Technical development often comes in short, intense bursts, where a relatively stable technology becomes the subject of intense revision and evolution. The DNS is a classic example here. For many years this name resolution protocol just quietly toiled away. The protocol wasn't all that secure, and it wasn't totally reliable, but it worked well enough for the purposes we put it to. more
The U.S. Government has been operating so far in Fiscal Year 2016, which began on October 1st, with funding provided by two continuing Appropriations bills. The last one passed on December 11th and provides funding through midnight tonight, December 16th. Meanwhile, bipartisan Senate and House leadership, Appropriations Committee members, and Chairs of authorizing committees have been negotiating an omnibus Appropriations bill, along with a separate revenue package of tax provisions, behind closed doors. more
This month, ICANN is driving hard to get two of its horses to the finish line. The first is barely a year old - it's the first formal review of ICANN's accountability and transparency. The second horse is going on 4 years old: ICANN's plan to introduce hundreds of new top-level domains (TLDs) for the Internet. Just as these horses have entered the home stretch, one of the racecourse officials is vigorously waving the yellow caution flag. And ICANN would do well to pull back on the reins. more
Over at the site V3.co.uk, they have an article up today alleging that since the Rustock takedown two weeks ago, the bagle botnet has moved to take over as the botnet that is responsible for sending the most spam. They have not replaced Rustock's total spam volume, only that they are now the number one spam sending botnet. more
A secret weapon is falling into dangerous hands. Organized cybercriminals are building up portfolios of cybersquatting domain names. A smart operator with such a portfolio can go beyond simple stealing and competing full out for traffic and revenues. Rightful brand owners, feeling the squeeze, will find out too late that the bandits have the money to fight legal action. The time to act is now, before pieces of the playing field have been bought up by the enemy. more
I was pretty much suprised not to see any application for .SCOUT in round 1 of the ICANN new gTLD program. There were two applications for .GUIDE but a guide is a guide and a scout...is a scout. I remember going to meetings and introducing the potential of .SCOUT. Basically, what is say on my personal website: "I look forward to organize a team around one major Community project for round 2. more
Following up from my post yesterday, I thought I would take a look at how spammy each particular TLD is. At the moment, I only track 8 TLD's - .cn, .ru, .com, .net, .org, .info, .biz and .name. To check to see which one is the spammiest, I took all of our post-IP blocked mail and determined how many times those messages occurred in email, and how many times that email was marked as spam... more
If you are a new gTLD applicant, or if you follow ICANN, or if you just like being in a constant state of confusion, then the recent barrage of ICANN activity has probably been enough to make your head spin. Let's take a look at what we have hurtling towards us, like an out-of-control asteroid, in the next month. more
In the short ten years that they've been around, mobile apps have grown to become a staple of modern digital life. With more than five million apps currently available for download in the major app stores, and with over 2,000 new apps being uploaded every day, mobile apps are big business. Fifty-eight percent of shoppers consistently browse e-commerce apps and 49% of all website traffic now comes directly from mobile app users. All this browsing directly translates into spending. more
The movement for upping the minimum wage in the US is gathering momentum. Protests and placard waving are on the increase, and the quest for $15 per hour is well underway. There are plenty of arguments as to why such a hike in minimum wage is necessary, and what the consequences could be to those businesses dependent upon the cheapest hourly labor. But, for the information security industry, upping the minimum wage will likely yield only good news. more
I have had the question recently with several new gTLD applicants. I think this is a good subject for applicants with the intention to sell domain names AND who are alone to apply for their string. A Pioneer program allows to: Find good partners to developp a TLD; once the program is signed, it is an insurance they will have a good use of the requested domain name... more
After a more than 100 year run, the end is nigh for plain old telephone service (POTS). Through most of recent history POTS was provided by monopolies, which were regulated at both the federal and state level. The new world is much more competitive; we can talk via cell phones, computers, traditional phones hooked to a variety of devices instead of the old phone line, and a plethora of new gadgets like tablets. Voice service no longer has to be vertically integrated. more
Yesterday's post explained how peer-to-peer (P2P) applications use the processing power, bandwidth, and storage capacity of participants in a service rather than centralized resources. This makes such applications generally less subject to catastrophic failure, much less subject to running out of resources (since each new user brings new capacity as well as new demand), and much cheaper FOR THE PROVIDER of the application in terms of hardware and bandwidth required. It's the FOR THE PROVIDER part that's the rub. Let's consider the case of BBC's iPlayer service... more
One of the big trends this year is spear phishing. These are phish attacks that are frequently (though not always) against high profile users. The purpose of these attacks is to steal sensitive data or get elevation of privilege inside the service by exploiting a software vulnerability within the user's computer that transmits usernames and passwords back to the phisher. more
Few parts of the Domain Name System are filled with such levels of mythology as its root server system. Here I'd like to try and explain what it is all about and ask the question whether the system we have is still adequate, or if it's time to think about some further changes. The namespace of the DNS is a hierarchically structured label space. Each label can have an arbitrary number of immediately descendant labels, and only one immediate parent label. more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global