/ Most Viewed

Business Case for IPv6 - Part 2

In my previous blog on the topic, I stated that the business case supporting the IPv4 roll-out in the late 90s was the Internet. Although IP depletion will slowly become a reality, the chances are that due to mitigating technologies such as NAT and DNS64, it may take quite a while before organizations in the developed economies will get serious about IPv6. So where should we look to find a business case for IPv6? more

Bloomberg on Netflix as World’s Biggest User of Cloud Computing

Netflix is arguable one of the world's biggest users of cloud computing, renting all its computing power from Amazon Web Services, the cloud division of Amazon.com, which runs its own video-streaming service that competes with Netflix. Ashlee Vance from Bloomberg reports. more

ICANN Releases New gTLD Applicant Guidebook ...Would Apple Need Permission from China for .MAC?

The much-anticipated New gTLD Draft Application Guidebook is out! ICANN has released Version 3. Lots of changes, some minor, some large. All worth reading if you're a potential applicant or just interested in the promise of new Top-Level Domains (TLDs). The public comment period clock started October 4, and runs until November 22 of this year. more

Secure Domain Foundation Launched to Help Internet Infrastructure Operators Fight Cybercrime

Experts and companies in the information security industry today announced the formation of the Secure Domain Foundation (SDF), a new, non-profit, community-driven organization devoted to the identification and prevention of Internet cyber crime utilizing the domain name system (DNS). more

Where Every Phisher Knows Your Name

Spear phishing is the unholy love child of email spam and social engineering. It refers to when a message is specifically crafted, using either public or previously stolen information, to fool the recipient into believing that it's legitimate. This personalization is usually fairly general, like mentioning the recipient's employer (easily gleaned from their domain name.) Sometimes they address you by name. Much scarier is when they use more deeply personal information stolen from one of your contacts... more

IPv6: Penny Wise and Pound Foolish

The theory put forward by the IETF was simple enough... while there were still enough IPv4 addresses, use transition technologies to migrate to dual stack and then wean IPv4 off over time. All nice and tidy. The way engineers, myself included, liked it. However those controlling the purse strings had a different idea. more

Are Service Providers Giving Up on Landline too Soon?

Interesting times in the carrier space, for sure. While most readers of this column are focused on the business market, it's hard to ignore what's occurring in the consumer space right now. Being based in Toronto, I happen to be struck by the similar trends shaping on both sides of the border. Over the past few days, we've seen earnings reports from major telcos and cablecos, and these businesses seem to be going in opposite directions. more

Tech Continuity in President Trump’s First 100 Days

Tech developments saw less drama than trade and environmental shifts during Trump's first 100 days. Continuity, not abrupt change, defined his approach to AI and digital regulation. Only 9 of 139 executive orders (EOs) focused on tech. Trump's tech policy emphasised reviews and incremental shifts. Public consultations on AI, cybersecurity, and cryptocurrencies signal steady evolution over upheaval. more

Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation

Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more

ICANN’s Economic Reports: Finding the Missing Pieces to the Puzzle

The ICANN community has been especially concerned about the economic reports used by ICANN to justify its decisions as to whether, and how, to implement applications for new gTLDs. Among the greatest sources of concern has been the failure of ICANN staff to issue a complete public response to the ICANN Board's October 2006 demand that ICANN Staff commission economic studies about gTLDs... more

Foreign Hackers Attack Canadian Government

An unprecedented cyberattack on the Canadian government also targeted Defence Research and Development Canada, making it the third key department compromised by hackers, CBC News has learned. ... While there is no definitive proof, of course, that China was behind these attacks, there is a lot of circumstantial evidence that points in that direction. China (allegedly) has a long history of engaging in espionage activities in order to gain access to information. In the United States, this is sometimes referred to as cyber warfare, but I think that cyber espionage is a better choice of terms. more

1,000th /22 Allocated from Last /8

On 14 September 2012, the RIPE NCC began allocating IPv4 address space from the last /8 we received from the Internet Assigned Numbers Authority (IANA). Nobody was entirely sure what would happen when we reached this point. Would there be a "run on the bank" for this final block of addresses? more

Day 30: Kaminsky DNS Bug Disclosure

In a highly anticipated presentation, Internet security researcher Dan Kaminsky today gave details of the much talked about Domain Name System (DNS) vulnerability issue which has been intensely covered since it was publicly announced a month ago on Jul 8th. Although original plans entailed keeping the bug details undisclosed for 30 days in order to allow for necessary security patches to be implemented around the world, details of the bug were eventually leaked-and-confirmed 13 days after its public announcement. Even so, just hours ago in jam-packed ballroom during the Black Hat conference, Kaminsky delivered his 100-plus-slide presentation detailing the DNS flaw that, if exploited, could potentially "destroy the Web". more

Partnerships Can Enhance Security in Connected Health and Beyond

Like the poetic prose of Bob Dylan, the reality of modern technology cannot be ignored: "the times they are a-changin'." Transitioning from the novelty of the Internet, society is embracing connected technology as the new digital frontier. Dominated by the Internet of Things ("IoT"), the future will be one of increased interconnection of wireless and computing devices in everyday objects, allowing these devices to send and receive personal data. IoT's limits appear boundless, extending from physical devices and home appliances to vehicles and medical implants. more

.BANK Launches With a Bang

The 30-day .BANK Sunrise Period just concluded this week and is notable for several reasons. The .BANK TLD is highly restricted to members of the banking industry. The .BANK Registry (which also has rights to .INSURANCE, launching this fall), was founded by 24 companies and organizations from the banking and insurance industries, The Registry's founders include industry leaders such as the American Banking Association, Citigroup, Dollar Bank, Independent Community Bankers of America, JPMorgan, Visa and Wells Fargo. more