Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

What are TLDs Good For?

Yesterday I said that the original motivations for adding new TLDs were to break VeriSign's monopoly on .COM, and to use domain names as directories. Competitive registrars broke the monopoly more effectively than any new domains, and the new domains that tried to be directories have failed. So what could a new TLD do? more

Verisign’s Perspective on Recent Root Server Attacks

On Nov. 30 and Dec. 1, 2015, some of the Internet's Domain Name System (DNS) root name servers received large amounts of anomalous traffic. Last week the root server operators published a report on the incident. In the interest of further transparency, I'd like to take this opportunity to share Verisign's perspective, including how we identify, handle and react, as necessary, to events such as this. more

IPv6 Over Satellite: Pie in the Sky?

I am writing this from the Satellite 2008 conference in Washington, D.C. As I make my way through the exhibits, I see many vendors advertising IP capabilities in their hardware products or network services. But when asked about IPv6 support, the common reply is a not so believable "it is on our roadmap" followed by a somewhat vague delivery date. Although IPv6 development has been slow across the board, it appears to be moving even more slowly in the satellite world... more

The ENISA Botnet Report: Thoughts on the State of Play in Smart Phones

At the ENISA presentation on her botnet report at eco in Cologne, 9 and 10 March, one of the slots was dedicated to threats to the mobile environment. The message I was supposed to come home with was: we can still count the numbers of mobile viruses manually, <600; the problem will never be the same as on a fixed network as traffic is monitored and metered: We detect it straight away. We are studying the problem seriously. Are mobile operators really prepared for what is coming? more

Domain Name Abuse Is a 4 Letter Word

There has been a lot of back and forth recently in the ICANN world on what constitutes domain abuse; how it should be identified and reported AND how it should be addressed. On one side of the camp, we have people advocating for taking down a domain that has any hint of misbehaviour about it, and on the other side we have those that still feel Registries and Registrars have no responsibility towards a clean domain space. (Although that side of the camp is in steady decline and moving toward the middle ground). more

Freedom of Expression Part 2: Blocking, Filtering and Removing Online Content

The Internet is a catalyst for what has revolutionised and transformed human societies in giving extraordinary access to information that has catapulted development and economic growth. It also comes with threats of exploitation by those who wish to do harm. In Part 1 of these series, we looked at how Twitter banned Graham Linehan for his tweet where we saw that to an extent, it was justifiable under Californian law but that a Judge in the Fiji courts would disagree with. more

IPv6 Security Myth #10: Deploying IPv6 is Too Risky

After a quick break to catch our breath (and read all those IPv6 Security Resources), it's now time to look at our tenth and final IPv6 Security Myth. In many ways this myth is the most important myth to bust. Let's take a look at why... Myth: Deploying IPv6 Makes My Network Less Secure... I can hear you asking "But what about all those security challenges we identified in the other myths?" more

Skype Goes IPO - What Should Service Providers Do?

Last week's news about Skype's planned IPO brings a renewed focus on what constitutes a service provider these days, and perhaps more importantly, what forms the basis for its valuation? We all know how the advent of IP has turned the economics of telephony on its head, and the drivers of value continue to shift from the physical world of network infrastructure to the virtual world of software, the Web and now the cloud.
 more

UN Cybercrime Convention: Time Is Running Out to Address Draft’s Urgent Risks to Human Rights

In two weeks, final negotiations will begin on the UN's proposed Cybercrime Convention, a document which has elicited widespread concern from civil society, industry groups, and some states due to the serious risks it poses to human rights, including privacy and freedom of expression. Since 2022, GPD and other groups, including EFF, Human Rights Watch and Privacy International, have sought to alert stakeholders within the process to the need for substantial revisions... more

Questioning the Illusion of Internet Governance

I confess, I don't get it. Much has been written about the apparent desire by the United Nations, spurred by China, Cuba, and other informationally repressive regimes, to "take control of the Internet." Oddly, the concrete focus of this battle -- now the topic of a Senate resolution! -- is a comparatively trivial if basic part of Net architecture: the domain name system. The spotlight on domain name management is largely a combination of historical accident and the unfortunate assignment of country code domains like .uk and .eu, geographically-grounded codes that give the illusion of government outposts and control in cyberspace. more

Does CAN-SPAM Really Matter?

As a daily and enthusiastic reader of The New York Times, I was disappointed to read their February 1 article on CAN-SPAM entitled, "Law Barring Junk E-Mail Allows a Flood Instead" (subscription required). The theme of the article was, as the title suggests, that enacting CAN-SPAM was worse than having no laws at all. The article really missed the point on several fronts. more

The Internet’s Gilded Age

The rise of the Internet has heralded rapid changes in our society. The opportunities presented by a capable and ubiquitous communications system and a global transportation network have taken some corporations from the multinational to the status of truly global mega-corporation. Good examples of these new corporations include Google, Apple, Amazon, Microsoft and Facebook. There are a handful of large-scale winners in this space and many losers. But this is not the first time we've witnessed a period of rapid technological and social change. more

ALAC on WSIS Declaration of Principles and Plan of Actions

The At Large Advisory Committee (ALAC) has released this statement about the results of the World Summit on Information Society (WSIS). It is circulated for public comment, in view of subsequent statements to be released in the next months. At the World Summit on the Information Society held on December 10 to 12 in Geneva, the member states of the United Nations adopted the Declaration of Principles and the Plan of Action that include specific language on the issue of "Internet Governance". ICANN's At Large Advisory Committee welcomes the fact that these statements clearly recognize the role of civil society as a full participant in the international management of the Internet, and bring attention to the need for a deep involvement of individual users into its governance. more

The ‘Millennium Problems’ in Brand Protection

As the brand protection industry approaches a quarter of a century in age, following the founding of pioneers Envisional and MarkMonitor in 1999, I present an overview of some of the main outstanding issues which are frequently unaddressed or are generally only partially solved by brand protection service providers. I term these the 'Millennium Problems' in reference to the set of unsolved mathematical problems published in 2000 by the Clay Mathematics Institute, and for which significant prizes were offered for solutions. more

Update on China SatNet’s GuoWang Broadband Constellation – Can They Do It?

In 2020, China applied to operate GuoWang, a constellation of 12,992 low-Earth orbit (LEO) broadband Internet satellites, and in 2021, it became clear that it was intended to become China’s global LEO broadband constellation. Can they do it? Maybe, but it will take a long time. China does not have the capacity to launch 12,992 satellites today. I don’t know the mass of their planned satellites, but GuoWang is informally referred to as China’s answer to Starlink. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days