/ Most Viewed

The Internet Infrastructure in Afghanistan (Event)

Join the upcoming discussion today on the past, present and future of the Internet in Afghanistan in the context of the Middle East. Panelists will address the national and international challenges and opportunities Afghans face in the changing environment of global Internet governance and sanctions laws. more

Amazon Project Kuiper vs SpaceX Starlink

In 2019, I wrote that Amazon would be a formidable satellite-ISP competitor. I still think so, but I didn't expect it would be over four years until they launched the first test satellites. In the meantime, SpaceX has put over 5,000 satellites in orbit and has over two million Starlink customers. Amazon has permission to launch 3,236 satellites. more

Red Cross and Internet Governance with Cause

One of many controversies surrounding the introduction of new domain names is the special protection given, though a moratorium, to the Red Cross and Red Crescent Movement (RCRC) and International Olympic Committee (IOC). Although the RCRC and the IOC are discussed together, they are very different. more

From Wikileaks of 2012 to Snowden’s NSA Leaks of 2013: Implications for Global Internet Governance

2012 will always be remembered as the Year of Wikileaks. Similarly, 2013 shall also be remembered as the year that Edward Snowden, a computer security specialist and former CIA employee and National Security Agency contractor, leaked classified information regarding the NSA global surveillance programs. Whilst Wikileaks was about US diplomatic cables, the Edward Snowden disclosure of classified NSA information to private media organizations such as the UK Guardian newspaper has had graver implications for global Internet privacy. more

$100 Million Lawsuit Filed Against VeriSign

Popular Enterprises LLC, the parent company of Netster.com, has filed a $100 million dollar lawsuit against VeriSign, Inc. The Complaint alleges antitrust violations, unfair competition and violations of the Deceptive and Unfair Trade Practices Act based upon VeriSign's release of the Site Finder product. The suit requests injunctive relief to prevent VeriSign from operating Sitefinder, and to otherwise cease what Popular Enterprises believes to be its monopolistic practices. more

ICANN - Time to Act!

At the start of the TAS outage, I said ICANN had a great opportunity to get its crisis management right by communicating properly. Now, nearly two weeks after the application window was supposed to close, ICANN has clearly done just that... But clearly, communication isn't the only parameter in crisis management. At some point, you also need to act. more

UK Bill Ups Prison Term for Online Piracy from 2 to 10 Years

The UK government has unveiled its latest Digital Economy Bill as part of an "ambition for the UK to be the most digital nation in the world". more

The Story of Conficker and the Industry Response

On November 2, 2009, Microsoft released its seventh edition of the Security and Intelligence Report (SIR). The SIR provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The following is an excerpt from the SIR, pp 29-32, about the Conficker worm and the industry response that showed an incredible amount of collaboration across vendors. more

Resolving the ICANN-Proposed TLDs Debate

The Internet Corporation for Assigned Names and Numbers (ICANN) has recently decided to allow any entity to register a top-level domain name (TLD). The best mechanism for valuing this decision, a mechanism that outperforms crowdsourcing, blogs, and committee decisions, is the legal and easy-to-implement solution known as prediction markets.
In handing down its TLD decision, ICANN never identified the problem it was trying to solve... more

Cyberattack Causes Operational Disruption to Critical Infrastructure Using New Malware TRITON

A new malware designed to manipulate industrial safety systems was deployed against a critical infrastructure organization that provides emergency shutdown capability for industrial processes, according to a report released today. more

Rod Beckstrom, Twiki and the Foswiki fork - ICANN Must “Get Things Right” on New TLDs

One of the most disastrous things that could happen to the DNS would be for the root to "split", as it would mean that identifiers would no longer be universal. Instead, "Example.com" would have totally different meanings for different users, substantially reducing the benefits of domain names. Can this happen? Important lessons for ICANN can be learned by studying the history of Rod Beckstrom, Twiki and Foswiki. more

How to Choose a Cyber Threat Intelligence Provider

Throughout the course of my career I've been blessed to work with some of the most talented folks in the security and cyber threat intelligence (CTI) mission space to create a variety of different capabilities in the public, private and commercial sectors. Before I came to lead the Verisign iDefense team about five years ago, I had to evaluate external cyber-intelligence vendors to complement and expand the enterprise capabilities of my former organization. more

July 2010: The End of the Beginning for DNSSEC

July 15, 2010 (yesterday) marked the end of the beginning for DNSSEC, as the DNS root was cryptographically signed. For nearly two decades, security researchers, academics and Internet leaders have worked to develop and deploy Domain Name System Security Extensions (DNSSEC). DNSSEC was developed to improve the overall security of the DNS, a need which was dramatized by the discovery of the Kaminsky bug a few years ago. more

Russian Hackers Have Penetrated U.S. Electric Utilities

U.S. federal government officials have revealed Russian hackers have been able to gain access to the networks of electric utilities in the country, according to a report by The Wall Street Journal. more

Breaking It Down: the IANA Transition in Practical Pieces

As a Regional Internet Registry, APNIC has a strong interest in the Internet Assigned Numbers Authority (IANA), and the services it provides. We have followed the progress of IANA carefully, in particular through the evolution of ICANN, and the various steps taken by the US Government to reduce its level of oversight. Along with other RIRs, through the NRO, we have made several public statements about the IANA and its future development, mostly in response to US Government enquiries. more