Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

DNSSEC Activities at ICANN 57 in Hyderabad on 4-7 November 2016

Friday marks the beginning of the ICANN 57 meeting in Hyderabad, India. As per usual there will be a range of activities related to DNSSEC or DANE. Two of the sessions will be streamed live and will be recorded for later viewing. Here is what is happening. All times below are India Standard Time (IST), which is UTC+05:30. Please do join us for a great set of sessions about how we can work together to make the DNS more secure and trusted! more

In Whose Language? Cybersquatting by Foreigners

There are no gatekeepers to prevent registrants from acquiring domain names incorporating marks that potentially violate third-party rights. Anyone anywhere can acquire domain names composed of words and letters in languages not its own through a registrar whose registration agreement is in the language of the registrant. For example, a Chinese registrant of a domain name incorporating a Norwegian mark as in <statoil.store> in which Complainant requests the proceeding be in English notes that Chinese is not an official language in Norway. more

Registry Lock - or EPP With Two Factor Authentication

For the last couple of years, the most common attack vector against the DNS system is the attack against the registrar. Either the attack is on the software itself using weaknesses in the code that could inject DNS changes into the TLD registry, or social engineering the registrar support systems and the attacker receives credentials that in turn allows the attacker to perform malicious changes in DNS. DNSSEC is the common security mechanism that protects the DNS protocol, but by using the registrar attack, any changes will result in a proper working DNS delegation. more

Domain Name Registration: Not a Technology Service Any More?

It didn't seem to make any headlines, but it is an interesting sign of the Internet times that, effective January 1, 2009 , the United State Patent and Trademark Office ("USPTO") changed the International Classification of "domain name registration services" to Class 45 (defined below). The reason that the move is interesting is that it is just one more indication that the world of the Internet is becoming less and less about technology and more and more about law and policy. more

Trump Orders Cyberattacks by US Companies

It is supremely ironic. A rogue national leader with the stroke of a pen, dictates that its companies will expose a foreign company's end users to cyberattacks. This is the net effect of denying security patches or operating system updates pursuant to Trump's order. In the US Great Rogue Leader's bizarro world, this is the very behavior that he claims makes his actions necessary. In fact, this Trump malware attack is worse because of the mass exposure to exploits. more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Are There Countries Whose Situations Worsened with the Arrival of the Internet?

Are there countries whose situations worsened with the arrival of the internet? I've been arguing that there are lots of examples of countries where technology diffusion has helped democratic institutions deepen. And there are several examples of countries where technology diffusion has been part of the story of rapid democratic transition. But there are no good examples of countries where technology diffusion has been high, and the dictators got nastier as a result. more

Bridging the Gaps: MAAWG, IETF, and BITS Establish Formal Relationships

As announced this morning, the Messaging Anti-Abuse Working Group (MAAWG) has established formal relationships with the Internet Engineering Task Force (IETF) and the BITS/Financial Services Roundtable... It's often said that there are too many different organizations working on the overlapping areas of abuse, trust, and related issues. I believe the collaborative approach MAAWG has chosen will bridge these gaps. more

ICANN Chair Elections Test Its Institutional Integrity

The ICANN Board will soon be considering candidates for election to the position of ICANN Chairperson and Vice Chair, which compels me to remind both the Board and the ICANN community of the fact that one of the members pursuing the Chairmanship is the subject of an on-going Australian Freedom of Information Act, which was initiated by the irregularities that brought about this individuals dismissal from the .au Domain Administration. more

Not World War III - This Time the ICT Revolution

In the past it has been wars and revolutions that created major changes in society. It was only after these events that old ideas, structures and doctrines gave way. And in many countries wars and revolutions are still functioning as a tool for change -- the Arab Revolution and the collapse of the Soviet Empire are good examples of this. But wars and revolutions are disruptive in an economic sense, cost the lives of many people, and necessitate costly rebuilds after the even more

New TLD Applications: What’s the Status of the Next Round?

For many industry participants, the timing around opening the next round of new Top-Level Domain applications has been frustrating, to say the least. However, with the recent ICANN Marrakech meeting now complete, we thought it timely to provide an update for those who may be interested to apply in the next round or for those merely following the journey. more

EURid Releases 74,000 Disputed Names

EURid has unfrozen 74,000 domains that were part of a dispute against domain warehousers. In July, EURid relented to outside pressure as it suspended the registration of 74,000 domains. They claimed these domains were registered directly by three registrars, not on behalf of clients, which violated EURid's terms. But the registrars have won this round... more

Internet Society Posting Updates from ITU Plenipot 2014 in Busan

If you are, like me, not in Busan, South Korea, for the 2014 ITU Plenipotentiary Conference but are curious about what is going on there, my Internet Society colleagues on our public policy team have been posting regular updates to the Internet Society's blog and to the @ISOCPolicy Twitter account... Given that I work in the technology side of Internet Society's work and don't have the cycles to keep up-to-date with everything going on there in Busan, I've found these updates very helpful in understanding some of the major events happening at the ITU Plenipot 2014. more

ICANN Suspends Digital Archery

Today, ICANN announced the temporary suspension of the Digital Archery system. ARI Registry Services applauds this development, as it's a clear signal ICANN is listening, considering and acting upon constructive feedback from the community. We encourage ICANN to not only reassess the Digital Archery system, but also the need to proceed with batching at all. more

Is Defining Broadband by Speed a Good Policy?

I’ve lately been looking at broadband policies that have shaped broadband, and I don’t think there has been any more disastrous FCC policy than the one that defines broadband by speed. This one policy has led to a misallocation of funding and getting broadband to communities that need it. The FCC established the definition of broadband as 25/3 Mbps in 2015, and before then, the definition of broadband was 4/1 Mbps, set a decade earlier. The FCC defines broadband to meet a legal requirement established by Congress and codified in Section 706 of the FCC governing rules. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days