/ Most Viewed

Kudos to ccTLD Registries for Taking Measures to Improve Security

When I first wrote about Domain Registry Locking over a year and a half ago, Verisign was the only Registry offering a true Registry Lock Service. Of course, not long after, Neustar announced their Registry Lock Service too. Recently however, a number of ccTLD Registries have also adopted Registry Locking programs... more

DNSSEC Deployment Among ISPs: The Why, How, and What

It's no secret that Comcast has been leading the charge of DNSSEC deployment among ISPs. For the past couple years, Comcast has been testing and pushing for the widespread adoption of DNSSEC. In the spirit of increasing adoption, I thought I would interview the DNS gurus at Comcast to see what they've learned and what advice they would give other ISPs considering DNSSEC deployment. more

Nearly 1 Million IP Addresses Used by Attackers on a Single Target

According to a recent report by Akamai, an analysis of massive Account Takeover (ATO) attack campaigns, targeting two of its customers, revealed 1,127,818 different IPs were involved in the attacks. more

From Toad to Princess - New TLDs Are No Magical Wand in the Kingdom of Search Engines

Google has posted details on Ranking of new gTLDs (new gTLDs) in search. John Mueller, Webmaster Trends Analyst, said that new gTLD's will be treated the same as other gTLD's such as .com. He stated: "Overall, our systems treat new gTLDs like other gTLDs (like .com & .org). Keywords in a TLD do not give any advantage or disadvantage in search." The ambiguous use of the word "overall" in the statement, may leave some doubt as to whether the 600 .brands -- new domain extensions operated by brand owners -- are included or excluded in any VIP search ranking treatment. more

Welcome to Notflix! Your Streaming-Free ISP with the Best Quality of Experience!

It has been widely taken as "obvious" that a "no blocking" rule for ISPs is a good regulatory policy. Is this really the case? Does it save consumers from harm... or cause harm? Netflix has reached the point of being well over 30% of Internet traffic at peak time for some ISPs. This places three costs on the ISP and its users... So for someone who isn't a streaming video user, they are paying a share of the direct costs. more

Graph Shows Decline of IPv4 Has Been Mostly Linear

As the free pool of IPv4 addresses reaches its end, we looked at the evolution of the amount of unassigned IPv4 address space over time. By 'unassigned', we mean address space not yet allocated to a Local Internet Registry (LIR) or assigned to an end user. LIRs are typically Internet Service Providers or enterprises operating an IP network. See our findings in the graph below... more

Quintessential and Other Acts of Bad Faith in Acquiring Domain Names

There are two essential differences between the Uniform Dispute Resolution Policy (UDRP) and the Anti-Cybersquatting Consumer Protection Act (ACPA), one procedural and one substantive. The procedural difference is quite minor, a mere quirk that Panels adopted by consensus in the early days of the UDRP and deserves no more than a footnote. Under the UDRP, complainants have standing on proof that they have trademark rights when they file their complaints... more

Turning the Tide of Online Scams: Interview With Prof. Jorij Abraham, Global Anti-Scam Alliance

Professor Jorij Abraham has been a part of the international eCommerce community since 1997. From 2013 -- 2017, he has been Director of Research & Advise at Thuiswinkel.org (the Dutch Ecommerce Association) and the European Ecommerce Association with 25.000+ members in 20 countries. He is now Managing Director of Global Anti-Scam Alliance, whose mission is to protect consumers from getting scammed. He is also e-commerce professor at the University of Applied Sciences, TIO. more

Dot-XXX and Tiered/Differential Pricing: Permitted?

As folks will recall, there was a big debate about tiered/differential pricing in the .biz/info/org contracts. Eventually those contracts were amended to prevent that. However, if folks read the .XXX proposed contractv [PDF], Appendix S, Part 2, under "delegated authority" (page 66 of the PDF), appears to give the Registry Operator total control to make policy regarding pricing. Thus, it would appear they are in a position to re-price domains that later become successful... more

P2P as a New Spam Medium, Moving From PoC to Full Operations

Spam on P2P networks used to be mainly with advertising inside downloaded movies and pictures (mainly pornographic in nature), as well as by hiding viruses and other malware in downloaded warez and most any other file type (from zip archives to movie files). Further, P2P networks were in the past used for harvesting by spammers. Today, P2P has become a direct to customer spamvertizing medium. This has been an ongoing change for a while. As we speak, it is moving from a proof of concept trial to a full spread of spam, day in, day out... more

Phishing: An Interesting Twist on a Common Scam

After Two Security Assessments I Must Be Secure, Right? Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. When the final report came in, your company was given a clean bill of health. At first, you felt relieved, and confident in your security measures. Shortly thereafter, your relief turned to concern. ...Given you're skepticism, you decide to get one more opinion. ...And the results were less than pleasing. more

IPv6 Will Change the Face of Email Filtering, Says Report

Data solutions provider Return Path has released a new report highlighting 20 visionary ideas for brands to "futureproof" their email program. Among various insights, the report warns brands that adoption of IPv6 will result in rising dependency on domain-based reputation. more

Protecting Your Brand in the New World of NFTs

Months ago, while watching a Saturday Night Live skit about non-fungible tokens (NFT) featuring a parody of Janet Yellen speaking to a high school economics class, I realized what an NFT is and how they work. What they represent, how they are minted, and how their value is exchanged became clear while watching Pete Davidson in a boy wonder unitard rap about the latest crypto-phenomena. It was only later that I realized that NFTs have plenty of practical applications. more

Making Sense of Google’s .xyz gTLD Branding

Google has a newly created parent, a holding company that is now its official owner. Of course, Google will keep using its extremely well-known name for its core search and related businesses. But the company now operates under an entity known as Alphabet -- to give its name with extension, Alphabet.xyz. Here specialists in gTLDs may be scratching their heads. Why .xyz? Why this little-known domain for one of the world's great corporations? more

Cloud Computing and Digital Divide 2.0

Internet connectivity is the great enabler of the 21st century global economy. Studies worldwide unequivocally link increases in Internet penetration rates and expansion of Internet infrastructure to improved education, employment rates, and overall GDP development. Over the next decade, the Internet will reinvent itself yet again in ways we can only imagine today, and cloud computing will be the primary operating platform of this revolution. more