Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Criminals Behind WannaCry

359,000 computers infected, dozens of nations affected world-wide! A worm exploiting a Windows OS vulnerability that looks to the network for more computers to infect! This is the most pernicious, evil, dangerous attack, ever... Queue the gnashing of teeth and hand-wringing! Wait, what? WannaCry isn't unprecedented! Why would any professional in the field think so? I'm talking about Code Red, and it happened in July, 2001. more

Skype as a Platform for Secure VPN Tunnels?

Since Skype has an open client-side API, why not use it as a transport to tunnel VPN traffic and blow through firewalls to connect you to a remote system? That's the idea raised by Peeter P. Mõtsküla in his Skype Developer Blog entry: "Idea: skypetunnel". For instance, have a Skype client running on your home machine logged in as one account. Have Skype on your laptop on another account. Initiate a connection between the two of them and wind up with secure, encrypted access through the firewall from wherever you are. Being peer-to-peer, there would be no central servers or infrastructure required (outside the usual Skype p2p cloud.) This would require, of course, a yet-to-be-created "extra" that connected into the Skype client API and was installed on both systems...but that was the point of the article... more

The Great Internet Transformation? A First Stab

Is it just a coincidence that some of the leading Internet-based application companies are pushing aggressively into network connectivity at exactly the same time the major telephone companies are pushing into content? Or are we witnessing the end of the Internet as we know it? Think back to the online world fifteen years ago. There was AOL, there was Compuserve, there was Prodigy, and there was Apple's eWorld. Sure, there were researchers and students posting to Usenet newsgroups and navigating through Gopher sites, but the Internet was a sideshow for individuals and business users. ...the online world of those days was fragmented and small. Every online service was an island. Are we going back to those days? more

ICANN Sacrifices Privacy for Shot at Independence

Late last month, ICANN took a major step toward addressing some ongoing concerns by signing a new agreement with the U.S. government entitled the Joint Project Agreement (JPA) heralded as a "dramatic step forward" for full management of the Internet's domain name system through a "multi-stakeholder model of consultation." ...While the Joint Project Agreement may indeed represent an important change, a closer examination of its terms suggest that there may be a hidden price tag behind ICANN newfound path toward independence -- the privacy of domain name registrants. more

DNSSEC No Longer Pie-in-the-Sky: Time to Develop a Strategy

You may have seen media reports a few weeks ago describing how servers behind the so-called Great Firewall of China were found delivering incorrect DNS information to users in the rest of the world, thereby redirecting users to edited Web pages. Reports indicate that this apparently occurred due to a caching error by a single Internet Service Provider. While the problem was fairly limited in scope, it could have entirely been prevented in a world where DNSSEC was fully deployed. more

Minding Your IP Address Reputation

Network operators rely on guidance from IP address experts because not all IP addresses used on the Internet are the same. The "reputation" of email senders is especially important because some are malicious users of the system. But identifying "senders" based on their email addresses or the individual IP address of a user presents issues that are unnecessarily complex. more

If Only Mike Knew

In the year 2000, Mike wanted "d.com" for his company website. After all, if you sneaked around these so called "reserved domains" long enough, you might be puzzled to see...say this at "x.com" or this at "z.com" or perhaps this at "q.com". As mysterious as this is, you can imagine Mike's disappointment after receiving the following email... more

You Paid to Join; You Can Leave Anytime

Once upon a time, around 1998-1999, three of us were hired by APEC-Tel to study "International Charging Arrangements for Internet Services". APEC-Tel is a regular meeting of Pacific-nation telecommunications ministers. The impetus of the study was their consternation that connection to the Internet was being charged (paid for) in an entirely new way. The template of the old telephone settlement scheme had been overthrown. Those wishing to connect to the Internet, which was centred in the United States, were being forced to lay lines across the Pacific, pay landing rights in the United States or Canada, and pay further to connect to the Internet at the nearest negotiated peering or transit point. more

World IPv6 Day: A Year in the Life

On the 6th June 2012 we held the World IPv6 Launch Day. Unlike the IPv6 event of the previous year, World IPv6 Day, where the aim was to switch on IPv6 on as many major online services as possible, the 2012 program was somewhat different. This time the effort was intended to encourage service providers to switch on IPv6 and leave it on. What has happened since then? Have we switched it on and left it on? What has changed in the world of IPv6 over the past 12 months? Who's been doing all the work? more

Petition Against Site Finder

We Internet users, who either own domain names or have an interest in the domain name system, wish to object to the VeriSign's Site Finder system. We believe that the system: 1) Breaks technical standards, by rewriting the expected error codes to instead point to VeriSign's pay-per-click web directory, and threatens the security and stability of the Internet; 2) Breaks technical standards affecting email services, and other Internet systems... more

New Research from CSC on the Impact of COVID-19 on Internet Security and Safety

Hackers are using company domain names for malicious attacks more than ever before. Established research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered, confusingly similar domain name, or via email header spoofing. Domain security intelligence is the first line of defense in preventing domain cyberattacks. more

A Trick to Register Good Generic Domain Names

A good domain name can be difficult to find... in particular when the domain name extension is highly demanded. It is what is happening with the .CLUB new gTLD. Should your Registrar tell you that the desired domain name is not available, it is not necessarily true. Anybody involved in launching a website has to go through a search for a domain name, and most of the time, it begins with the following question: "is the .com available?". Most of the time the answer is: "no it is not".  more

CENTR Paper on Fifth World Telecommunication/ICT Policy Forum

Many nations, particularly from the developing world, look to the International Telecommunications Union (ITU) for advice on telecommunications issues and, increasingly, Internet governance issues. The ITU's Fifth World Telecommunication / ICT Policy Forum (WTPF-13), 14-16 May 2013, Geneva, Switzerland, will be the first WTPF to focus exclusively on Internet issues. more

Analyzing Data for Business and Security Signals

Domain name registries and registrars play a critical role in the functioning of the internet, serving as gatekeepers to the DNS. As such, they have an important responsibility to ensure the security and stability of the DNS but also to promote the use of a domain name in a meaningful way for the end user. To be more efficient in achieving these goals, the domain name industry has started to become more open to the idea of leveraging their own internal data to gain insights about their current business. more

Legal Controls on Extreme End-to-End Encryption (ee2ee)

One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more

Topics

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days