/ Most Viewed

The WiFi 6 Revolution

We're edging closer every day to seeing WiFi 6 in our homes. WiFi 6 will be bolstered by the newly approved 6 GHz frequency, and the combination of WiFi 6 and 6 GHz spectrum is going to revolutionize home broadband. I don't think many people understand how many of our home broadband woes are caused by current WiFi technology. WiFi has been an awesome technology that freed our homes from long category 5 wires everywhere, but WiFi has a basic flaw that became apparent when homeowners started to buy hordes of WiFi-enabled devices.  more

IPv6 is Growing in Maturity, but Not Necessarily in Adoption

According to Google native IPv6 penetration has structurally crossed the 0.2% mark as a percentage of total traffic on the Internet in early 2011. This may not seem much, but it has doubled in a year, in an Internet that is still growing exponentially. more

Trademarks and Domain Names Composed of Common Terms

The lexical material from which trademarks are formed is drawn from the same social and cultural resources available to everyone else, which includes domain name registrants. Since trademarks are essentially a form of communication, it is unsurprising that a good number of them are composed of common terms (dictionary words, descriptive phrases, and shared expressions) that others may lawfully use for their own purposes. more

Map Illustrates Global Internet Population and Penetration

A map released by Information Geographies at the Oxford Internet Institute illustrates the total number of Internet users in a country as well as the percentage of the population that has Internet access. "The distortion in the map paints a revealing picture about human activity on the Internet. China is now home to the world’s largest Internet population at over half a billion. The United States, India, and Japan then follow as the next most populous nations of Internet users." more

Doug Madory Reports on Shutting Down the BGP Hijack Factory

A lengthy email to the NANOG mailing list last month concerning suspicious routing activities of a company called Bitcanal initiated a concerted effort to kick a bad actor off the Internet. more

As WHOIS Transitions to RDAP, How Do We Avoid the Same Mistakes?

In 1905, philosopher George Santayana famously noted, "Those who cannot remember the past are condemned to repeat it." When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently. more

All New gTLD Registrations Should Be Subject to Sunrise Periods - Even Reserved Names

Planning to register your trademark as a domain name during a Sunrise Period only to find out that the registration appears on a Reserved Names list? There are a number of reasons why a domain that matches your trademark is appearing on a Reserved Names list. First of all, if the domain desired is the subject of Name Collision, it may appear on a Reserved Names list. Although this is not true for all registries, as some operators are allowing domains that have been the subject of Name Collision to be allocated during Sunrise, but not delegated. more

Copper Theft Costs $1.5 to $2 Billion Annually: A Growing Crisis with Severe Consequences

I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more

Reducing Unreachable ICANN Registrations

Recently ICANN published a report on inaccurate registration data in her own databases. Now the question is presented to the world how can we mitigate this problem? There seems to be a very easy solution. ... The question to this answer seems simple. To know who has registered with an organisation. This makes it possible to contact the registered person or organisation, to send bills and to discuss policy with the members. more

Call for Participation - DNSSEC Workshop at ICANN 54 in Dublin, Ireland

Would you like to present an idea you have related to DNSSEC or DANE to a gathering of people within the DNSSEC community? Do you have an idea for a new tool or service? Have you recently implemented DNSSEC or DANE and want to share your story? The deadline is Monday, August 17, so please send your proposal soon! We are open to proposals on a wide range of topics... more

Typosquatting Claims Against Security Researcher Are Legally Complicated - Gioconda v. Kenzie

Kenzie is a security researcher who has registered numerous domain names that are typographic errors of well-known trademarks (e.g., rnastercard, rncdonalds, nevvscorp, rncafee, macvvorld, rnonster, pcvvorld). He points the domain names to the actual sites in question (e.g., rncdonalds points to mcdonalds.com), but he is looking to demonstrate how these typo domains are used for "social engineering" attacks. more

Halftime Is over for the New gTLD Applicants: Musings of a Hungry Marketer

As I sit in Schiphol airport awaiting the final leg of my journey home from ICANN Toronto, I'm thinking of all the work that lies ahead in the coming months. The sense of being caught in the holding pattern that descended over the industry after the Prague meeting and lasted into September, is evidently over. The wheels have thankfully begun to turn again on the path towards the new TLDs finally going live. more

When is Similarity Confusing? Cybersquatting and Abusive Registration

The case I'm reporting on today has garnered attention from a number of quarters. One commentator, Andrew Allemann tells us that "[he's] struggling with this UDRP decision" and Nat Cohen of Telepathy Inc. in a couple of Tweets and a private conversation is concerned that the holding could be a Trojan Horse by erasing the distinction between merely confusing and confusingly similar. The problem centers on the Panel's holding that everyfamily.org is confusingly similar to EVERYTOWN... more

Cybersecurity Considerations in the Work-From-Home Era

Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have grown more sophisticated, adapting to changing business practices and diversifying their approaches in non-traditional ways. We have seen security threats continue to evolve in 2020, as many businesses have shifted to a work from home posture due to the COVID-19 pandemic. more

Surveillance Capitalist in Chief

Surveillance capitalism monetizes private data that it collects without consent of the individuals concerned, data to analyze and sell to advertisers and opinion-makers. There was always an intricate relationship between governments and surveillance capitalists. Governments have the duty to protect their citizens from the excesses of surveillance capitalism. On the other hand, governments use that data, and surveillance capitalism's services and techniques. more