Colonial Pipeline, which accounts for close to half of the United States East Coast's fuel, has shut down its operations due to a cyberattack. The incident, believed to be the largest successful cyberattack on oil infrastructure in the U.S., was disclosed over the weekend. more
Akamai's Fourth Quarter, 2017 State of the Internet, was released today in which it states that the analysis of more than 7.3 trillion bot requests per month has found a sharp increase in the threat of credential abuse, with more than 40 percent of login attempts being malicious. more
The DNSSEC is a security protocol for providing cryptographic assurance (i.e. using the public key cryptography digital signature technology) to the data retrieved from the DNS distributed database (RFC4033). DNSSEC deployment at the root is said to be subject to politics, but there is seldom detailed discussion about this "DNS root signing" politics. Actually, DNSSEC deployment requires more than signing the DNS root zone data; it also involves secure delegations from the root to the TLDs, and DNSSEC deployment by TLD administrations (I omit other participants involvement as my focus is policy around the DNS root). There is a dose of naivety in the idea of detailing the political aspects of the DNS root, but I volunteer! My perspective is an interested observer. more
For years, corporate domain name administrators have scoffed at every new second-level and third-level country code Top-Level Domain (ccTLD) liberalization, and rightly so. Until recently, most had continued the practice of registering significant numbers of variations, misspellings and typo-squats. While I have never encouraged the practice of registering every variation in every geography, as this becomes prohibitively expensive over time... With what seems to be the imminent launch of hundreds of new TLDs as a result of ICANN's new initiative, companies appear to be saying enough is enough, and meaning it. more
There have been quite a number of recent articles about various IPv6 issues. Thus the question: how far along is the actual IPv6 deployment? This is a quick-and-dirty survey that focuses mainly on the content provider side. What domains were surveyed? Alexa offers country depended TopSites listings. Domains listed are frequently visited by users from that country, not necessarily hosted there... more
The Federal Communications Commission (FCC) today approved, in a 5-0 unanimous vote, the plan to open up unused, unlicensed portions of TV white space spectrum for wireless applications and devices. However, to prevent interference, FCC has also placed some "rigorous certification process" which device offered by a technology company for use on the white spaces will have to go through. more
It's not been the best of years for ICANN. Leaving aside for a few seconds the controversy about xxx, and the allegations of improper behavior about the .Net assignment, ICANN has had a lot to deal with. The troubles began with the UN Working Group on Internet Governance hell bent on fixing ICANN, even though ICANN says nothing is broke. That trouble remains and isn't likely to go away for some time. And then, just when it seemed that the UN and ITU was the cause of all ICANN's problems, the old ally, US Government's DOC, decided that it was going to be in charge of ICANN. ...This could be the beginnings of a distinct change where the centralized DNS as we know it gradually gives way to some next generation structure which is far more decentralized. The coming 12 months may see some significant changes in this area. more
New domain names are now on the market and you start to realize that you may have missed the train by not submitting your own new gTLD application. So why not get your part of the cake and consider applying for your own new Top-Level Domain in the second Round of the ICANN new gTLD program? Why not become a "Registry" and sell domain names... to the world? more
Now that we're 20 years past TN 2.0, well into the 21st century, and onto the 3rd generation of the web; it is about time we move telephone numbers into the Internet age. They are still managed as if they all connect to four copper wires. We manage to the lowest common denominator rather than acknowledging the power of mobility and Internet technology. more
Interisle Consulting Group today released its fourth annual Phishing Landscape report investigating where and how cybercriminals acquire naming and hosting resources for phishing. Our study shows that cybercriminals evolved their tactics for obtaining attack resources, including sharply increasing their exploitation of subdomain and gateway providers. more
With so many new gTLDs moving into their respective general availability periods, and incidents of cybersquatting beginning to appear, many companies are now looking towards the URS (Uniform Rapid Suspension) as a possible solution for quickly remediating abuse. As a reminder, domains that are the subject of a successful URS ruling are suspended for the remainder of the registration term, or can be renewed for an additional year at the current registrar. more
Iran's political filtering during the recent 2009 presidential campaign and the role of the Internet in the post-election turmoil has brought a heightened level of attention to the country's Internet filtering system. According to a status report just updated by the OpenNet Initiative, the Internet censorship system in Iran has become one of the most comprehensive and sophisticated in the world. Iran and China are the only countries that aggressively filter the Internet using their own technology. Iran's aggressive filtering measures "have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies," says OpenNet. more
In a June court ruling, domainer Navigation Catalyst and registrar Basic Fusion lost a cybersquatting lawsuit to Verizon... This is an extremely interesting and potentially precedent-setting case regarding domaining and domain name tasting. The court condemns both practices, leading to a preliminary injunction against the domainer and its registrar based on the Anti-Cybersquatting Consumer Protection Act (ACPA). As far as I can recall, this is the first time that a domainer has lost an ACPA lawsuit in court, and it provides an important data point confirming that domaining can be cybersquatting (a previously unresolved issue)... more
In the second part of this 3-part series article, the issue of UDRP in proving bad-faith domain registrations is examined with respect to the trademark's characteristics. The first part of this article can be found here. In assessing whether there is a passive holding of a domain name, panels look carefully into the trademark's characteristics in question, namely what is the degree of reputation and distinctiveness of the trademark in question. more
Email is a complex service and email abuse adds confusing deceptions. Worse, like postal mail and even telephone service, Internet mail is inherently open, flexible and even anonymous, making things much easier for abusers. Bad actors hide their true identity and their true purpose. Most other communication tools for users also are also quite open, and problems with email are being replicated elsewhere, such as instant messaging and social media. more