Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Telstra’s OneWeb Deal Caught Up in the Russian War

Telstra might regret having signed a commercial deal with London-based OneWeb as this company has now become a pawn in the war between Russia and Ukraine. Telstra agreed to host two OneWeb gateway Earth stations in Australia, one in the west and one in the north, which would also cover the APAC region, with a third Earth station currently under discussion for the east coast. more

Mobile Prices Unlikely to Be Affected by AT&T Decision

Contrary to what some financial analysts would have us believe, it is highly unlikely that the price increases for mobile broadband services which were recently announced by AT&T will be replicated by other mobile operators around the world. The mobile market in the US is one of the least regulated and therefore one the most monopolised markets in the western world. more

Cybercriminals Weaponize Bulk-Registered Domain Names

Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more

Online Businesses to Benefit from Supreme Court “Booking.com” Ruling

Today, in U.S. Patent and Trademark Office v. Booking.com, the Supreme Court of the United States has affirmed that generic terms including .com domain names may be trademarked when consumers do not perceive the mark to signify the class of services, with heightened distinctiveness and recognition attributable to top-level domains that add meaning like .club, .guru, and .vip. more

The Crypto Wars Resume

For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

An Unprecedented Look Into Utilization at Internet Interconnection Points

Measuring the performance of broadband networks is an important area of research, and efforts to characterize the performance of these networks continues to evolve. Measurement efforts to date have largely relied on in­home devices and are primarily designed to characterize access network performance. Yet, a user's experience also relies on factors that lie upstream of ISP access networks, which is why measuring interconnection is so important. more

Is It Time for a Data Sharing Clearinghouse for Internet Researchers?

Today's Senate hearing with Facebook's Mark Zuckerberg will start a long discussion on data collection and privacy from Internet companies. Although the spotlight is currently on Facebook, we shouldn't forget that the picture is broader: companies from device manufacturers to ISPs collect network traffic and use it for a variety of purposes. more

Does Renewing a Domain Name Count as “Registering” a Domain Name Under the ACPA?

The U.S. Anticybersquatting Consumer Protection Act ("ACPA") is a federal law -- part of the Lanham Act that deals with trademarks and unfair competition. It says that a person can be liable if he or she registers a domain name that contains another's distinctive trademark with a bad faith intent to profit from that mark. One issue that has arisen over the years is whether registration that can give rise to liability means only the first time the domain name is registered, or whether it applies to the re-registration... more

The Promise of Connectivity at CES Means Nothing Without IPv6

For a few years now, we have been promised a bright future where connected devices all communicate with each other on the Internet of Things. If this year's CES was any indication, the consumer technology industry is just about ready to deliver on that promise with a flood of new devices and products that will transform the way we interact with technology on a fundamental level. more

Internet Governance Calendar During the COVID-19 Pandemic

The Internet has become an integral part of our lives. Its growth is dependent upon the interaction of engineers, researchers, and network operators to advance networking technologies, policies, governance mechanisms, and deployment. In this undertaking, the Internet's multi-stakeholder governance has relied heavily upon regular face-to-face meetings and conferences to gather individuals and organizations from numerous participating communities. more

Early Disclosure of UDRP Complaints

Under the previous rules for the Uniform Domain Name Dispute Resolution Policy (UDRP), domain name registrants that had a complaint filed against them were supposed to be notified of the complaint by the trademark owner that filed it. Then, a revised set of UDRP rules that went into effect in 2015 eliminated the complainant's obligation to notify the respondent. Instead, the new rules only require the UDRP service provider (such as WIPO or the Forum) notify the respondent, presumably after the registrar has locked the domain name, preventing any transfers. more

Battling Cyber Threats Using Lessons Learned 165 Years Ago

When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more

It’s Time for a Referendum on Orgxit

The worst thing about Brexit wasn't the referendum. It was the fallout. David Cameron decided that the best way to manage a small risk was to take a big one. Finally, over three agonizing years later, the UK looks set to move on. The Internet Society – which has run the .ORG domain since 2002 – was in the same position as Cameron. They became convinced that it was worth dealing with a small risk by taking a huge one. more

How Bubbles Decide Elections

The victory of Trump left the world perplexed, it did not take long to appear texts blaming Facebook and its bubble for the unexpected result. The "bubble", a theme that circulated more for the academic and technical spheres gained an unusual popularity in the last days, never saw so many texts on the subject published in such a short space of time, and in the recognized spaces of global journalism. more

FISMA Focus: Continuously Monitoring the Cyber-Levee

NIST's release of their initial public draft of SP 800-137, Guide for Continuous Monitoring of Information Systems and Organizations will create a set of challenges for the federal cybersecurity community. Agencies and contractors will need to shape the document through the multi-stage revision process while continuing to implement their own continuous monitoring measures. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days