/ Most Viewed

Privacy and Security - Five Objectives

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway? more

EU Court of Justice Ruling Could Result in Cutting Off Data Flows to US

EU holds an eight-hour-long hearing taking an extensive look at whether US surveillance practices break European data protection laws. more

New gTLDs Race to the Bottom With Domain Giveaways?

The new .BERLIN domain added 67,000 new registrations early this week and another almost 6,000 yesterday. This occurred after a few registrars ran a promotion offering free .BERLIN domains. As reported at DomainIncite, over a 1/3 of these domains were purchased by one registrant - making them the largest "landowner" in .BERLIN. Giving away domains may be a good short term business practice... But the geographical domains are not supposed to be generic... more

Russia Invests $660 Million to Boost Internet Censorship and Block VPNs

Russia's Ministry of Digital Development is set to invest nearly 60 billion rubles ($660 million) over the next five years to enhance its internet censorship system, according to a government proposal revealed by Reuters. more

Domain Related Crime: The 4 Steps of Effective Investigations

There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more

ICANN’s New gTLDs: The Game Changers Have Landed

The day after 'reveal day' two big questions will emerge; firstly was the advertising branding world so wrong or secondly, the parties behind the proposed names so invincible and can turn their $350 million dollars into many tens of billions. To be fair the jury may be out nevertheless, here are some facts... The Internet was never designed to solve the global business naming problems; it was the extension of DARPA, a failsafe military communication system later adventured into public use. more

Berners-Lee Warns Rise of Dominant Platforms has Resulted in Weaponization of the Web at Scale

The World Wide Web turned 29 today and Sir Tim Berners-Lee, web inventor, has shared some stern warnings about the direction it is headed. more

Do We Need IPv4 at Home/SOHO Any More?

CLAT/NAT64 is utilized across many mobile networks globally, and I am only talking about Ethernet and Wi-Fi in home and small office/home office (SOHO) environments. I experimented by completely disabling IPv4 at home and established a SSID where my MacBook Pro operates without an actual IPv4 address. The MacBook supports CLAT (RFC 6877), and by implementing PREF64 (RFC 8781) and DHCP Option 108 (RFC 8925) in my network, I was able to achieve a 100% IPv6 environment. more

2nd Annual RIPE NCC - LEA meeting: Cooperation Unfolds

On Wednesday 16 March the Serious Organised Crime Agency organised a meeting in London with the RIPE NCC. For the second time law enforcers from the whole world met with the RIPE NCC and RIPE community representatives to discuss cooperation. RIPE NCC staged several very interesting presentations that showed the LEAs the importance of the work done within RIPE and ARIN, the information RIPE NCC has and the relevance of all this to LEAs. Also issues were addressed that can potentially be harmful to future investigations. more

GDPR and What Comes Next: The Parade of Horribles

The compliance deadline for the European Union's General Data Protection Regulation (GDPR) is nearly upon us, the unveiling of a proposed model to bring WHOIS into compliance is said to come from ICANN next week, and everyone is scrambling to understand all that's involved. Implementation of a revised WHOIS model is clearly on the horizon, but what comes after may be the real story! Specifically, if WHOIS information becomes more than nominally restricted, what's the consequence to the data controllers (ICANN and the contracted parties) who implement this revised model? more

Challenges for .brands - Launching Your .brand

One of the consistent themes of this blog series is that despite similarities across .brand TLDs, no two brands will settle on the exact same strategy and process for moving their TLD to launch. As I discussed last week, an implementation plan ensures that each required action is documented, responsibility for it is assigned and a more detailed project plan can be developed to take this process further. more

Cuba’s Odd Emphasis on the National Intranet

In 2014, Cuba embarked on a program for the "informatization" of society and "advances in the informatization of society" was the theme of the short videos by ETECSA president Mayra Arevich Marín and Vice Minister of Communications Wilfredo González... I was struck by the emphasis on the Cuban national intranet, as opposed to the global Internet... This emphasis is reflected in the relatively low price of intranet access and the continued development of Cuban content and services. more

Starlink Sales Are Straining Capacity in Parts of the U.S. And Canada

On June 5th Elon Musk said SpaceX had nearly 500,000 customers in 32 nations and 9 languages. By now, there must be 500,000 customers, most of whom are in the U. S. and Canada, and their performance is suffering. In the first quarter of this year, OOKLA reported that the median Starlink download speed fell from 104.97 to 99.55 Mbps in the U.S. and from 106.64 to 97.4 Mbps in Canada. more

Eliminating Access to WHOIS - Bad for All Stakeholders

Steeped deep in discussions around the European Union's General Data Protection Regulation (GDPR) for the past several months, it has occurred to me that I've been answering the same question for over a decade: "What happens if WHOIS data is not accessible?" One of the answers has been and remains the same: People will likely sue and serve a lot of subpoenas. This may seem extreme, and some will write this off as mere hyperbole, but the truth is that the need for WHOIS data to address domain name matters will not disappear. more

Global Payments Breach Confirmation

This morning, Global Payments held a conference call with investors and analysts covering their earlier breach announcement and projected earnings. Global Payments had also released an update advisory yesterday stating that "the company believes that the affected portion of its processing system is confined to North America and less than 1,500,000 card numbers have been exported" and that only Track 2 card data may have been stolen. more