Featured Blogs

Latest

A Look at Closed vs. Open New gTLDs

The essay analyzes some of the strengths and weaknesses of closed and open new gTLDs. The success of the gTLD to a large degree rests on the successful design and implementation of an effective digital business model. A closed gTLD is one whose owner uses it for exclusive content - for example, the use of .book exclusively for Amazon books. Conversely, if Amazon opens up .book, other book sellers and libraries would be able to set up sub-domains, sites where they controlled content. more

What’s Up With WEIRDS?

The IETF WEIRDS working group is defining a follow-on to WHOIS. Since this is the IETF, it's working on the technical issues about which it can deal with, not policy which is up to ICANN and the country registries. Somewhat to my surprise, the group is making steady progress. We've agreed that the basic model is RESTful, with queries via http, and responses as JSON data structures. The protocol is named RDAP for Registration Data Access Protocol, or maybe RESTful Data Access protocol. more

Providers Eye OTT Content at The Independent Show 2013

The future of broadband was the main focus of The Independent Show 2013. In particular, the event highlighted how the convergence of video, phone, Internet, and wireless broadband is shaping the industry. As with previous years, the show focused strongly on the programming community and there was no shortage of new, emerging programming to keep attendees interested. One of the breakout sessions focused on the growth of high-quality over-the-top (OTT) content distribution and how NCTC members could take advantage of this trend to target subscribers drifting away from traditional cable. more

When an IP Address Does Not Equal Individual Culpability - Breaking Glass Pictures v Does, DAZ 2013

Something bad happens online. I can tie that something-bad back to an IP address. Do I know who did the bad thing? According to the Federal District Court in Arizona, I don't. An IP address may identify the owner of an Internet access account; it does not identify who was online at that particular time and who may be responsible for the actions in question. In Breaking Glass Pictures v Does, DAZ 2013, Plaintiff brought a claim for copyright infringement, wants early discovery, but the court is refusing. more

New gTLD SSR-2: Exploratory Consumer Impact Analysis (Part 5 of 5)

Throughout this series of blog posts we've discussed a number of issues related to security, stability, and resilience of the DNS ecosystem, particularly as we approach the rollout of new gTLDs. Additionally, we highlighted a number of issues that we believe are outstanding and need to be resolved before the safe introduction of new gTLDs can occur - and we tried to provide some context as to why, all the while continuously highlighting that nearly all of these unresolved recommendations came from parties in addition to Verisign over the last several years. more

The Long Gestation and Afterlife of New gTLDs

ICANN continues to flail, pointlessly. The latest in a series of missteps that could easily have been avoided is its recommendations on what to do about a report on the potential for confusion and misaddressing when someone's internal network names match the name for a new gTLD, and they have misconfigured their routers and/or DNS to the extent that someone typing in a new gTLD name might end up in the middle of someone else's network. more

Network Security: How Attackers Gain Access from Inside

Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more

Singular and Plural New gTLDs: Costly Headaches

ICANN has recently stated that it will allow the public to register plural and singular gTLDs that are variants of words already registered as domain names. .Books will be able to join the currently allocated .book, and .pet will be able to join .pets. Of course, a pair like .blue and .blues, two words that look alike but have different meanings, isn't at issue here. The focus is just plurals and singulars. But that leaves plenty of room for trouble, and ICANN has to tackle some tough questions now, before the policy launch. more

The Sexist Men In Tech Need to Grow Up, Now

These days, I've seen many breathless posts about how 'we' "need" to encourage girls to study math so eventually they become computer or other sorts of geeks. Personally, I don't think technology is the only valuable thing in the world; writing, music, and the rest of the arts, medicine, human relations, politics, and so on are pretty important things too, and let's face it content was, is, and will always be king. That said if men continue to act like jerks, it is no wonder women will go into anything but technology. more

How Safe is FttH?

My blog 'What PRISM, credit card hacking and Chromecast have to do with FttH' led to some very interesting discussions all around the world. One of issues that was discussed was that the sheer capacity of FttH will also allow hackers, criminals and others to use that massive capacity for the wrong reasons. Its volume will make it increasingly difficult to police. more

Internet Society Launches Questionnaire on Multistakeholder Participation in Internet Governance

The Internet Society today announced the launch of a survey to gain greater insights into multistakeholder governance perceptions and processes at all levels - national, regional, and international. The questionnaire is open to all interested participants and is available until 30 September 2013. The survey is one component of the Internet Society's broader initiative focused on the open and sustainable Internet. more

ICANN 47: Policy Debates and Cautious Optimism

A strange feeling came over me after I got home from ICANN 47 in Durban, something I haven't felt after an ICANN meeting before. The feeling? Optimism. I'm optimistic, albeit cautiously so, about the future of ICANN and by extension, hopefully that of Internet governance in general. If the meeting in Durban is any indication, we've come a long way in the past year. There were no indicted war criminals invited to dinner. And though it may be too soon to say for sure, I don't think a letter will be sent to the government of South Africa about the quality of the hotel. more

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more

Polish CERT Polska and NASK Pull the Plug On .pl TLD On Malicious Registrar, Domain Silver

Today we publish an overview of domains registered through Domain Silver, Inc, a registrar operating in the .pl domain. This Registrar started operating in May 2012. Since that time, the CERT Polska team started to observe a large increase in the amount of malicious domains registered in .pl and to receive many complaints concerning domains registered through Domain Silver. more

NXDOMAINS, SSAC’s SAC045, and New gTLDs (Part 4 of 5)

In 2010, ICANN's Security and Stability Advisory Committee (SSAC) published SAC045 [PDF], a report calling attention to particular problems that may arise should a new gTLD applicant use a string that has been seen with measureable (and meaningful) frequency in queries for resolution by the root system. The queries to which they referred involved invalid Top-Level Domain (TLD) queries (i.e., non-delegated strings) at the root level of DNS, queries which elicit responses commonly referred to as Name Error, or NXDomain, responses from root name servers. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days