Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Cool Simulation of SpaceX’s Revised Satellite Broadband Plan

On November 15, the FCC approved a revision to the plan for Starlink, SpaceX's forthcoming broadband satellite service. The new plan reduces the number of satellites from 4,525 to 4,409 and lowers the altitude of the phase-1 satellites from 1,100 to 550 km. Mark Handley, a professor at University College London, has created videos based on simulations he ran of both the original and revised phase 1 plans. more

KnujOn Releases New Security, Abuse and Compliance Report

We have just issued a new report detailing abuse of the Domain Name System and Registrar contract compliance issues. The report specifically discusses several items including: Registrars with current legal issues; Illicit Use of Privacy-Proxy WHOIS Registration; A study on the contracted obligation for Bulk WHOIS Access; and more. more

.COM - The Riskiest Top-Level Domain?

A couple of weeks ago, NetworkWorld published an article indicating that the .com TLD was the riskiest TLD in terms of containing code that can steal passwords or take advantage of browser vulnerabilities to distribute malware... It is unclear to me what they mean by TLD's being risky. The number of domains, 31.3% of .com's being considered risky, what does this actually mean? Is it that 31% of .com's are actually serving up malware or something similar? If so, that seems like a lot because for many of us, nearly 1 in every 3 pages that most people visit would be insecure... more

Illusory Correlation and Security

Fear sells. Fear of missing out, fear of being an imposter, fear of crime, fear of injury, fear of sickness ... we can all think of times when people we know (or worse, people in the throes of madness of crowds) have made really bad decisions because they were afraid of something. Bruce Schneier has documented this a number of times. For instance: "it's smart politics to exaggerate terrorist threats" and ... more

Three Reasons Why CISOs Need to Understand Domain Security

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. An attack on a web domain can lead to the redirection of a company's website, domain spoofing, phishing attacks, network breaches, and business email compromise (BEC). Domains used as a company's online world are part of an organization's external attack surface and need to be continuously monitored for cybercrime attacks and fraud. more

Top Cloud Management Trends: Adopt or Incur the Risk

Your company can't ignore cloud computing: Some kind of distributed-access model is now necessary to tap global markets, manage big data and get access to best-in-class software. But with increased cloud adoption comes the issue of management, since it's no longer enough to simply spin up a cloud and hope for the best. Here are five of the top cloud management trends to watch this year -- and the risks of opting out. more

Another Thanksgiving and Another 131 Domain Names Seized by Homeland Security

Last year I wrote a post right after Thanksgiving entitled: "While You Were Eating You're Turkey Homeland Security Was Seizing 9 Domains". Well I could have repeated the headline today except the number would be 131 domains rather than just 9. Looks like Homeland Security is going to make domain seizures on Thanksgiving as common in the US as Turkey and Stuffing. more

What If New gTLD Applicants Held Private Auctions Where Losing Applicants, Not ICANN Gets The Money

Over the last week at ICANN the arguably best idea coming out of the ICANN meeting is the concept that applicants for new gTLD strings with more than one application, hold a private auction amongst themselves with the winning amount going to the other losing applicants instead of to ICANN. As a backdrop, under the Guidebook multiple applicants for a new gTLD extension are encouraged to work together and come to an agreement to resolve the conflict. more

9 Thoughts on Stepping Up Spam and Malware Enforcement

In a tweet, EU commissioner for the Information Society Neelie Kroes congratulates OPTA on the spam fine for the golf ball printing company Backsound. Since 2004 the Dutch OPTA is the number one spam and malware fighter of the EU with a total of €1.9 million in fines. It made me ask two question to myself: How come that we seldom hear of other spam fines in the EU? And can the EU change this in any way? more

Towards More Efficient Registry-Registrar Relations

On the morning of Wednesday 15th October, the The Domain Name Association (the DNA) held an important working group meeting during ICANN 51 Los Angeles. The topic was to discuss several operational issues between registries and registrars. The meeting's unofficial ongoing name is the Registry-Registrar Operations Working Group. The meeting was a continuation of an inaugural meeting that was held back in June of this year, and covered in a Industry Association: An Implementation Model circulated by the DNA from September 17, by Executive Director Kurt Pritz. more

A Review of Broadband Over Power Lines (BPL) or Power Line Telecommunication (PLT)

The OECD has published a detailed report, Broadband over Powerlines: Developments and Policy Issues, on what was once considered a potentially interesting and disruptive technology that might have rivaled DSL. It notes that having largely failed in that, it is instead being applied to "smart grid" applications. more

Mobile Users Now and in the Future: A Snapshot

Like many of us in the technology industry, I am captivated by the growing adoption of mobile. It's changing multiple industries at a pace that would have seemed impossible just a few years ago. And my own interest accelerated when Afilias acquired another Irish company named dotMobi. ...since a mobile domain is not useful without mobile sites, dotMobi developed a site-building tool called goMobi that is used globally by hundreds of thousands of site owners. Because of that, we have unique information about who is using the mobile Web, and how they're using it. more

Opposition Mounts in Europe to Three-Strikes Proposals

Multiple reports today indicate that opposition is growing in Europe to plans for three-strikes policies that could lead to the termination of Internet access for some subscribers. In the U.K., protests are mounting over those plans in the recently introduced Digital Economy Bill. The BBC reports that thousands of people have signed a petition urging the government to reconsider its approach, while the Open Rights Group says it has seen a big spike in membership. more

What Digital Divide on IP Addresses?

I took an instant dislike to The Digital Divide on IP Addresses post for some reason, well for many reasons actually. First and foremost is that the implication that the "digital divide" is somehow caused by IP address allocation policies. While it is certainly true that there are "digital divides" between developed and developing parts of the world, the historical imbalance in IP addressing is not one of them. The fact is that while we will "run out" of IPv4 addresses at some point in the not too distant future, there are an unimaginably large number of IPv6 addresses available. more

Fight Phishing With Branding

Phishing, stealing personal information by impersonating a trusted organization, is a big problem that's not going away. Most antiphishing techniques to date have attempted to recognize fake e-mail and fake web sites, but this hasn't been particularly effective. A more promising approach is to brand the real mail and real web sites. more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days