Kenzie is a security researcher who has registered numerous domain names that are typographic errors of well-known trademarks (e.g., rnastercard, rncdonalds, nevvscorp, rncafee, macvvorld, rnonster, pcvvorld). He points the domain names to the actual sites in question (e.g., rncdonalds points to mcdonalds.com), but he is looking to demonstrate how these typo domains are used for "social engineering" attacks. more
For anyone wondering how Internet development is evolving in the Caribbean, an international conference held in Bridgetown, Barbados, hosted by the American Registry for Internet Numbers (ARIN), provided more than a few positive clues. The second annual ARIN Caribbean Forum attracted Internet policymakers, computer networking and cybersecurity experts and law enforcement officials from across the Caribbean, North America and Europe for high-level talks under the theme "Caribbean priorities for the global Internet." more
The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more
Cloud computing is not a new concept. Having gotten its start back in the 1960s, when computation was first envisioned as a public utility, it has been in development ever since. However, the past few years have seen more significant changes than we have seen in the entire history of the technology. In an age with ever increasing digitization of data and records, the cloud and cloud software have become unavoidable for virtually every business from small start-up initiatives to large multibillion-dollar corporations... During the past three years, we have seen the following significant developments relative to the cloud. more
According to Google native IPv6 penetration has structurally crossed the 0.2% mark as a percentage of total traffic on the Internet in early 2011. This may not seem much, but it has doubled in a year, in an Internet that is still growing exponentially. more
This post is a heads up to all uber-geeks about a terrific research initiative to try to figure out causes and mitigation of name-collision risk. There's a $50,000 prize for the first-place paper, a $25,000 prize for the second place paper and up to five $10,000 prizes for third-place papers. That kind of money could buy a lot of toys, my peepul. And the presentation of those papers will be in London -- my favorite town for curry this side of India. Interested? Read on. more
Network neutrality is important in the context of assuring the opportunity to innovate in how we communicate and connect. We can't define it in terms of specific outcomes but rather in terms of what we enable. The Internet is just one example of what we can do when given the opportunity to use software to fashion our own solutions... I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. But yet I could control the lights in my house! more
Paul Vixie proposes a 'cooling-off period' when domain names are registered in order to help detect and deter malicious activity. "There's no legitimate reason for a new domain name to be registered and go live in less than a minute... more
Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have grown more sophisticated, adapting to changing business practices and diversifying their approaches in non-traditional ways. We have seen security threats continue to evolve in 2020, as many businesses have shifted to a work from home posture due to the COVID-19 pandemic. more
Only an idiot would believe that the U.S. is blocking TSMC manufacture of Huawei cell phone chips because of security fears. This is a commercial rivalry. The U.S. wants to put China's leading technology company out of business. We will fail, of course, at a price far higher than D.C. understands. The U.S. is ready for China's immediate countermeasures, even if Apple's stock price falls $hundreds of billions. But the long-run price will be devastating. more
The year 2017 turned out to be a record-setting year for domain name disputes, in two ways: The number of complaints filed as well as the total number of domain names in those complaints. Specifically: The number of cases at WIPO crept up to 3,073 from 3,036 in 2016 (the previous record), a modest gain of just over 1 percent. Those cases included 6,370 domain names, up from 5,354 in 2016 (also a record-setting year), a spike of nearly 19 percent. more
Does "voice" communication really matter as much today in business communications? Think about it. When you need to reach someone today, what do you do? Do you call them on the phone? Or do you send them email? Or a text message? or IM? I know personally that my normal communication flow usually goes something like this: Instant Messaging; I check first to see if I can reach the person on some form of IM... SMS; if the matter is relatively important... E-mail/Facebook/Twitter/other; Previously that would have just been email, but these days I find myself very often sending messages via Facebook or Twitter... more
Donuts Inc., a global leader in new top-level domains (TLDs), has announced that it has entered into an agreement to be acquired by Abry Partners, a private equity firm. more
At the IP Satellite Summit in Washington this week, a panel composed of satellite service providers and product vendors discussed whether or not they would pursue the economic stimulus funds set aside for broadband development. While the service providers agreed that there are viable business models for satellite broadband service without the stimulus money – of course, they were delivering service before the current economic collapse and talk of the stimulus money – the consensus seemed to be that they would apply for the grants to further develop, deploy and perhaps even subsidize their service offerings... more
Gradually it seems the word is spreading about a new blocking methodology to interrupt the ability of end users to click and visit phishing sites - thereby having their personal information/credentials at risk. This is the DNS Response Policy Zones. DNS RPZs allows companies that run recursive resolvers to create a zone that will not resolve specific domains. more