Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Three Layers of China’s International Strategy on Cyberspace

China's newly released International Strategy on Cyberspace is marked by three distinctive layers with different degree of priority: (1) sovereignty (or cybersecurity, or UN Charter), (2) globalization (or digital economy, or WTO rules), and (3) fundamental freedoms (or human rights, or UDHR). The good point of the strategy is that it tries to make the three layers peacefully co-exist in one document. The failure, however, lies in the intentional ranking of relevance/importance of the three layers... more

Spam: You’ve Come a Long Way, Baby

According to the majority of the testimony at this month's "Spam Summit," held by the U.S. Federal Trade Commission (FTC), the state of the fight against spam is pretty much the same as it has been for the last several years. The two days of presentations can largely be boiled down to the following bullets: Spam volumes continue to increase, being driven by the growth of "botnets"... Oh, and the spam wars are a lot less exciting than they used to be. Case in point: unlike last time, there were no fist-fights at this year's shindig. more

IPv4 and Education: The Basics

An IP address is a unique identifier for a device on a network, including the internet. IP stands for Internet Protocol (IP) which is a set of rules (a protocol) for addressing and routing data so it can travel through networks and arrive at its intended destination. Hence, "address." Internet-connected devices such as computers and smartphones each have a unique IP address. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 2: Taking Control

In part 1, I talked about some of the risks associated with BYOD. But there are actions you can take to greatly reduce this risk. One effective method for limiting the risk of BYOD is to employ DNS-based security intelligence techniques. DNS-based security intelligence makes use of an enterprise's caching DNS server to monitor and block DNS queries to known botnet command and control (C&C) domains. more

Tech Heavyweights to Congress: Transition Has Our Support, Do Not Delay It

Earlier today some of the biggest names in the tech industry sent a letter to Congress in support of the IANA transition and urging Congress not to delay it. The IANA transition relies on the expiry of the contract between the US Government's Department of Commerce and ICANN which is scheduled for the end of this month. As has previously been noted, some conservative politicians, most notably Senator Ted Cruz, have been very vocal in their criticism of the move and want to block it in Congress. more

Trust Binding

A few months ago, there was a lot of discussion that despite its claims, Zoom did not actually offer end-to-end encryption. They're in the process of fixing that, which is good, but that raises a deeper question: why trust their code? (To get ahead of myself, this blog post is not about Zoom.) If Zoom has the key but doesn't abuse it, there isn't a problem, right? Let's fast-forward to when they deploy true end-to-end encryption. Why do we trust their code not to leak the secret key? more

Greater Caribbean Cooperation Needed to Combat Cyber Crimes

The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats." more

A Diversity Success Story from the Apps for Ag Hackathon Competition

Deema Tamimi had one plan for the 2016 California Apps for Ag hackathon: get in and get out. She thought the weekend-long event would be a good opportunity to meet people, but she didn't feel ready to launch a new app, and so she planned on stealing away soon after the hackathon began. This, despite the very impressive resume she'd accrued and the fully-formed idea for a gardening-based app that had been brimming for half a year. But something magical can happen when so many engineers, experts, change-makers, and creatives converge at a hackathon. more

Have LLMs Broken Fair Use?

Two sets of authors sued Anthropic and Meta in San Francisco for copyright infringement, arguing that the companies had pirated their works to train their LLMs. Everyone agreed that a key question was whether fair use allowed it, and in both cases, the courts looked at the fair use issue before dealing with other aspects of the cases. Even though the facts in both cases were very similar, last week, two judges in the same court wrote opinions, coming to very different conclusions. How can that happen? Is fair use broken? more

The Future Looks Bright for New gTLDs!

The ICANN Board meeting undertaken recently in Nairobi was indeed eventful and there were many vital topics on the agenda, in particular for the new gTLD program that kept many interested parties on the edges of their seats as the meeting unfolded. ... One of the more controversial decisions was in regard to the Expression of Interest (EOI), a program intended to allow potential new gTLD applicants to pre-register for their desired TLD and provide ICANN and the community with invaluable information regarding likely volumes of applications. more

Leveraging DNS for Subscriber Loyalty

There has been a lot of talk about how the DNS can provide network-based security, and how DNS is in the best position to detect malware traffic before it does any harm. But what does this mean for end users? How does it make their online lives easier and more secure? DNS servers that are aware of sites that host malware, perform phishing activities (harvesting bank details, for instance) and other nefarious misbehaviors, can prevent end users from ever going to those sites. more

Busting 3 Popular and Misleading Terms in Telecom

"Philosophy is a battle against the bewitchment of our intelligence by means of our language." (-Ludwig Wittgenstein) The words we use to describe telecoms networks often contain hidden metaphors and meanings that lead us into wrong thinking. Here are three examples... Why misleading? The word "best" implies both benevolent and optimal intentionality: the network is going to do the "right" thing for its users, and it will maximise the "rightness" in some way. more

A Brief History and Recent Developments in the Co-Existence of Web2 and Web3 Domains

The Domain Name System (DNS, aka Web 2) and Web3 platforms are two different naming systems available to internet users. While the DNS (Web2) has been a reliable and trusted internet standard for decades, Web3 platforms (such as ENS, Handshake and Unstoppable) are a relatively new technology deployment that presents unique and different features. more

The Early History of Usenet, Part IX: Retrospective Thoughts

Usenet is 40 years old. Did we get it right, way back when? What could/should we have done differently, with the technology of the time and with what we should have known or could feasibly have learned? And what are the lessons for today? A few things were obviously right, even in retrospect. For the expected volume of communications and expected connectivity, a flooding algorithm was the only real choice. more

Study on Improving Internet Usability: A Framework for Domain Name Policy Evaluation

A domain name is a unique alphanumeric designation that facilitates reference to sets of numbers which actually locate a particular computer on the Internet. Domain names are a fundamental part of the Internet's user interface. Improving the usability of the Internet depends upon effective domain name policy. This study is intended to contribute to improvement in Internet usability for the end users of domain names. Benefits of more usable domain names include: higher sales, customer satisfaction and productivity, and reduced support costs. more

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days