/ Most Viewed

Cycling Legend Greg LeMond Sues Cybersquatters Upward of $6.6 Million

A federal restraining order has been issued against a father and son accused of registering several domain names based on cycling legend Greg LeMond's name and his company. more

French Acquire the .Best New gTLD - Interview with the New Owner

This is an interview with Cyril Fremont, the first French entrepreneur to have acquired a new generic Top-Level Domain (gTLD). We long waited for innovation in the new gTLD industry and reading between the lines of this interview, one will understand that the reason behind this acquisition is "not" to sell domain names - the way registries do it in 2018. If ".Best" domains remain open to all here, this registry is planning to create innovative projects that will be launched in the near future with some possibly big surprises. more

Petya Ransomware Spreading Rapidly Worldwide, Effecting Banks, Telecom, Businesses, Power Companies

A large scale ransomware attack today is spreading rapidly worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins. more

Developing Internet of Things Building Blocks


The Internet is undergoing an evolutionary transformation resulting from the explosive growth of things that are interconnected. From single purpose sensors through wearable technologies to sophisticated computing devices, we are creating, exchanging, and consuming more data at rates that would have been inconceivable just a decade ago. The market suggests the average consumer believes this is the best world possible. As technologists, we have a responsibility to consider if we are building an Internet that is in the best interest of the user. more

Research Detects Spammers Using Fake URL-Shortening Services

New research has uncovered evidence of spammers establishing their own fake URL-shortening services for the first time. According to the latest MessageLabs Intelligence report, shortened links created on these fake URL-shortening sites are not included directly in spam messages; instead, the spam emails contain shortened URLs created on legitimate URL-shortening sites. "Rather than leading directly to the spammer's final Web site, these links actually point to a shortened URL on the spammer's fake URL-shortening Web site, which in turn redirects to the spammer's final Web site." more

The Internet And Open Architecture: Determining How To Replace ICANN

"Forms grow out of principles and operate to continue the principles they grow from."
Thomas Paine, "The Rights of Man"

The debate over what management structure is needed to transform ICANN has moved from "Foreign Affairs" and some online discussions to the halls of Oxford University. Last week there was a one day event at Oxford on how to transform ICANN. There was also a meeting in Berlin on these issues. The coverage of these is limited to the few online publications that can afford to send reporters. more

The End of the (IPv4) World is Nigher!

Funny how some topics seem sit on a quiet back burner for years, and then all of a sudden become matters of relatively intense attention. Over the past few weeks we've seen a number of pronouncements on the imminent exhaustion of the IP version 4 address pools. Not only have some of the Regional Internet Registries (RIRs) and some national registry bodies made public statements on the topic, we've now seen ICANN also make its pronouncement on this topic... Why the sudden uptake of interest in this topic? I suspect that a small part of this may be my fault! more

.EU TLD Comes Closer Than Ever to Becoming a Reality

With much awaited fanfare, .EU is inching ever closer to becoming real! I am a bit reluctant to say it is actually here until the gates are actually open, but I can imagine that there are many who are grateful as I am that the process has gotten as far as it has. On March 23rd, 2005, ICANN announced that they had approved an agreement earlier that week with EURid to have .eu added to the root zone... more

WIPO Taking Screenshots of Filed UDRPs

Michael Berkens reporting in TheDomains.com: "WIPO has been taking Screenshots of whatever is on a domain name as soon as a UDRP Is filed and they have been furnishing the screenshot to the UDRP panel who has been taking the screenshot into account as evidence in making their determination... Mr. Berryhill has been working behind the scenes to confirm that WIPO has in fact has been taking a screenshot of the domain name upon receipt of a UDRP complaint and furnishing it to the panel without the knowledge of the domain holder and of course has been telling WIPO why its just plain wrong." more

Blockchain, Cryptocurrency Channels Considered by European Interests to Bypass U.S. Sanctions

Bitcoin's unreal hype has obscured that it is mostly used to facilitate drug deals, ransomware, tax evasion, and even the occasional murder for hire. After the 60% price drop, demand for bitcoin mining gear has fallen so much TSMC has to lower sales estimates for 2018... Now, Austrian Ambassador in Tehran Stefan Scholz has suggested it could be a powerful boost to the European intent to bypass the U.S. economic blockade. That could provide demand for $billions of bitcoins. more

DNS Platforms: A Study in Capacity and Scalability

Capacity and scalability are necessary in managing DNSSEC and D/DoS. Capacity, necessary for maintaining operations during D/DoS attacks, is also necessary for increased traffic due to DNSSEC deployment. Scalability is highly important, as DNSSEC is deployed not only will greater traffic levels will be encountered, greater demand will be placed on the DNS platform. In the interest of understanding both capacity and scalability CommunityDNS conducted tests to assess the readiness of the two main DNS server platforms, BIND and NSD... more

Person to Person Security and Privacy Infringement

IT security strategies invariably focus on maintaining impenetrable fortresses around computers and network systems. Firewalls, virtual private networks and anti-virus programs are the tools IT engineers use to create their digital security. Sophisticated defense systems can be very effective at keeping the obvious attackers at bay, yet they often create a false sense of security because the real attacks, the kind that inflict irreparable damage on a system or network, avoid the obvious routes into the secure fortress. more

Simple Overview of ICANN and the IANA Transition by Vint Cerf

Google has released a Doodle Video Animation of its VP and Chief Internet Evangelist, Vint Cerf, explaining inner workings of the Internet, formation of ICANN and the IANA transition. more

Reverse Domain Name Hijacking Found Where Complainant’s Rights Were of Narrow Geographic Scope

Complainant sells RV parts and accessories in the eastern part of Tennessee. Respondent, no stranger to UDRP proceedings, registers domain names and sets up pages with pay-per-click ads related to the subject of the words in the domain name. Though Complainant had been operating on the web since mid-2004, which is the same year it incorporated, it claimed that its predecessor in interest had been using the ADVENTURERV trademark since 1989. more

Enhanced Cooperation in Internet Governance: From Mystery to Clarity?

After three days of intensive discussion the UNCSTD Working Group on Enhanced Cooperation (WGEC) ended its second meeting last week in Geneva. It discussed the results of a questionnaire, which was send out after the 1st meeting of the WGEC (May 2013) and agreed on procedures how to move forward. The WGEC has to report to the forthcoming UNCSTD meeting in May 2014 in Geneva. more