A lawsuit filed by Meta has led to a significant decrease in phishing websites tied to the domain name registrar Freenom. Cybersecurity expert Brian Krebs in a report on Friday said that Freenom, which provides free domain name registration services, was a favored resource for cybercriminals due to its policy of protecting customer identities. more
U.S. Democratic Senator Ron Wyden released an early draft of a bill today that would subject company CEOs and senior executives to tough penalties including 10 to 20 years of imprisonment for failing to protect consumer data. more
In February, the FCC's Office of Strategic Planning and Policy Analysis published three studies (1, 2, 3) on spectrum licensing and spectrum utilization. Thanks to Nick Ruark for pointing them out... Reading on I was struck by a gaping hole in their assumptions. more
Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more
According to the latest report from Anti-Phishing Working Group (APWG) while the total number of conventional, spam-based phishing campaigns declined in 2018, users of software-as-a-service (SaaS) systems and webmail services are increasingly targeted. more
Earlier this month, MarkMonitor representatives were privileged to witness, at the first ICANN meeting of 2016 in Marrakech, Morroco, the historic presentation of the plan to transfer the stewardship of key internet functions (IANA) from the United States Government to a community and consensus-based model of governance through ICANN (Internet Corporation for Assigned Names and Numbers). more
At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more
Here's a chart showing the ten largest new Top-Level Domains (TLDs) and the number of domains in each one, going back five days. It's updated every day around 3 AM New York time, so visit early and often. Data is from downloaded TLD zone files. Some new TLDs don't have zone files available yet but I don't think any of them are very big. more
Registrars who support .com domain names will use the Extensible Provisioning Protocol (EPP) system by October 28. ...There will be an additional step when trying to transfer a .com domain name among registrars. Specifically, a piece of information called an EPP code (aka auth code, EPP key, transfer secret) must be obtained from the current registrar and submitted to the gaining one prior to approving with the latter. more
The ongoing witch-hunt from the incumbent telcos in the USA against municipalities that are trying to build their own broadband networks is continuing unabated. This is nothing new... With the economic crisis there has been a new focus on regulatory rules and the importance of the common good, next to the free market. However that message has not yet got through to the incumbent players in the USA. more
An arbitration panel has given Amazon.com Inc. a new shot at securing the .amazon top-level domain which the company has been fighting for since 2014. more
Anyone who reads the papers sees stories -- or hype -- about cyberwarfare. Can it happen? Has it already happened, in Estonia or Georgia? There has even been a Rand Corporation study on cyberwarfare and cyberdeterrence. I wonder, though, if real cyberwarfare might be more subtle -- perhaps a "cyber cold war"? more
The Optus outage in Australia from last year was immediately on my mind when on Friday afternoon a similar event swept, this time, across the world. Also, in this case it was a software update that caused the problem. This time from global security software provider CrowdStrike. The culprit appears to be an update to the CrowdStrike Falcon platform, a security monitoring tool widely deployed by businesses and organisations on Microsoft desktop computers and notebooks. more
As the final project of my UC Berkeley School of Information course in Artificial Intelligence strategies, we had to submit an AI strategy canvas. Today, I will attempt to share important aspects of the canvas, so you and your team may have a template to work from and consider. Let's begin. We will look at both a strategy and operations perspective both internally and externally. Part one will include Internal and Operational Strategies, while Part II will examine external processes, threats, and procedures. more
Broadband; we want it, and we all depend on it; but where you live can impact access and adoption of the best that service providers have to offer. The FCC is looking to change both geographic and demographic limitations now plaguing the U.S. in the global race for broadband economic supremacy. Can a combination of a fixed and wireless-mobile strategy improve broadband economic viability by increasing access, adoption, and affordability across the broadband spectrum? more