Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Continuing WHOIS Disappearing Act

WHOIS is about to become even harder to find. ICANN has recently concluded long-delayed contract negotiations with industry meant to accommodate the technical migration from the WHOIS protocol to the Registration Data Access Protocol (RDAP). Instead of limiting the changes to what's necessary to implement the new technical protocol, the proposals effectively gut WHOIS, making it virtually impossible to find by eliminating web-based WHOIS access... more

Thoughts on the Best Western Compromise

The Sunday Herald reported on Sunday that Best Western was struck by a trojan attack that lead to the possible compromise of about 8 million victims. There is some debate as to the extent of the breach and not a small amount of rumor going around. I'm not entirely disposed to trust corporate press releases for the facts, nor am I going to blindly accept claims of security researchers whose first call is to the PR team when discovering a problem. That said, here is what seems to be the agreed upon facts... more

Tips for Managing Your Company’s Shadow IT Issues

Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more

Call for Participation – ICANN DNSSEC and Security Workshop at ICANN66, Montreal, Canada

The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop on Wednesday, 06 November 2019, during the ICANN66 meeting held from 02-07 November 2019 in Montreal, Canada. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. more

A New Phase of Measuring DNS Abuse

Today the DNS Abuse Institute (“DNSAI” or the “ Institute”) adds a new level of reporting for our measurement project: DNSAI Compass™ (“Compass”). With this new level of reporting, we intend to show the spectrum of how malicious phishing and malware is distributed across the DNS registration ecosystem.1 To demonstrate this, we are identifying registrars and TLDs with high and low volumes of malicious domain registrations in their Domains Under Management (DUM), or new registrations. more

A Cautionary Tale of Reputation Damage: Striking the Right Balance With Brand Protection

In early March 2020, a well-known European fashion brand found themselves on the receiving end of a protest campaign on social media. The background to the case was the fact that, in 2019, the brand had launched a cease and desist (C&D) action against a small, U.K.-based company in response to their use of similar product names and sale of associated clothing merchandise. more

Brand Protection Beyond the “Whack-a-Mole” Approach

I recently shared at a conference how a seasoned brand and fraud expert from one of the world's largest global financial institutions lamented a major attack where multiple fraudulent websites would pop up every single day. All attacks were launched from the same registrar and web hosting company, and no matter how much they reached out to these providers, they received the same reply: "we will pass on your request to the registrant or site owner," and then nothing happened. more

Trust Us

Here's the question: is it meaningful or important for a federal agency to have regulatory authority over high-speed Internet access connectivity? Right now, the FCC (which is supposed to oversee "communication over wire and radio") has no clear authority to make policy about high-speed Internet connectivity. (Transport is different than content - this post is not about applications or uses of this connectivity. Be careful when you talk about the Internet "ecosystem," because transport has been historically and remains different from everything else. I'm talking about the capacity to send packets from Point A to Point B, whether provided by wired or wireless providers.) more

ICANN TAS Window Closes - What’s Next for Applicants?

It's official. After more than six grueling years of work for ICANN and the wider community, the new Top-Level Domain (TLD) application process finally closed a few hours ago. ICANN's Chief Operating Officer later advised the community in a release that just over 1900 applications had been submitted in the TAS with one hour remaining before the system closed (final numbers will be released on reveal day). This number of applicants falls within most industry estimates and shows significant demand as expected from across the globe. more

1st Sealed Bid gTLD Contention Auction Completed for the String .One

The first sealed bid auction for a new gTLD contention set was completed last week for the string .One. To our knowledge this is 1st auction to be conducted by a third party other than Applicant Auction to settle a contention set and marks the first time a new gTLD contention set was settled through a "Single Sealed Bid Second Price" auction... The winning bidder for the new TLD extension was One.com of Dubai, AE, which will act as the worldwide registry for .One domains. more

Watch The IGF 2012 Live From Baku

The Seventh Annual Internet Governance Forum (IGF) is underway now in Baku, Azerbaijan, from November 6-9, 2012. Very appropriately, it is possible to listen in to any of the sessions remotely across the Internet. Details can be found here... more

Another One (Partially) Bites the Dust

Following in the footsteps of Lethic, Waledac and Mariposa, yet another botnet has been taken offline. Not completely, though, it was only a partial disconnect. The Zeus botnet, also known as Zbot, is a trojan password stealer that captures passwords and sends them to the attacker. more

June 8 Deadline for Survey on Recommendations for Future of the Internet

What do you think must be done to ensure the development of an open, trusted, accessible, and global Internet in the future? As part of the Internet Society's "Internet Futures" project, we'd like your input on recommendations for Internet leaders and policy makers. For more background, please read "Help Shape the Future of the Internet" by my colleague Constance Bommelaer, or browse through the Internet Futures pages. more

An Update on LEO Satellites

A lot of rural America continues to hope that low orbit satellite (LEO) service will provide a broadband alternative. It's been a while since I've covered the status of the companies proposing to deploy constellations of satellites for providing broadband. In March, OneWeb filed for Chapter 11 restructuring when it was clear that the company could not raise enough cash to continue the research and development of the satellite product. more

Thinking Carefully About New gTLD Objections: Limited Public Interest (Part 2 of 4)

The second installment in my four-part series on New gTLD objections will focus on the limited public interest ("LPI") variety. The overarching theme however is essentially the same: new gTLD objections are generally more complicated (and costly) than UDRP actions and need to be approached with care. In fact, LPI represents one of the best examples of the tough climb that would-be objectors are likely to face. Understanding exactly what is required beforehand - and whether or not you can deliver - is absolutely critical. more

Topics

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days