Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Internet and the Telecommunication Acts of 1900

On his blog Bruce Schneier recently published a post called "Power and the Internet". An article that most people in the western world will agree with. Internet freedom against Internet safety and security, the powerful have a lot of power to wield and the rest is at best ad hoc organised or fairly powerless lobby organisations. So who is likely to win? Vested interests, he warns. more

Network Outages Go Global

On August 30, CenturyLink experienced a major network outage that lasted for over five hours and disrupted CenturyLink customers nationwide as well as many other networks. What was unique about the outage was the scope of the disruptions as the outage affected video streaming services, game platforms, and even webcasts of European soccer. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

Do Cable Companies Have a Wireless Advantage?

The big wireless companies have been wrangling for years with the issues associated with placing small cells on poles. Even with new FCC rules in their favor, they are still getting a lot of resistance from communities. Maybe the future of urban/suburban wireless lies with the big cable companies. Cable companies have a few major cost advantages over the wireless companies, including the ability to bypass the pole issue. The first advantage is the ability to deploy mid-span cellular small cells. more

Peering and Interconnection Key to a Competitive American Telecoms Market

Peering has come back in the news with the FCC mentioning it in its set of reviews of the telecommunications market in the USA, following its Network Neutrality decision. The peering and interconnect issues are going to the heart of the telecoms matter in relation to competition, innovation and the Open Network. You don't need Network Neutrality rules, if you have a well functioning, transparent, interoperable and competitive infrastructure environment. more

Downloading is Not Enough… Probably

Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more

Youth Aren’t Just the Internet’s Future, Youth Shape the Internet’s Future

For the past 27 years, or at least as long as I can remember, I have heard one phrase on an endless loop: "youth are the future." It is a statement that always caused me to feel mild confusion. I thought, "How can I, for instance, be the future if I'm here now?" As I "grew up" and the term "youth" seem to expand in both meaning and breadth of inclusion, I quickly realized that when this statement is used by many it is platitudinous at best and disingenuous rhetoric at worst. What should actually be clarified is that, as no one is immune from the natural progression of the life course (at least not yet anyway), youth will one day constitute the key decision-makers in political, economic and social institutions. more

The NameSentry Report: Benchmarking Abuse Levels in the Domain Name Industry

On July 10th Architelos released the first NameSentry Report, benchmarking abuse levels in the domain name industry. For some time now, a debate has raged about the potential impact of new gTLDs on Internet safety and security, namely abusive registrations such as phishing, spam, malware, and so on. However, without benchmarking the current state, how can we realistically evaluate if new gTLDs have made any measureable difference in the level of abuse? more

M3AAWG & i2Coalition Collaborate on Best Practices on Anti-Abuse in Hosting & Cloud Environments

I am excited to announce the recent release of the industry first Best Common Practices document for Cloud and Hosting providers for addressing abuse issues that was created by M3AAWG and the i2Coalition. M3AAWG has been collaborating with the Best Practices Working Group of the i2Coalition over the past 2 years to discuss ways to solve malicious activity within hosting and cloud ecosystems.  more

Why Passwords Have Never Been Weaker and Crackers Have Never Been Stronger

The past few weeks, I've been on this security kick particularly when it comes to encryption. I'm developing my own app in my spare time. So I'm trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am protecting is only quasi-valuable so I can afford to take a hit due to my own conscious incompetence. Anyhow, I ran across this article on Ars Technica yesterday entitled "Why Passwords have never been weaker - and crackers have never been stronger." It's a long article and it will take you a while to read it, but here is my summary. more

Ontario Court Rejects U.S. Government Demand for Full Access to Megaupload Servers Seized in Canada

Many readers will recall that nearly one year ago, the U.S. government launched a global takedown of Megaupload.com, with arrests of the leading executives in New Zealand and the execution of search warrants in nine countries. Canada was among the list of participating countries as the action included seizure of Megaupload.com servers located here. more

Mobile Consolidation - A Threat to Competition

The global financial crisis and the very rapid growth in mobile broadband, thanks to smartphones, have combined to create havoc in the mobile market. On the one hand, we see that customers, especially those in countries seriously affected by the GFC, such as Southern Europe and Ireland, have reduced their mobile use, with the result that there has been a significant drop in Average Revenue per User (ARPU). On the other hand, phenomenal growth has taken place in mobile broadband, but without a significant increase in ARPU... more

Holiday Shoppers Beware: Tips on Protecting Brand Owners and Consumers from Domain Security Threats

With the COVID-19 pandemic persisting, online shopping will be the preferred method for the 2020 holiday shopping season. While staying home to shop is the safest option right now, it means consumers are more vulnerable to online fraud, counterfeits, and cyber crime. Increased online activity provides opportunities for unscrupulous infringers to abuse trusted brand names to drive visitors to their own fraudulent content. more

Australian Football League Kicks Off Sporting Code .Brands

I can't lie -- I absolutely LOVE Aussie football and have kicked a ball around since I was three years old. In fact, I always will. My ongoing love for the game is as certain as death, taxes and the fact that my beloved Melbourne Demons club will give me both incredible highs and heartbreaking lows each and every year. For most Aussies, a sporting life is very much the way of life... Today is one of those wonderful times when you get to blend your professional and personal passions. more

Mass Surveillance: A Turning Point in Internet History

So far, the debate on mass surveillance has dwelt on the immense resources made available to the agencies (NSA in the US, GCHQ in the UK), on the technological advantage that enables them to access any data and bypass encryption, and on the lack of proper oversight in those two countries. But in order to make their voices heard by their elected representatives, Internet users around the world need to have an even more complete view of the emerging reality. more

Topics

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days