Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

TLD for Online Communities and Social Networking?

A company called PW Registry Corporation makes the following announcement regarding the .PW ccTLD originally designated for the country of Palau: "The PW Registry Corporation announced today plans for the activation of the PW top- level domain (TLD), the Internet's first and only domain extension devoted to "Communities of Shared Interests". Unlike other domain extensions, such as .com, .biz, and .info, PW is aimed at providing individuals and consumer/affinity organizations a highly-personalized, permanent and portable e-mail address and a managed platform for community and social networking." more

SEO Secrets of Keyword-Relevant Domain Extensions

The Domain Name Association (DNA) recently commissioned Web Traffic Advisors, with supporting analysis from Kevin Rowe of Rowe Digital, to do an independent study, Hidden Advantages of Relevant Domain Names, to answer the following question: Can domain name extensions, especially meaningful or relevant domain name extensions (e.g. .Club, .Online, .Rocks, .Today), have the same opportunity as traditional or more generic ones (e.g. traditional .Biz, .Com, .Info, .Org)? more

The Domain Industry Keeps on Growing and Changing

It has become very clear once again: the domain industry won't stop. The scenario we know today is constantly changing, and our industry adapts to the changes taking place in society and the economy. Thanks to its versatility, the domain industry continues to amaze with some big changes year after year. This sector has its own peculiarities, rules, and opportunities for all stakeholders involved. more

Understanding the Threat Landscape: Indicators of Compromise (IOCs)

I previously provided a brief overview of how Verisign iDefense characterizes threat actors and their motivations through adversarial analysis. Not only do security professionals need to be aware of the kinds of actors they are up against, but they should also be aware of the tactical data fundamentals associated with cyber-attacks most commonly referred to as indicators of compromise (IOCs). Understanding the different types of tactical IOCs can allow for quick detection of a breach... more

3rd Lawsuit Against VeriSign; Seeks Class Action Status

A third lawsuit has been filed late Friday in a federal district court in California against VeriSign, Inc. over its controversial DNS wildcard redirection service known as SiteFinder. It was filed by the longtime Internet litigator Ira Rothken. In addition, while two other lawsuits have been filed by Go Daddy Software, Inc. and Popular Enterprises, LLC. in Arizona and Florida, this is the first lawsuit to seek class-action status. Here is an excerpt from the "Introduction" section of this class-action lawsuit... more

The ENISA Botnet Report: Thoughts on the State of Play in Smart Phones

At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come home with was: we can still count the numbers of mobile viruses manually, <600; the problem will never be the same as on a fixed network as traffic is monitored and metered: We detect it straight away. We are studying the problem seriously. Are mobile operators really prepared for what is coming? more

Is the Transition to IPv6 a “Market Failure?”

At the outset I should say that here I would like to restrict my view to the transition from the IPv4 Internet to the IPv6 Internet, and, in particular, to examine the topic of the appropriate market structure that lies behind the dual stack transition strategy, and the manner in which the Internet can transition from the universal use of IPv4 as the underlying datagram protocol to the universal use of IPv6. more

Webinar Tomorrow (May 22) - IPv6 and Telecom: IPv4 is Finally Running Out. Now What?

What is the impact of IPv6 on telecommunications, VoIP, unified communications, etc? Why should telecom operators care about IPv6? What VoIP systems already support IPv6? What efforts are underway within organizations like the IETF and the SIP Forum to ensure that telecommunications can work over IPv6? more

The Internet’s Gilded Age

The rise of the Internet has heralded rapid changes in our society. The opportunities presented by a capable and ubiquitous communications system and a global transportation network have taken some corporations from the multinational to the status of truly global mega-corporation. Good examples of these new corporations include Google, Apple, Amazon, Microsoft and Facebook. There are a handful of large-scale winners in this space and many losers. But this is not the first time we've witnessed a period of rapid technological and social change. more

Comparing IPv4 and IPv6 Performance

The active measurements the RIPE NCC carried out on World IPv6 Day on 8 June 2011 included ICMP (Internet Control Message Protocol) and ICMP6 (ICMP for IPv6) measurements from our vantage points to selected hostnames of World IPv6 Day participants and other dual-stacked parties. We used these measurements to determine the performance of IPv4 versus IPv6 connections. more

NIST as a Cyber Threat Actor

On 24 May, NIST published recommendations that are a key component of the U.S. cybersecurity ecosystem -- known as vulnerability disclosure guidelines. NIST (National Institute of Standards and Technology) is an agency of the Department of Commerce whose mission includes "developing cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public." more

Why I Support Canadian Presence Requirements for .CA Domain Names

It nearly goes without saying that if ".CA" means and should continue to mean, "Canada", the registration of a .CA domain name ought to involve some tie to Canada. As Canadian Internet Registration Authority ("CIRA") CEO, Byron Holland, aptly put it, "The fundamental requirement of having a Canadian presence in order to get a dot-ca domain name make sense...because it is a country code and there is an assumption that there is some "Canadian-ness". And that is why, in a nutshell, I support a Canadian 'presence requirement' for the registration of .CA domain names. Nevertheless, the question of what constitutes an appropriate 'presence requirement' is an interesting issue... more

Study Finds Spammers Use P2P Harvesting to Spam Millions

A recent study conducted by Blue Security reports how Internet users can unknowingly expose their contacts' emails addresses to Spammers while sharing files, music, games and DVDs over Peer-to-Peer (P2P) networks. The study has uncovered hundreds of incidents where files containing email addresses were made accessible in P2P networks. more

The Coding of Online Brand Protection

Moore's law postulates that the number of transistors in an integrated circuit will double every two years. That law has given us smartphones and other devices with astonishingly diverse capabilities at ever lower costs. However, while it does not encompass online brand infringement, many trademark managers feel that their task is likewise expanding at exponential speed and imposing escalating costs. Potential cybersquatting based in the more than one thousand new generic top level domains is only one new source of anxiety. While the jury is still out on the level of harmful cybersquatting and the efficacy of the new Rights Protection Mechanisms (RPMs) for new gTLDs, that ICANN program is hardly the only challenge. more

Offering Price as Evidence of Bad Faith Domain Name Registration: A False (UDRP) Factor

I have pointed out in earlier posts that some panelists disapprove of the business of speculating in domain names. There have been a succession of decisions expressing this view beginning with <crew.com> discussed below. Forfeiture has been justified with a mixture of theories. If the offering price is allegedly "excessive" or the domain name is passively held, or the respondent has renewed its registration after the mark is first used in commerce, the panelists find respondents have engaged in unlawful conduct and must forfeit their domain names. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days