Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Perfect Storm: Net Neutrality Debate Poised to Spread Its Wings Down Under

To date, proponents of a neutral internet have had relatively scant reason to raise their voices beyond anything more than a murmur in Australia. While the FCC's Open Internet Order of 2015 has been hailed as a significant win for consumers in the US, and the wording of proposed legislation to institute ex-ante regulation of service providers is soon to be considered in the EU, Aussies have been quarantined from anything other than the fringes of the Net Neutrality debate. more

Brexit Done: What Does It Mean for an Online Presence?

On January 1, 2021, the United Kingdom officially ended the transition period and is no longer subject to European Union rules. The U.K. had been part of the EU for 47 years, or almost two generations. Comprehending the impact, the changes, the new ruling, and compliance will take some time. But in a world where online shopping, online banking, and communication is growing at lightning speed, we need clarity on key digital assets - the basic domain name. more

INET DC, Weds, July 24: Surveillance, Cybersecurity and the Internet’s Future (Livestream available)

Are you concerned about the recent reports about government surveillance programs? Are you concerned about security and privacy online? If so, you may want to attend (in person or remotely) the INET Washington DC event happening on Wednesday, July 24, from 2:00 - 6:00 pm US Eastern time at George Washington University. Sponsored by the Internet Society and GWU's Cyber Security Policy and Research Institute, the event is free and open to the public and will also be streamed live on the Internet for those who cannot attend in person. more

Don’t Blame Open Recursives For DDoS Attacks and Why You Should Implement BCP38

There has been plenty of buzz and chatter on the Internet recently concerning a very large DDoS attack against CloudFlare, with coverage on their blog, the New York Times, and the BBC, among many others. While attacks of this nature are certainly nothing new, the scale of this attack was surprising, reported to hit 120Gbps. For a sense of scale, your average cable modem is only about 20Mbps, or about 0.016% of that bandwidth. more

Representation in Multistakeholder Model

In the recent years, a new form of multilateral cooperation has emerged that is more inclusive and open than the traditional intergovernmental approaches. A solutions oriented governance model where multiple stakeholders work in collaboration to achieve the purpose. These stakeholders could be from various states working at the global level or it could be bound to a nation-state which is referred to as the mutlistakeholderism at the regional or local level.  more

How a ‘Defensive Registration’ Can Defeat a UDRP Complaint

A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more

The Christmas Goat and IPv6 (Year 11)

This is the fourth year now with almost no snow during the Christmas Goat event here in Sweden, and so once again, you get a photo without any snow. Because of Covid-19 and 99.99% people working for home, I have not even seen the Goat live this year... What a crazy year it has been! more

Reshaping Cyberspace: Beyond the Emerging Online Mercenaries and the Aftermath of SolarWinds

Ahmed Mansoor is an internationally recognized human rights defender based in the Middle East and recipient of the Martin Ennals Award (sometimes referred to as a "Nobel Prize for human rights"), On August 10 and 11, 2016, Mansoor received an SMS text messages on his iPhone promising "new secrets" about detainees tortured if he clicked on an included link. Instead of clicking, Mansoor sent the messages to the Canadian Citizen Lab researchers. more

Security, Privacy Issues and USB Drives

In an article on CSO.com.au a report from Sophos Australia is reported on. The anti-virus software company had bought 50 usb drives for analyses at a public transport auction of devices left on the Sydney trains. When they wrote that 66% was infected with malware, I presumed that they were left behind consciously, but were they? more

Searching for Truth in DKIM: Part 4 of 5

Once you've determined that you can trust the signer of a message, as we discussed in part 3, it's easy to extrapolate that various portions of the message are equally trustworthy. For example, when there's a valid DKIM signature, we might assume that the From: header isn't spoofed. But in reality, DKIM only tells us two basic things... more

Who Owns Your Connected Device?

It's been clear for years that IoT companies gather a large amount of data from customers. Everything from a smart thermometer to your new car gathers and reports data back to the cloud. California has tried to tackle customer data privacy through the California Consumer Privacy Act that went into effect on January 1. Web companies must provide California consumers the ability to opt-out from having their personal information sold to others. more

Thoughts on the Best Western Compromise

The Sunday Herald reported on Sunday that Best Western was struck by a trojan attack that lead to the possible compromise of about 8 million victims. There is some debate as to the extent of the breach and not a small amount of rumor going around. I'm not entirely disposed to trust corporate press releases for the facts, nor am I going to blindly accept claims of security researchers whose first call is to the PR team when discovering a problem. That said, here is what seems to be the agreed upon facts... more

Virtual ICANN Meetings – YES, Please

In the early 2000s, when I began working in the domain name industry, I remember hearing from colleagues about these seemingly elusive ICANN meetings invariably hosted in some pretty incredible places, including Rio de Janeiro, Rome and Cape Town. I remember how some of my colleagues complained about being stuck in windowless conference rooms for hours on end, but secretly thinking that they were probably going to a few meetings, but then actually enjoying a fabulous vacation. more

CEO Chehade, Senator Cruz, and the IANA Transition End Game

On February 4, 2016, U.S. Senator (and Republican Party Presidential nomination contender) Ted Cruz, joined by Senators James Lankford and Michael Lee, dispatched a letter to ICANN CEO Fadi Chehade stating that "we were surprised and dismayed to learn that you have agreed to co-chair a high-level advisory committee for the World Internet Conference, which is organized by the Chinese government, while you serve as the Chief Executive Officer of ICANN under contract with the United States Government". The letter continued by posing a series of nine questions... more

An Unnatural .Bond: A Study of a ‘Megacluster’ of Malware Domains

A recent news story, following research from security provider Infoblox, highlighted the case of the 'Revolver Rabbit' cybercriminal gang, who have registered more than half-a-million domains to be used for the distribution of information-stealing malware. The gang make use of automated algorithms to register their domains, but unlike the long, pseudo-random ('high entropy') domain names frequently associated with such tools, the Revolver Rabbit domains instead tend to consist of hyphen-separated dictionary words (presumably so as to obfuscate their true purpose), with a string of digits at the end. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days