Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

RIPE NCC Members Secure their Resources Using Certification

Resource certification verifies that an Internet number resource (IP address space or autnonomous system number) has legitimately been allocated by a Regional Internet Registry. It will also benefit every network operator and Internet user in the world by helping to ensure long-term routing stability. more

Why African Telecom Union (ATU) Proposal Should be Rejected

My attention was drawn to the recent African Telecom Union (ATU)'s proposal for the modification and expansion of Resolution 47... As an affected party to the proposal, I feel obliged to make a comment: Recalling my last article to The Hill titled "ICANN is already under the influence of Foreign Governments", I drew an example of how ICANN allowed the African Union Commission, an Intergovernmental body to heavily interfere in the .Africa application so as to delegate it to itself, which led me to take ICANN to Court. more

Creating, Protecting and Defending Brand Equity - Part 2

In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more

Is finals.afl the Most-Viewed .Brand Domain Ever?

If you've ever visited or spoken to someone from Australia, there is a good chance you've heard of Australian Rules Football. Those who are followers of Australia's most popular football code are often politely described as 'fanatical', with hundreds of thousands of followers attending games each weekend during the southern hemisphere winter. more

Is Fiber a Hundred Year Investment?

I think every client who is considering building a fiber network asks me how long the fiber will last. Their fear is having to spend the money at some future point to rebuild the network. Recently, my response has been that fiber is a hundred-year investment -- and let me explain why I say that. We're now seeing fiber built in the 1980s becoming opaque or developing enough microscopic cracks that impede the flow of light. more

Independent Study Shows Very Low Number of Geographical Indications Disputes Within European Domain Names

The EU is reforming its legal framework concerning geographical indications (GI) protection and has put forward provisions expanding GI protection to domain names in two recent legislative proposals concerning agricultural products and craft/industrial products. In order to support greater GI protection on the internet, both proposals mandate the European Union Intellectual Property Office (EUIPO) to establish a "domain name information and alert system." more

The TikTok Ban in Context

Donald Trump recently issued an executive order banning TikTok on the grounds that it was necessary to deal with the national emergency he had declared in an earlier executive order. He says he is concerned that TikTok might turn user's "information such as location data and browsing and search histories" over to the Chinese government. Trump does not site evidence of TikTok having shared data with China and TikTok says they have never shared user data with the Chinese government... more

Credit Card Breaches a Salutary Lesson for DNSSEC Adoption

Maintaining an 150 year old house requires two things, a lot of time and a lot of trips to the hardware store. Since the closest hardware store to my house is Home Depot, it is rare that a weekend passes without at least one trip to Home Depot. So now in the wake of the Home Depot data breach I am through no fault of my own in a situation where any or all of the bank cards I use regularly could be cancelled if the issuer decides they might be compromised. And this is not the first time this has happened to me this year. more

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more

The Shadow of the Web

I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced that it would appear supernatural to folks living just a century ago, or less. I worry for the Internet While it has been a major disruptive force, it is also susceptible to the existing paradigm. more

New Ad Fraud Schemes Utilize Alpha-Numeric Domains

The breach of the Democratic National Committee e-mail system and a massive digital advertising fraud believed to be run by alleged actors in Russia share a common thread beyond their ability to capture the news cycle. Although each event targeted a different weakness in brand/online security platforms, the common denominator is the use of fraudulent domain names. more

Low Cost Economy Depends on Ubiquitous Affordable High Speed Broadband

Around the world there are ongoing developments to reform and transform industries and whole sectors with the assistance of new information & communications technologies (ICTs). There is a clear understanding that reforms are essential in order to provide the level of services and the quality be it in business or elsewhere. Lifestyle issues are under threat in relation to the quality and the affordability of healthcare, social services, education, energy and the environment... more

The .BEST Acquisition: 3 Months After

The .BEST new gTLD Registry was acquired 3 months ago by Cyril Fremont, a French Entrepreneur from Paris, and a team of investors. I took the time to meet with Cyril in the latest ICANN63 meeting in Barcelona to ask him a few questions about his future new gTLD project, three months after it was acquired from the previous owner... .best has just released the MVP (Minimum Viable Product) of the social network. The ".best" social network will be officially present at the next Namescon... more

Trusting Zoom?

Since the world went virtual, often by using Zoom, several people have asked me if I use it, and if so, do I use their app or their web interface. If I do use it, isn't this odd, given that I've been doing security and privacy work for more than 30 years, and "everyone" knows that Zoom is a security disaster? To give too short an answer to a very complicated question: I do use it, via both Mac and iOS apps. Some of my reasons are specific to me and may not apply to you... more

Trust Isn’t Easy: Drawing an Agenda from Friday’s DDoS Attack and the Internet of Things

Last week, millions of infected devices directed Internet traffic to DNS service provider Dyn, resulting in a Distributed Denial of Service (DDoS) attack that took down major websites including Twitter, Amazon, Netflix, and more. In a recent blog post, security expert Bruce Schneier argued that "someone has been probing the defences of the companies that run critical pieces of the Internet". This attack seems to be part of that trend. This disruption begs the question: Can we trust the Internet? more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days