than ever to stay involved, Internet governance is now a front-page topic. But away from the theoretical debates about which model is best, one real-life situation may end up looking strangely like a vindication of the multi-stakeholder model by governmental organisations. The situation in question is that of Islam and Halal. Two applications that look like they are caught in a kind of new gTLD program groundhog day. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byRadix