Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Dissecting the (Likely) Forthcoming Repeal of the FCC’s Privacy Rulemaking

Last week, the House and Senate both passed a joint resolution that prevent's the new privacy rules from the Federal Communications Commission (FCC) from taking effect; the rules were released by the FCC last November, and would have bound Internet Service Providers (ISPs) in the United States to a set of practices concerning the collection and sharing of data about consumers. The rules were widely heralded by consumer advocates, and several researchers in the computer science community, including myself, played a role in helping to shape aspects of the rules. more

A Climate of Change for the Caribbean Internet

Spring storms with winter qualities clobbered North America this week, threatening Canada with slow-moving storms, and pounding the United States with near-record snowfall in the midwest, low temperatures in the south and tornadoes further east. You could say change was in the air. And although the unseasonable weather didn't reach as far south as Florida, the climate of change still dominated the atmosphere at the fifteenth regional meeting of the Caribbean Network Operators Group (CaribNOG). more

When to Consider ‘Both Sides of the Dot’ in a Domain Name Dispute

In the case, filed by Michelin, the panel found the domain name 'tyre.plus' confusingly similar to the trademark TYREPLUS. Specifically, the panel wrote: "If one ignores the 'dot' between the Second-Level Domain ('tyre') and the Top-Level Domain ('plus'), the mark and the Domain Name are identical..." It's an issue that's arising with increasing frequency -- just as I had predicted. more

Remote Work Demands Encryption

Now that we are all working from home (WFH), the need for encryption must also increase in priority and awareness. Zoom's popular video conferencing solution got in hot water because they promised "end-to-end" encryption but didn't deliver on it - prompting some organizations to ban it from use altogether. Encryption protects confidential information from being exposed in transmission, providing a secure way for the intended recipient to get the information without snooping by others. more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

What Matters in Net Neutrality

It's hard to know what to make of the Google/Verizon deal since until earlier today both companies have denied that there is one. And it's hard to argue about net neutrality because it means so many different things to different people. I've got lots of reading to do to catch up on the newly released set of principles from the companies, but in the meantime here are a few thoughts on the topic. more

A Report on DNS Operations, Analysis, and Research Center (DNS-OARC) 30th Meeting

DNS Operations, Analysis, and Research Center (DNS-OARC) held its 30th meeting in Bangkok on the 12th and 13th May. Here's what attracted my interest from two full days of DNS presentations and conversations, together with a summary of the other material that was presented at this workshop. Some Bad News for DANE (and DNSSEC): For many years the Domain Name X509 certification system, or WebPKI, has been the weak point of Internet security... more

Why Domain Security Is Your First Line of Defense to Mitigate Phishing Attacks

According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more

Why Cancel a Domain Name in a UDRP Case?

While the most common results of a UDRP proceeding are either transfer of a disputed domain name to a complainant or denial (that is, allowing the respondent to retain it), there is another possible outcome: cancellation. I'm always surprised to see a UDRP decision in which a domain name is cancelled. True, many trademark owners don't really want to obtain control of a disputed domain name (and, instead, they simply want to get it taken away from a cybersquatter). more

White Spaces: The NAB vs. Reality

One of Washington's most powerful corporate lobbies is at it again. Raising a dust cloud of lies in a last-ditch effort to stop new technology that could better the lives of millions. For more than five years, now, the television broadcast lobby has tried to deny the American public access to white spaces -- unused airwaves that sit vacant between TV channels. Technology now exists that would tap the near limitless potential of these airwaves and deliver high-speed Internet services to tens of millions of people now left on the wrong side of the digital divide. more

People Should Drive Automation - Not Technology

Service providers have traditionally organised their operations around different technology domains. The responsible teams have been staffed with specialists looking after routing, network services, security and various other functional areas. Over time, organizations like this have had the tendency to transform into loosely tied silos with limited interaction between the different teams. more

A CENTR White Paper on Creating More Standardized and Streamlined Domain Registry Lock Services

CENTR has published a white paper separating registry lock services into two standardized models. This categorization and the included recommendations can help top-level domain registries (re)design their registry lock services. The aim of the paper is to reduce fragmentation in implementation between registries to explain the value of registry lock to domain holders more easily. more

New gTLDs: Are You Rich?

Did you know about these new domain name extensions which focus on wellness, wealth and ego? Well, I listed them and there is an interesting one... which really is unique... Many want to be famous and some industries should have a look at this list of extensions since they are keywords dedicated to very powerful industries: Gold and Diamonds, for example, have their own new gTLD for domain names ending in ".gold" and ".diamonds". more

Paths of Glory: Privacy Still Matters

The world has changed dramatically for the better over the last 15 years, mainly due to the commercialization of the Internet. That is what I would like to believe. Unfortunately, I am no longer sure. True, the Internet connects all of us with every corner of the world... For the rest, the times may be changing, because there are those who believe that the Internet should be molded to fit those same old bureaucracies and corrupted institutions that have plagued humanity for decades, if not centuries. The solution, many times, feels far out of reach. more

Call for Participation – ICANN DNSSEC and Security Workshop at ICANN68 Virtual Policy Forum

If you are interested in speaking at the ICANN 68 DNSSEC Workshop, please send a brief (1-2 sentence) description of your proposed presentation to [email protected] by 29 May 2020. This online workshop will be Monday, 22 June 2020, from 02:00 – 04:30 UTC (10:00 – 12:30 Kuala Lumpur) We are doing something new this time and would like to get a feel for attendance for this virtual meeting. more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days