/ Most Viewed

I Don’t Need a Signature to Know It’s Going to Be Bad…

There was a period of time not long ago in which signature-based threat detection was cutting-edge. Antivirus, intrusion detection systems (IDS), data leakage prevention (DLP), content filtering and even anomaly detection systems (ADS) all continue to rely heavily upon static signatures. In recent years vendors have shied away from discussing their dependence on such signatures -- instead extolling supplemental "non-signature-based" detection technologies. more

New gTLDs: If I Knew Then, What I Know Now…

If only I had been able to predict the new gTLD future, but alas my crystal ball (well, really it's a Magic 8 Ball ®) did little to help me. And I really doubt that 5+ years ago, when this new gTLD journey began, that anyone could have predicted where we are now. All that said, back in 2008, I wish I could have known that... more

Google and China: Some General Thoughts

I have deferred blogging on the Google/China imbroglio for a few reasons. First, heavyweights such as Jonathan Zittrain have tracked International online censorship and online security issues more closely than I have. Second, after Google's provocative blog post, I wanted to see the facts develop rather than rely solely on Google's assertions. The spin doctors are now moving in, so the useful development of the factual record will be slowing down. more

More Mysterious DNS Root Query Traffic from a Large Cloud/DNS Operator

With so much traffic on the global internet day after day, it's not always easy to spot the occasional irregularity. After all, there are numerous layers of complexity that go into the serving of webpages, with multiple companies, agencies and organizations each playing a role. That's why when something does catch our attention, it's important that the various entities work together to explore the cause and, more importantly... more

Fashion of the Moment: The “Pioneer Program”

I have had the question recently with several new gTLD applicants. I think this is a good subject for applicants with the intention to sell domain names AND who are alone to apply for their string. A Pioneer program allows to: Find good partners to developp a TLD; once the program is signed, it is an insurance they will have a good use of the requested domain name... more

ICANN Releases gTLD Applicant Guidebook

Per their timeline, ICANN released the gTLD Applicant Guidebook on May 30th. This version contains revisions based upon both community feedback, as well as recent consultations with the Governmental Advisory Committee (GAC). more

Background on .EU the Upcoming European Identity

Progress is being made towards launching a .eu top-level domain for European individuals, business and organisations.

On 22 May 2003, the European Commission announced its decision to designate the European Registry for Internet Domains (EURID) as the Registry for the new top-level domain (TLD) .eu. EURID is made up of three founder members ? the registry operators for the country code top-level domains (ccTLDs) .be (Belgium), .it (Italy) and .se (Sweden). The Commission?s decision follows a call for expressions of interest published last September and an evaluation by independent experts of the seven applications received. more

.COM - The Riskiest Top-Level Domain? (Part 2)

Following up from my post yesterday, I thought I would take a look at how spammy each particular TLD is. At the moment, I only track 8 TLD's - .cn, .ru, .com, .net, .org, .info, .biz and .name. To check to see which one is the spammiest, I took all of our post-IP blocked mail and determined how many times those messages occurred in email, and how many times that email was marked as spam... more

Downsizing Sao Paulo

On January 27th the Executive Multistakeholder Committee (EMC) held its first meeting to plan the "Global Multistakeholder Meeting on the Future of the Internet Governance" scheduled to be held in Sao Paulo on April 23rd-24th. A review of that planning session's results indicates a Sao Paulo meeting with downsized attendance and, most likely, accompanying expectations.  more

Harm Caused by Typosquatting Is Still Modest, Research Suggests

Harm caused by domain name typosquatting is still modest, to both the user and the brand holder, and investment on anti-typosquatting products should be cautious, according to a paper published in Security and Privacy (SP), 2015 IEEE Symposium titled, "Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting." The paper presents a strategy for quantifying the harm caused by the cybercrime of typo squatting via an intent inference technique. more

The Economics of Magic

Arthur C. Clarke said any sufficiently advanced technology is indistinguishable from magic. Milton Friedman said there's no such thing as a free lunch. The validity of the former statement does not invalidate the later. From this we can see that even magic has a price. Hence, its application is subject to cost-benefit analysis. There are many developing technologies that may eventually qualify as magic. more

Fake Apps Are a Real Problem

In the short ten years that they've been around, mobile apps have grown to become a staple of modern digital life. With more than five million apps currently available for download in the major app stores, and with over 2,000 new apps being uploaded every day, mobile apps are big business. Fifty-eight percent of shoppers consistently browse e-commerce apps and 49% of all website traffic now comes directly from mobile app users. All this browsing directly translates into spending. more

Russia Bans Sale of Smartphones, Computers and Other Devices Not Pre-Installed With Russian Software

Russia has passed a law banning the sale of certain devices such as smartphones, computers and smart televisions if not pre-installed with Russian software. more

Canadian Spam Law Update

As you may know, there are two laws currently being discussed in Canadian legislative assemblies: Senate Bill S-220, a private member’s bill with private right of action and criminal remedies; Parliamentary Bill C-27, tabled by the government, with private right of action, coordination between various enforcement agencies... more

China’s Central Bank Allows Some Commercial Lenders to Start Running Trials of Its Digital Currency

China's central bank is a step closer to becoming the world's first major monetary authority to issue its own digital tender. The People's Bank of China will conduct internal tests for the central bank's digital currency (CBDC) across four cities (Shenzhen, Suzhou, Xiong'An and Chengdu), according to a statement issued by the bank on Friday. more