/ Most Viewed

Typosquatting Claims Against Security Researcher Are Legally Complicated - Gioconda v. Kenzie

Kenzie is a security researcher who has registered numerous domain names that are typographic errors of well-known trademarks (e.g., rnastercard, rncdonalds, nevvscorp, rncafee, macvvorld, rnonster, pcvvorld). He points the domain names to the actual sites in question (e.g., rncdonalds points to mcdonalds.com), but he is looking to demonstrate how these typo domains are used for "social engineering" attacks. more

ARIN Increases Support for Caribbean Internet Development

For anyone wondering how Internet development is evolving in the Caribbean, an international conference held in Bridgetown, Barbados, hosted by the American Registry for Internet Numbers (ARIN), provided more than a few positive clues. The second annual ARIN Caribbean Forum attracted Internet policymakers, computer networking and cybersecurity experts and law enforcement officials from across the Caribbean, North America and Europe for high-level talks under the theme "Caribbean priorities for the global Internet." more

Enabling Privacy Is Not Harmful

The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative... The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order? more

How the Cloud Has Changed Over the Past 3 Years

Cloud computing is not a new concept. Having gotten its start back in the 1960s, when computation was first envisioned as a public utility, it has been in development ever since. However, the past few years have seen more significant changes than we have seen in the entire history of the technology. In an age with ever increasing digitization of data and records, the cloud and cloud software have become unavoidable for virtually every business from small start-up initiatives to large multibillion-dollar corporations... During the past three years, we have seen the following significant developments relative to the cloud. more

IPv6 is Growing in Maturity, but Not Necessarily in Adoption

According to Google native IPv6 penetration has structurally crossed the 0.2% mark as a percentage of total traffic on the Internet in early 2011. This may not seem much, but it has doubled in a year, in an Internet that is still growing exponentially. more

Name Collisions II - A Call for Research

This post is a heads up to all uber-geeks about a terrific research initiative to try to figure out causes and mitigation of name-collision risk. There's a $50,000 prize for the first-place paper, a $25,000 prize for the second place paper and up to five $10,000 prizes for third-place papers. That kind of money could buy a lot of toys, my peepul. And the presentation of those papers will be in London -- my favorite town for curry this side of India. Interested? Read on. more

From Net Neutrality to Seizing Opportunity

Network neutrality is important in the context of assuring the opportunity to innovate in how we communicate and connect. We can't define it in terms of specific outcomes but rather in terms of what we enable. The Internet is just one example of what we can do when given the opportunity to use software to fashion our own solutions... I thought about this more when I found myself in my hospital room (after knee surgery) unable to open and close the shades by myself. But yet I could control the lights in my house! more

Placing New Domain Names in Temporary “Penalty Box” Could Deter Malicious Use, Says Paul Vixie

Paul Vixie proposes a 'cooling-off period' when domain names are registered in order to help detect and deter malicious activity. "There's no legitimate reason for a new domain name to be registered and go live in less than a minute... more

Cybersecurity Considerations in the Work-From-Home Era

Verisign is deeply committed to protecting our critical internet infrastructure from potential cybersecurity threats, and to keeping up to date on the changing cyber landscape. Over the years, cybercriminals have grown more sophisticated, adapting to changing business practices and diversifying their approaches in non-traditional ways. We have seen security threats continue to evolve in 2020, as many businesses have shifted to a work from home posture due to the COVID-19 pandemic. more

China Will Remember the U.S. Huawei War for a Generation

Only an idiot would believe that the U.S. is blocking TSMC manufacture of Huawei cell phone chips because of security fears. This is a commercial rivalry. The U.S. wants to put China's leading technology company out of business. We will fail, of course, at a price far higher than D.C. understands. The U.S. is ready for China's immediate countermeasures, even if Apple's stock price falls $hundreds of billions. But the long-run price will be devastating. more

Domain Name Disputes Break Two Records in 2017

The year 2017 turned out to be a record-setting year for domain name disputes, in two ways: The number of complaints filed as well as the total number of domain names in those complaints. Specifically: The number of cases at WIPO crept up to 3,073 from 3,036 in 2016 (the previous record), a modest gain of just over 1 percent. Those cases included 6,370 domain names, up from 5,354 in 2016 (also a record-setting year), a spike of nearly 19 percent. more

Telephony is Disrupted Because Voice No Longer Matters… (As Much)

Does "voice" communication really matter as much today in business communications? Think about it. When you need to reach someone today, what do you do? Do you call them on the phone? Or do you send them email? Or a text message? or IM? I know personally that my normal communication flow usually goes something like this: Instant Messaging; I check first to see if I can reach the person on some form of IM... SMS; if the matter is relatively important... E-mail/Facebook/Twitter/other; Previously that would have just been email, but these days I find myself very often sending messages via Facebook or Twitter... more

Donuts Holder of the Largest Portfolio of New TLDs Acquired by Abry Partners

Donuts Inc., a global leader in new top-level domains (TLDs), has announced that it has entered into an agreement to be acquired by Abry Partners, a private equity firm. more

Satellite Broadband, Stimulus Funds and Network Neutrality

At the IP Satellite Summit in Washington this week, a panel composed of satellite service providers and product vendors discussed whether or not they would pursue the economic stimulus funds set aside for broadband development. While the service providers agreed that there are viable business models for satellite broadband service without the stimulus money – of course, they were delivering service before the current economic collapse and talk of the stimulus money – the consensus seemed to be that they would apply for the grants to further develop, deploy and perhaps even subsidize their service offerings... more

Response Policy Zones (RPZs): Use as a Blocklisting Process

Gradually it seems the word is spreading about a new blocking methodology to interrupt the ability of end users to click and visit phishing sites - thereby having their personal information/credentials at risk. This is the DNS Response Policy Zones. DNS RPZs allows companies that run recursive resolvers to create a zone that will not resolve specific domains. more