Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Real White Spaces Debate: To Create or Abolish a Market in the Airwaves

I've been following the "white spaces" for as long as it has been happening -- four, maybe five years -- and I must admit that I am surprised by FCC Chairman Kevin Martin's sudden fondness for them. Until the last days of his chairmanship, Martin never cared for this somewhat radical notion: allowing techies and community activists to spew electromagnetic frequencies in zones currently occupied (at least ostensibly) by the broadcasters. more

Threat Intelligence Platform in Action: Investigating Important Use Cases

As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more

Next Generation Telecoms: FttH and Trans-Sector Strategies

The deployment of Fiber to the Home (FttH) around the world is beginning to lead to exciting developments for the next generation of telecommunications. In particular, infrastructure based on FttH is providing the foundation for smart communities and cities where a number of technologies and services are combined to create an enhanced value proposition for residents. Smart homes connected to these networks can utilise services such as tele-health, e-education and e-government as well as access digital media and high speed Internet. more

Cybercriminals Weaponize Bulk-Registered Domain Names

Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more

The Internet of the Future – What Happens Behind the Scenes?

Today's Internet is a critical infrastructural element whose continued development influences industries, cultures, and the private space of most individuals. However, the world-encompassing network sometimes needs to be adapted to new requirements to keep pace with current innovations. We have recently seen accelerating development of Internet usage on the user side. Whether it is online shopping's expansion or the greater distribution of mobile devices or streaming services... more

Many .COM Domain Names with Same Keywords as Premium New gTLDs are Available for Registration

Earlier this month, Andrew Allemann wrote a post on notable NameJet sales in which he discusses the sale of PropertyRehab.com for $2,400 as "a perfect example of how wrong some domain registries are on their premium pricing." He mentions that the registry operator for the .rehab new generic top-level domain (new gTLD), has marked property.rehab as a platinum domain name and asks: "Why would someone pay thousands (or tens of thousands) a year for Property.rehab when they could buy PropertyRehab.com for just $2,400?" more

Internet Society’s Contribution to the WSIS+10 Written Consultation

Today we at the Internet Society submitted our contribution to the United Nations General Assembly's 10-year review of the World Summit on the Information Society (WSIS+10) that will take place in New York in December. The goal of this meeting is to set the agenda for the UN - and through that the agendas of nations around the world -- with regard to the future of the "Information Society". more

Are We Facing the Splinternet?

One of the consequences of the war between Russia and Ukraine is that Russia has largely stopped participating in many large worldwide web applications. Russia has blocked Facebook and Twitter. Other applications like Apple, Microsoft, TikTok, Netflix, and others have withdrawn from Russia. The European Union is in the process of trying to block Russian-generated content, such as the state-owned news outlets of RT (formerly Russia Today) and Sputnik. more

Exploiting Video Console Chat for Cybecrime or Terrorism

A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more

Shaping the Future of ICP-2: Community Input Extended to December 2024

In October 2023, the Number Resource Organization initiated a process to undertake a significant update to Internet Coordination Policy 2 (ICP-2); the policy which specifies the criteria for establishing new Regional Internet Registries (RIRs). The Address Supporting Organization Address Council (ASO AC) has been tasked with managing the revision process, emphasizing community engagement and transparency. more

50 Years of Ethernet

The idea for Ethernet was born fifty years ago in May 1973 when Robert Metcalf coined the word Ethernet. He had been studying ALOHAnet, developed at the University of Hawaii in 1971 and was the first public demonstration of a wireless packet data network. Metcalf used the work Ethernet as a reference to luminiferous aether, a concept postulated in the 17th century to explain how light could be transmitted through a vacuum. more

Watching the Watchers Watching Your Network

It seems that this last holiday season didn't bring much cheer or goodwill to corporate security teams. With the public disclosure of remotely exploitable vulnerabilities and backdoors in the products of several well-known security vendors, many corporate security teams spent a great deal of time yanking cables, adding new firewall rules, and monitoring their networks with extra vigilance. more

ICANN Clarifying Questions - How to Respond (Part 2 of 3)

In the first part of this series on ICANN's impending Clarifying Questions period, I outlined what you can expect in terms of question structure. Here I would like to outline how the points work and provide some advice on how to answer questions for best success. more

Addressing Recent Media Mischaracterizations of the .ORG Acquisition

Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more

Google and ETECSA Will Agree to Exchange Internet Traffic Without Charge

Google and ETECSA have signed a memorandum of understanding agreeing to negotiate a peering agreement that would allow cost-free data exchange between their networks once an undersea cable physically connects them. Google has worked hard to establish a relationship with ETECSA and the Cuban government. In recent years, Cuba, not the US, has limited the Cuban Internet. This agreement telegraphs a change in Cuban policy. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days