/ Most Viewed

New Wave of Ransomware Spreading Rapidly Through Russia, Ukrain and Other Nations

A new wave of ransomware called "BadRabbit" is targeting Russia and Eastern Europe, affecting Russian Interfax news agency and reported flight delays at Ukraine’s Odessa airport. more

2013 Domain Name Year in Review

Well folks, it's that time of year again. It's time for our countdown of the top 10 biggest domain stories for 2013. And while my predictions from last year were accurate, in that we did see a record number of registry and registrar breaches, I had no idea that this year's biggest story would even appear on the list. So with that said, let's get started. more

China Launches World’s First Underwater Data Center

China has achieved a world first by starting the assembly of an underwater commercial data center off the coast of Sanya, on Hainan Island, according to China Daily. more

SpaceX’s Starlink Service in Cuba Would Benefit the Cuban People, SpaceX and the US

SpaceX has begun the process of securing licenses to operate its Starlink Internet service in the Caribbean. I don't know which nations they are considering, but would advise them to seriously consider Cuba -- Starlink service in Cuba would benefit the Cuban people, SpaceX, and the US. What's in it for Cuba? Fixed home and commercial connectivity in Cuba are limited, slow, and expensive, but they do have shared connectivity... more

Fifth Publication of the UN ICT Task Force Series

The following is the introductory excerpt from the United Nations ICT Task Force's recently published "Internet Governance: A Grand Collaboration". This publication offers a collection of works from the March 2004 meeting. more

Security Costs Money. So - Who Pays?

Computer security costs money. It costs more to develop secure software, and there's an ongoing maintenance cost to patch the remaining holes. Spending more time and money up front will likely result in lesser maintenance costs going forward, but too few companies do that. Besides, even very secure operating systems like Windows 10 and iOS have had security problems and hence require patching. (I just installed iOS 10.3.2 on my phone. It fixed about two dozen security holes.) more

“Globally, Internet Traffic Passes Through 13 Root Servers” (!)

The Times of India recently interviewed India's Minister of State for Communications and IT, Sachin Pilot, on Internet Governance. Titled "'Internet's governance can't be limited to one geography'", the article started off with an amazing assertion by the minister... While this interview is a fairly standard restatement of the position some Governments (including India) have about governmental control of Internet Governance, it is sadly apparent that the minister unfortunately doesn't appear to understand what the root servers are, or how they work. more

Survey: Cloud Computing ‘No Hype’, But Fear of Security and Control Slowing Adoption

Contrary to conventional wisdom, the vast majority of business and IT executives report that cloud computing is a viable technology option that can improve a company's bottom-line results according to a new global survey conducted by an independent market research firm. However, despite growing evidence that cloud-based systems have the potential to lower costs, the majority of companies report no plans to integrate cloud computing in the next 12 months... more

Amazon’s Project Kuiper Successfully Tests Laser-Based Satellite Communication

Amazon's Project Kuiper has confirmed the use of laser-based inter-satellite links (OISL) for its satellite communication system. The technology has undergone successful testing in orbit, with data transmission speeds of 100 gigabits per second (Gbps) over a distance of 621 miles achieved.  more

8 Security Considerations for IPv6 Deployment

Feb. 3, 2011, came and went without much fanfare, but it was a milestone for Internet stakeholders, whether they knew it or not. On that Thursday, the last available IPv4 addresses were allocated by the Internet Assigned Numbers Authority (IANA). Though some Regional Internet Registries (RIRs) have a reasonable inventory of IP addresses that could last another year or two, the days of "new" IPv4 address allocations are largely over. more

Comcast’s Network Management Practices: A Brief Analysis

Late last week, Comcast officially disclosed to the FCC details of its network management practices which have been a subject of considerable discussion here on CircleID. (My thanks to Threat Level from Wired.com for providing a convenient copy of Comcast's "Attachment A" in which this disclosure is made.) There's not a lot of startling disclosure in this document, but it does provide some useful concrete facts and figures. I'll quote the more interesting parts of the document here, and offer comment on it. more

Local “.city” TLDs as an Opportunity for City Portals

One of the most frequently asked question when it comes to the discussion about a city top-level domain ".city" (such as .london, .berlin or .nyc) is what .city means to the already established official city portal (such as London.gov.uk, Berlin.de, NYC.gov or in general City.com). This article contributes to the most important topics in this discussion... The choices at the top-level available to individuals, companies and regional communities is today limited to country codes (such as .de or .fr) and a very few generic endings (such as .com or .info). Individuals and companies in cities can't really identify with Internet addressing and look for ways to circumvent it. For instance, the term "hamburg" is already used in about 50,000 domains such as www.habour-hamburg.de demonstrably showing that they belong to the Hamburg community. The synonym "nyc" can be found in almost 300,000 domains... more

Study Finds 75% of Malicious Websites from Legitimate, Trusted Sources

New report released today finds 75 percent of malicious websites are from legitimate, trusted sources with "Good" reputation scores. According to the report, 60 percent of the top 100 most popular websites either hosted malicious content or contained a masked redirect to lure unsuspecting victims from legitimate sites to malicious sites. more

Three Things TLD Registries Must Know About China’s Domain Name Regulation

Recently there have been a number of news reports/articles that are incorrect or misleading in interpreting China's domain name management policy. James has posted an article aiming to clarify what is going to in China's domain name market. Considering the potential negative impact of those reports on the participants of this market, I supplement James's post by pointing out three things, which I believe critical for any TLD registries that hope to have a better understand of China's domain name regulation and the special action based on it. more

Rage Against the ICANN Machine

I'm going to do what no professional journalist should ever do: take a story at face value. So full disclosure: I have not checked the facts behind the story that sparked this little rant I'm about to embark on. But I've known the author for a number of years as being a consummate professional when it comes to reporting facts. And I've known ICANN, the organisation, for even longer. I have therefore seen first hand the organisation's ability to be at times borderline duplicitous in its attempts to reach a desired result.
 more