/ Most Viewed

The Growth of DNS-OARC Highlights Great Strides in DNS Research

This past weekend several of my Dyn colleagues and I attended the DNS-OARC annual meeting and fall workshop in Montreal. "OARC" in the organization's title stands for "Operations, Analysis and Research Center". DNS-OARC was founded by the Internet Systems Consortium (best known as the maintainers of the BIND DNS software) in 2004 to address a gap in the DNS community. Engineers working to extend the DNS protocol itself have always had a home in the Internet Engineering Task Force (IETF), but there was no corresponding community for those who operated DNS infrastructure and did research using data gleaned from DNS operations. more

DNS: The Proven, Eco-Friendly Alternative to Blockchain and NFTs

As the world races towards digital transformation, the technologies we choose will have a lasting impact on our planet. Blockchain, NFTs, and other crypto assets have garnered much attention for their ability to securely and immutably store records. However, the environmental cost of maintaining these technologies is often overlooked. The energy consumption required to sustain blockchains, particularly those using Proof of Work (PoW), is enormous... more

Luddites of the 21st Century Unite, Revisited

Some years ago I wrote a post on the fact that I saw the world automate fast and did not see a lot of people worrying about the consequences for their lives. Nobody was smashing automated production lines. Smashing smartphones and laptops. In fact, embrace of new technology by the masses probably never before in history went this fast. Several and very different causes, including globalization, have led to a level of wealth that made these expensive tools and toys within reach of a vast number of people. more

The US-China Cold War in Cyberspace

In 2019 and 2020, the economic conflict between the US and China reached a peak. There was a months-long tariff battle that is still not fully resolved. After blocking Chinese-centered equipment manufacturer Huawei from its own markets, the US pushed hard to get the Five Eyes and all of its allies to block Huawei from foreign markets, too. Then the US started blocking its own companies... more

Lead With Privacy and Customers Will Follow

From high-profile data breaches to increasingly sophisticated tracking systems, the issue of consumer privacy is earning a lot of headlines these days. To better protect their personal privacy, many consumers are taking matters into their own hands. A Forrester Consulting survey revealed that one-third of consumers polled admitted to using do-not-track tools and ad blockers to protect their online privacy, while another 25 percent have cancelled at least one online transaction after reading the seller's privacy policy. more

Japan Developing Distinctive Anti-Cyberattack Virus

The Japanese Defense Ministry is creating a computer virus capable of tracking, identifying and disabling sources of cyberattacks, according to reports. The development of the virtual cyberweapon was launched in 2008. Since then, the weapon has been tested in a closed network environment. "The most distinctive feature of the new virus is its ability to trace cyber-attack sources. It can identify not only the immediate source of attack, but also all "springboard" computers used to transmit the virus." more

Phishers Using New Web-Based Technique ‘In-Session Phishing’ to Steal User Data, Researchers Warn

Security researchers have identified a new phishing attack method designed to trick users into surrendering confidential information after they have logged on to an online banking, brokerage, or other sensitive website. The technique, called In Session Phishing, can be used to inject into all major browsers legitimate looking Pop Up messages using malicious JavaScript that request passwords, account numbers, etc., on behalf of the trusted website. more

Pinpointing Urban Broadband Gaps

The City of Chicago asked some researchers at the University of Chicago for help to identify the neighborhoods and the number of households that are not connected to broadband. It's been well known that large numbers of people in cities don't have broadband, but there have been no easy ways to pinpoint where solutions are needed. more

Where Do You Start to Mitigate the Latest Destruction-Motivated Cyber Threats?

With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more

The Early History of Usenet, Part II: Hardware and Economics

There was a planning meeting for what became Usenet at Duke CS. We knew three things, and three things only: we wanted something that could be used locally for administrative messages, we wanted a networked system, and we would use uucp for intersite communication. This last decision was more or less by default: there were no other possibilities available to us or to most other sites that ran standard Unix. Furthermore, all you needed to run uucp was a single dial-up modem port. more

US, India Sign Cybersecurity Agreement

The United States and India signed a Memorandum of Understanding (MOU) today to promote closer cooperation and the timely exchange of information between the organizations of their respective governments responsible for cybersecurity, according to U.S. Department of Homeland Security. "The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology." more

IGF 2015 Tackling the Next Billion Online Challenge

Just two weeks ago, the United Nations hosted the Sustainable Development Summit (SDS) where the international community embraced a new global agenda. I was very pleased that ICTs were recognized as a crucial platform for the implementation of this agenda, which sets an ambitious goal to "significantly increase access to information and communications technology and strive to provide universal and affordable access to the Internet in least developed countries by 2020" (paragraph 9c of the text for the new Sustainable Development Goals). more

AFRINIC Partners With ICANN on AFRICA DNS Business Exchange Programme

A series of internships have been set up to facilitate capacity building for registrars and registries in Africa to boost the African domain name business. Launched by ICANN in partnership with AFRINIC, the first phase of the DNS Business Exchange Programme involved interns selected from ICANN accredited registrars. more

The Early History of Usenet, Part III: File Format

When we set out to design the over-the-wire file format, we were certain of one thing: we wouldn't get it perfectly right. That led to our first decision: the very first character of the transmitted file would be the letter "A" for the version. Why not a number on the first line, including perhaps a decimal point? If we ever considered that, I have no recollection of it. more

IANA Transition is Just the Beginning

The transition of the Internet Assigned Numbers Authority (IANA) functions is finally in the history books. After almost two years of working groups and multiple rounds of meetings, most of us want to take a long vacation and never hear the acronym "IANA" again. However, the transition is just the beginning. Now is the time for the multistakeholder community to exercise its new authorities and responsibilities to ensure ICANN remains accountable to every internet user. more