/ Most Viewed

Is the New Top-Level Domains “Technical Issue” a Harbinger of Future gTLD Issues?

Does the "technical issue" announced today in ICANN's TLD Application System (TAS) and the subsequent extension of the submission deadline call into question the stability and integrity of the new gTLD program? This development underscores the notion that ICANN could consider a more metered and staged approach to the introduction of gTLDs... more

Russian Cyberattack Disrupts Operations at Japan’s Largest Maritime Port: Global Threat Intensifies

Japan's largest maritime port, the Port of Nagoya, suffered significant disruption due to a cyberattack, allegedly by the Russian group Lockbit 3.0. The attack, involving ransomware that locks systems until a payment is made, resulted in a terminal outage on Tuesday, with operations expected to resume Thursday. more

Fragment or Not Fragment – Is This the Question? Will the “One World-One Internet” Survive Today’s Geopolitical Stress Tests?

In today's world, it has become axiomatic that drastic change can occur overnight. One of those cherished concepts at risk is the idea of "One World – One Internet." In the wake of the war in Ukraine, the geopolitical tensions on the existing Internet have increased. If the "One Internet" will survive the 2020s is increasingly an open question, as good, bad, and not-very-helpful intentions strive to pull it apart. more

Google Voice: Race to the Bottom for Telephony - or Something Else?

Just when you thought making phone calls couldn't get any cheaper, along comes last week's news from Google about their latest iteration of Google Voice. There have been several steps along the way for Google to get to this point, and there are a host of reasons why this news is of interest to service providers of all stripes. I often write about how certain technologies and disruptive forces change the business of being a service provider, and this is but the latest example. more

Blockchain Technology Can Solve Some of Africa’s Problems

Lately, the word blockchain is gaining a lot of attention from businesses, investors and governments, especially around how it could transform how we do business today. As the world looks up to Blockchain technology for radical transformations in many industries and sectors, I want to take a look at how it could help governance in Africa.
The African continent is plagued with corruption, bad governance, mismanagement and lack of accountability. more

DNSSEC and DNS over TLS

The APNIC Blog has recently published a very interesting article by Willem Toorop of NLnet Labs on the relationship between Security Extensions for the DNS (DNSSEC) and DNS over Transport Layer Security. Willem is probably being deliberately provocative in claiming that "DoT could realistically become a viable replacement for DNSSEC." If provoking a reaction was indeed Willem's intention, then he has succeeded for me, as it has prompted this reaction. more

ICANN.WTF? FTC & OCA Asked Whether .SUCKS is a Law Breaker (Part II)

The first part of this article reviewed the actions taken by ICANN in response to a March 27th letter from the Intellectual Property Constituency (IPC) alleging that the pricing of Trademark Clearinghouse (TMCH) registered terms by the .Sucks registry were "predatory, exploitative and coercive" and requesting that ICANN halt the registry's rollout. This second part explores additional ramifications of ICANN's decision to request two national regulators to review the legality of the registry's operation. more

Where Every Phisher Knows Your Name

Spear phishing is the unholy love child of email spam and social engineering. It refers to when a message is specifically crafted, using either public or previously stolen information, to fool the recipient into believing that it's legitimate. This personalization is usually fairly general, like mentioning the recipient's employer (easily gleaned from their domain name.) Sometimes they address you by name. Much scarier is when they use more deeply personal information stolen from one of your contacts... more

More on the Front Running Class Action Suit

Several people pointed out that although the suit still hasn't appeared in PACER, copies of the complaint are available online, including this one [PDF] at Lextext. Having read it, I'm rather underwhelmed... I do not purport to be a lawyer (nor do I usually play one on the net), but it's hard to see how the facts, which are not in serious dispute, would support any of these charges. more

97% of All Global 2000 Companies at Risk from SAD DNS Attack

There is a new threat in town known as "SAD DNS" that allows attackers to redirect traffic, putting companies at risk of phishing, data breach, reputation damage, and revenue loss. What is SAD DNS? No, it isn't the domain name system (DNS) feeling moody, but an acronym for a new-found threat -- "Side-channel AttackeD DNS" discovered by researchers that could revive DNS cache poisoning attacks. more

Bloomberg on Netflix as World’s Biggest User of Cloud Computing

Netflix is arguable one of the world's biggest users of cloud computing, renting all its computing power from Amazon Web Services, the cloud division of Amazon.com, which runs its own video-streaming service that competes with Netflix. Ashlee Vance from Bloomberg reports. more

Foreign Hackers Attack Canadian Government

An unprecedented cyberattack on the Canadian government also targeted Defence Research and Development Canada, making it the third key department compromised by hackers, CBC News has learned. ... While there is no definitive proof, of course, that China was behind these attacks, there is a lot of circumstantial evidence that points in that direction. China (allegedly) has a long history of engaging in espionage activities in order to gain access to information. In the United States, this is sometimes referred to as cyber warfare, but I think that cyber espionage is a better choice of terms. more

66 Percent of Mobile Device Connections Will be IPv6 Capable by 2020, Says Cisco Report

IPv6 traffic is expected to reach 54 percent of total mobile data traffic, up from 13 percent in 2015, according to Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast, 2015-2020 which has since being updated with additional study. The report also predicts by 2020, 66 percent of mobile devices/connections will be IPv6-capable - up from 36 percent in 2015. more

The Spamhaus Distributed Denial of Service - How Big a Deal Was It?

If you haven't been reading the news of late, venerable anti-spam service Spamhaus has been the target of a sustained, record-setting Distributed Denial-of-Service (DDoS) attack over the past couple of weeks... Of course, bad guys are always mad at Spamhaus, and so they had a pretty robust set-up to begin with, but whoever was behind this attack was able to muster some huge resources, heretofore never seen in intensity, and it had some impact, on the Spamhaus website, and to a limited degree, on the behind-the-scenes services that Spamhaus uses to distribute their data to their customers. more

Recent Enhancements to ARIN’s whoIS-RWS Service

ARIN deployed a series of enhancements to its Whois-RWS service today. This includes enabling CIDR support and IPv6 lookups in the search box on the web page, provided plain text rendering of lists of ASNs and networks on the web - plus enhanced CIDR query matching on WHOIS port 43. more