Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Cost-Effectiveness: The Prerequisite for Cybersecurity Regulation

Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more

Government and Botnets

The US government is looking at telling ISPs how to deal with compromised customers and botnets. They're a bit late to the party, though. Most of the major commercial ISPs have been implementing significant botnet controls for many years now. more

Big Cable Co’s Touting 10G – Really?

Earlier this year, at the CES show in January, the big cable companies discussed their vision for the future. They introduced the concept that cable networks would be able to deliver 10-gigabit broadband in the future. They labeled the promotion at the show as 10G. I didn't write about it at the time because I assumed this was a gimmick to give some buzz to this show in the middle of the pandemic. But lately, I've seen that they are still talking about the 10G initiative. more

Starlink Will Be Priced to Be Affordable

SpaceX is now serving customers (aka beta testers) in the northern United States. They will soon be doing so in Southern Canada and recently announced that Germany, where they have applied for permission and have begun construction on two ground stations, will probably be next. Early customers in the US are paying $499 for their user terminals and $99 per month for Internet service. more

The Mobile Internet

It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there. more

Trump’s Outrageous ITU Elections Gambit

Every four years, the 168-year-old, Geneva-based treaty organization that provides the legal basis for worldwide network communications, radio spectrum management, and satellite placements holds a "plenipotentiary" conference among its 193 sovereign nation members. The next plenipotentiary begins on 29 October for three weeks. In addition to potentially altering treaty provisions and resolutions, and constituting its Council as an interim governing body, it elects 17 individuals to its five permanent bodies... more

Why Has ICANN Cut Subsequent TLD Round Preparations From Its Budget?

As we approach another ICANN meeting and another opportunity for our community to come together to discuss, collaborate and work, there is naturally a flurry of activity as stakeholders push for a spot on the agenda for their key areas of interest. And in the midst of current discussions, particularly around important topics like GDPR, it's easy for other vital conversations to be missed. more

SPIT is in Everyone’s Mouth, Though Not Yet in Everyone’s Ears

Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. more

UDRP and Article 92(b) of EUROPEAN COUNCIL REGULATION (EC) No 40/94

It has been over a year since I posted "The Non-Parity of the UDRP", how little did I know then compared to now! Since that posting, the corporations and their lawyers have given me a crash course in the law and I have learned much. There are many tricks that corporations will play on a domain name registrant in order to silence criticism of the corporation and to violate the registrants right of freedom of expression without frontiers. The UDRP Administrative Proceedings is one such trick... more

Dot-Com is Still King - of Domain Name Disputes

Despite the launch of more than 1,200 new gTLDs, .com remains far and away the most popular top-level domain involved in domain name disputes. In 2016, .com domain names represented 66.82 percent of all gTLD disputes at the World Intellectual Property Organization (WIPO), the only domain name dispute provider that publishes real-time statistics. And, as of this writing, the rate is even higher so far in 2017, with .com domain names accounting for 69.78 percent of all disputes. more

How Spam Has Damaged Mail Forwarding - And Ways to Get Around It

Courtesy forwards have been a standard feature of e-mail systems about as long as there have been e-mail systems. A user moves or changes jobs or something, and rather than just closing the account, the mail system forwards all the mail to the user's new address. Or a user with multiple addresses forwards them all to one place to be able to read all the mail together. Since forwarding is very cheap, it's quite common for forwards to persist for many years. Unfortunately, forwarding is yet another thing that spam has screwed up. more

Wrong on the “Exaflood,” Wrong on Network Neutrality

In 2007, Johna Till Johnson, president of Nemertes Research, published a paper that hyped a so-called "Exaflood" - a kooky Discovery Institute idea about how the Internet would drown in its own data. The Nemertes press release on the paper was widely reported in newspapers. It described itself as a "... landmark study ... groundbreaking analysis ... evidence the exaflood is coming... It said: "The findings indicate that by 2010 ... users could increasingly encounter Internet "brownouts" or interruptions to the applications they've become accustomed to using on the internet." more

Thank Heavens for Class Action Lawyers

If you had an e-mail address any time in the past six years, you've probably gotten spam for something called VigRX for Men, with fairly specific promises that it will make you, ah, manlier. I always wondered how many nitwits could fall for this kind of nonsense. Thanks to a recent class action settlement, we now know that there have been quite a lot of them. A class action suit filed in 2001 in Colorado settled recently, with some quite amazing info in the documents available at http://lemsettlement.com. LEM stands for Leading Edge Marketing, the name used by the defendants for several companies in the US, Canada, and the Bahamas. more

CAN-SPAM Plaintiff Slammed With $800K Attorney Fee Award - Asis Internet v. Optin Global

A federal court granted a request for attorney's fees (in the amount of $806,978.84) against prolific CAN-SPAM plaintiff Asis Internet. I thought things were looking good for Asis - whose lawsuits have generated substantial blog fodder - when it recently obtained a 2.5 million dollar default judgment in a spam case. more

Truth in Web Digital Identity?

Most of us, when we go to a website and see the little lock at the top of the browser, don't think twice and trust that we are communicating with the right company or organization. However, this is no longer the case because of a rather radical development that has largely occurred without notice or intervention by almost everyone. The web now has its own rapidly spreading version of CallerID spoofing that is about to get worse. more

Topics

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days