/ Most Viewed

Mac Hit by Another Wave of Malware… Users in Denial?

In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? more

Network Complexity: Three Trends That are Contributing to a “Perfect Storm”

Most everyone who visits CircleID is familiar with Moore's Law, which stated simply holds that computing power doubles every 18 months. This has been going on since the 1960s and shows no sign of slowing. Moore's Law drives faster and faster computing, which produces more and more data and network complexity. This inexorable trend is putting immense pressure on corporate networks, and the strain is too much for many of them to handle on their own. more

What Does the Future Hold for the Internet?

This is the fundamental question that the Internet Society is posing through the report just launched today, our 2017 Global Internet Report: Paths to Our Digital Future. The report is a window into the diverse views and perspectives of a global community that cares deeply about how the Internet will evolve and impact humanity over the next 5-7 years. We couldn't know what we would find when we embarked on the journey to map what stakeholders believe could shape the future of the Internet... more

Fair Notice and Applying for a New gTLD

Applying for a new generic Top-Level Domain (gTLD) will be expensive and complex. ICANN's Applicant Guidebook comprises 350 pages of dense instructions, spelling out the procedures to apply for a gTLD and to comment or object to the gTLDs applied for by others. Hidden among the forest of criteria and procedures is a problem that, unless solved, could deny good faith applicants the fair notice they deserve. more

First Square Mile is not the Last or First Mile: Discovery not Just Choices!

The term "last mile" highlights the fact that we are the consumers at the end of a broadband "pipe". Saying "first mile" is a little better but the Internet is not a pipe to or from somewhere else. It's about what we can do locally and then what we can do when we interconnect with other neighborhoods. It's better to describe our neighborhood as the first square mile. Telecom is about selling us services; the Internet is about what we can do ourselves locally and then interconnecting with others everywhere. In writing the First Square Mile - Our Neighborhood essay which I just posted I came to better understand the fundamental difference between the world of telecom which is about giving you choices and the Internet which provides opportunity to discover what we can't anticipate... more

GDPR and What Comes Next: The Parade of Horribles

The compliance deadline for the European Union's General Data Protection Regulation (GDPR) is nearly upon us, the unveiling of a proposed model to bring WHOIS into compliance is said to come from ICANN next week, and everyone is scrambling to understand all that's involved. Implementation of a revised WHOIS model is clearly on the horizon, but what comes after may be the real story! Specifically, if WHOIS information becomes more than nominally restricted, what's the consequence to the data controllers (ICANN and the contracted parties) who implement this revised model? more

Disputes Falling Outside the Scope of the UDRP

The UDRP is a forum of limited jurisdiction designed for trademark owners to combat a certain kind of tortious (sometimes tipping to criminal) conduct by which registrants register domain names with the bad faith intent of taking economic advantage of owner's marks and injuring consumers by beguiling them to disclose personal information. The forum is not open to trademark owners whose claims are outside its scope, even though they may include allegations of cybersquatting. more

A Look at Nine Years of RIPE Database Objects: IPv6 Objects on the Rise

The RIPE Database is about to enter its fourth decade. It began humbly as a place to store network and contact information back when the RIPE community formed in 1989. When the RIPE Network Coordination Centre (NCC) was created three years later and started to assign and allocated IP address space, the database was expanded to include the registration of more detailed network and routing information. more

Internet Continues to Grow at Astonishing Pace (Perspectives from RIPE NCC Membership Stats)

We are at the height of vacation season here in the Netherlands, and the RIPE NCC headquarters in Amsterdam are quieter than usual. The downtime has given me a chance to reflect on how the recent economic downturn has affected our membership growth. The good news is that it hasn't. more

CIRA’s Second Public Letter to ICANN

Readers of my blog may recall that the Canadian Internet Registration Authority wrote a public letter earlier this year to ICANN that expressed concern over the current lack of accountability (note that I am on the CIRA board). The letter indicated that CIRA was withholding payment of any voluntary fees to ICANN until the accountability concerns were addressed. This week CIRA followed up with a second public letter to ICANN... more

Is LTE Going to Impact Free WiFi?

Developments in LTE are also going to have a significant impact on the unlicensed spectrum, which is currently used by billions of people through their WiFi modems and WiFi services in cities, cafes, airports and other venues. Known as LTE Unlicensed (LTE-U) or Licensed-Assisted Access (LAA), this technology can also ride on top of WiFi networks (without utilising the mobile service), providing high-speed broadband access to users. more

United States Is the Most Bot-Infected Country. Right?

A couple of days ago, Threatpost posted an article indicating that the United States is the most bot-infected country... I think that Microsoft's mechanism of measuring bot infections is a good one, not necessarily because it is the most accurate but because it represents the most complete snapshot of botnet statistics. Because Microsoft Windows is installed on so many computers worldwide and because so many users across the world call home to the MSRT, Microsoft is able to collect a very large snapshot of data. more

Parsing Predatory and Parasitical from Innocent and Good Faith Domain Name Registrants

When the World Intellectual Property Organization began deliberating in 1998 and 1999 about creating an arbitral regime that the Internet Corporation for Assigned Names and Numbers transformed into the Uniform Domain Name Dispute Resolution Policy the curse words of choice were "predators" and "parasites" to describe cybersquatters. (In an early UDRP decision a Respondent who had also featured as a defendant in a trademark case asserted he had "just as much right to own the Domain Names [with typographic variations of the mark] as the person who owns the correct spelling of [the mark]" more

A Logical Place to Start the IPv6 Transition

The transition to IPv6 is top of mind for most service providers. Even in places where there are still IPv4 addresses to be had surveys we've run suggest v6 is solidly on the priority list. That's not to say everyone has the same strategy. Depending where you are in the world transition options are different -- in places such as APAC where exhaustion is at hand one of the many NAT alternatives will likely be deployed since getting a significant allocation of addresses is not going to happen and other alternatives for obtaining addresses will prove expensive. more

A Link to Eternity

While Google is as secretive about its internal processes and systems as Apple is about product development, every now and then senior people post articles on the official Google blog and offer their thoughts on the development of the web. In the latest posting, two Google engineers, Alfred Spector and Franz Och, look at how search strategies will benefit from the faster computers, greater volumes of data and better algorithms we are likely to see in the next decade, speculating that "we could train our systems to discern not only the characters or place names in a YouTube video or a book, for example, but also to recognise the plot or the symbolism." more