/ Most Viewed

8 Security Considerations for IPv6 Deployment

Feb. 3, 2011, came and went without much fanfare, but it was a milestone for Internet stakeholders, whether they knew it or not. On that Thursday, the last available IPv4 addresses were allocated by the Internet Assigned Numbers Authority (IANA). Though some Regional Internet Registries (RIRs) have a reasonable inventory of IP addresses that could last another year or two, the days of "new" IPv4 address allocations are largely over. more

New Wave of Ransomware Spreading Rapidly Through Russia, Ukrain and Other Nations

A new wave of ransomware called "BadRabbit" is targeting Russia and Eastern Europe, affecting Russian Interfax news agency and reported flight delays at Ukraine’s Odessa airport. more

New Trend: Vanity IPv6 Addresses

It's like a vanity license plate, but for your IP address. Previously under IPv4 DNS registration, users were limited to only using numbers. However, with the height of IPv6 underway users are getting creative with their newfound use of characters. Although you can only use characters A-F, it only takes a little creativity to find ways around this. more

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more

To Serve the Public Interest You First Have to Define ‘Public Interest’

In the ancient parable, six blind men are asked to describe an elephant, with each coming up with wildly different answers, depending on which part of the animal they touched. Now, while I would hesitate to call participants in the ICANN process "blind men," I am starting to think that "public interest" is their elephant. ICANN is on the threshold of completing its first major obligation under the Affirmation of Commitments it signed with the U.S. Government in 2009. more

Fifth Publication of the UN ICT Task Force Series

The following is the introductory excerpt from the United Nations ICT Task Force's recently published "Internet Governance: A Grand Collaboration". This publication offers a collection of works from the March 2004 meeting. more

IMP Continuing Despite Industry Backlash

Back in November 2008 a colleague of mine, Neil Watson (Head of Operations at Entanet International Ltd), published an article on Entanet's opinion blog about the government's proposed plans to centrally store records of all electronic communications throughout the UK. The Interception Modernisation Programme (IMP) will be the largest surveillance system ever created in the UK and calls for a 'live tap' to be placed on every electronic communication in Britain including telephone calls, emails and visited websites. more

Should the Government Prepare a Preemptive Cyber-Attack?

The House Committee on Science recently held a hearing to "examine the extent of U.S. vulnerability to cyber attacks on critical infrastructure such as utility systems, and what the federal government and private sector are doing, and should be doing, to prevent and prepare for such attacks." Specific issues addressed at the hearing included whether: 1) the U.S. is able to detect, respond to, and recover from cyber-attacks on critical infrastructure; and 2) is there a clear line of responsibility within the federal government to deal with cybersecurity... more

Survey: Cloud Computing ‘No Hype’, But Fear of Security and Control Slowing Adoption

Contrary to conventional wisdom, the vast majority of business and IT executives report that cloud computing is a viable technology option that can improve a company's bottom-line results according to a new global survey conducted by an independent market research firm. However, despite growing evidence that cloud-based systems have the potential to lower costs, the majority of companies report no plans to integrate cloud computing in the next 12 months... more

Network Neutrality and the FCC’s Inability to Calibrate Regulation of Convergent Operators

For administrative convenience and not as required by law, the FCC likes to apply an either/or single regulatory classification to convergent operators. Having classified ISPs as information service providers, the Commission unsuccessfully sought to sanction Comcast's meddling with subscribers' peer-to-peer traffic. Now Chairman Genachowski wants to further narrow and nuance regulatory oversight without changing the organic information service classification. more

Time to Play Offense

The United States is under cyber-attack. An article in Time magazine titled "The Invasion of the Chinese Cyberspies" discusses a computer-network security official for Sandia National Laboratories who had been "tirelessly pursuing a group of suspected Chinese cyberspies all over the world." The article notes that the cyberespionage ring, known to US investigators as Titan Rain, has been "penetrating secure computer networks at the country's most sensitive military bases, defense contractors and aerospace companies." more

UDRP Does Not Apply To Bad Faith Domain Name Renewals: Part II

The first part of this article offered background examination on why Uniform Dispute Resolution Policy (UDRP) fails to apply to domain name renewals. Here, in the second part of this two part series, we will examine UDRP further by reviewing cases involving the renewal of domain name registrations. more

Study Finds 75% of Malicious Websites from Legitimate, Trusted Sources

New report released today finds 75 percent of malicious websites are from legitimate, trusted sources with "Good" reputation scores. According to the report, 60 percent of the top 100 most popular websites either hosted malicious content or contained a masked redirect to lure unsuspecting victims from legitimate sites to malicious sites. more

Has Your ISP Been Hacked? (Growing Concern Over AI-Driven Hacking)

As if we didn't have a long enough list of problems to worry about, Lumen researchers at its Black Lotus Labs recently released a blog that said that it knows of three U.S. ISPs and one in India was hacked this summer. Lumen said the hackers took advantage of flaws in software provided by Versa Networks being used to manage wide-area networks. more

CPH TechOps Retrospective 2018

From the perspective of the domain name industry, 2018 was strongly influenced by, among other things, the EU General Data Protection Regulation (GDPR), the Temporary Specification and especially the Expedited Policy Development Process (EPDP). For the Contracted Parties House (CPH) TechOps Group, one year after its foundation, it was a very exciting and intensive time. This initiative was created to tackle technical and operational needs and challenges plus ideally to create best practices. more