/ Most Viewed

Call for Participation - ICANN DNSSEC Workshop at ICANN58 in Copenhagen

Do you have new information about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology? If so, and if you will be in Copenhagen, Denmark, for ICANN 58 in March 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 58 DNSSEC Workshop! more

What Must We Trust?

My Twitter feed has exploded with the release of the Kaspersky report on the "Equation Group", an entity behind a very advanced family of malware. (Naturally, everyone is blaming the NSA. I don't know who wrote that code, so I'll just say it was beings from the Andromeda galaxy.) The Equation Group has used a variety of advanced techniques, including injecting malware into disk drive firmware, planting attack code on "photo" CDs sent to conference attendees, encrypting payloads... more

What Trademark Owners Need to Know to Avoid Reverse Domain Name Hijacking

A cybersecurity company recently attempted reverse domain name hijacking for an exact match domain name of its brand, and in so doing, failed in both its bid to take ownership of the domain and potentially damaged their reputation by using this somewhat nefarious tactic and abusing the Uniform Domain Name Dispute Resolution Policy (UDRP) process. more

Verisign Announces CEO Resignation

In its second quarter 2011 earnings call, Verisign announced that Mark McLaughlin has submitted his resignation to become the CEO of a private company. His last day with the company will be August 25, 2011. Mark concluded his board service at the regularly scheduled board of directors meeting on July 27, 2011 and resigned as president and chief executive officer effective August 1, 2011. Jim Bidzos, Verisign's founder and previous CEO, will become the president and chief executive officer effective August 1, 2011. more

China’s FttX Boom

China's broadband subscriber base continues to rise. Massive FttX deployments are underway, spurred on by competition between the three full-service operators all aiming to increase 'stickiness' for subscribers. While fixed line subscribers are expected to decline into 2011, broadband subscribers are still rising, driven by cheaper rates and the higher bandwidth on offer compared to mobile Internet. more

The Role of Domain Name Privacy and Proxy Services in URS Disputes

Here's another apparent limitation of the Uniform Rapid Suspension System (URS), the domain name dispute policy that applies to the new generic top-level domains (gTLDS): Proceedings are unlikely to unmask cybersquatters hiding behind privacy or proxy services. Domain name registrants often use these privacy and proxy services to hide their identities when they register domain names. The services have legitimate uses but are controversial. more

Subsea Cable Breaks Sever Internet Connectivity Across South Africa

Multiple subsea cable breaks have significantly disrupted internet connectivity across South Africa, affecting a wide range of internet and cloud service providers and leaving thousands of users disconnected. more

Governments Shouldn’t Play Games with the Internet

Governments often use small players as pawns in their global games of chess. Two weeks ago the European Court of Justice invalidated the EU-US Safe Harbor ("Safe Harbor") framework, turning Internet businesses into expendable pawns in a government game. But for the past fifteen years, Safe Harbor allowed data flows across the Atlantic -- fostering innovation and incredible economic development. more

Inter Mundos: ICANN’s Accountability is a Matter of Human Rights

The debate over the IANA Functions transitions has captivated the minds of all stakeholders. The U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) has announced that they intend to transition key Internet domain name functions to the global multistakeholder community. Thus, we find ourselves in the midst of a transition between worlds. All stakeholders are pondering the following questions: what should be the appropriate transition? What should be our goal? more

Why Vertical Integration Is Good for the Domain Name Industry

ICANN's decision a little over a week ago to permit the vertical integration of registries and registrars in the new top-level domain program, which now appears in the Applicant Guidebook published over the weekend, was as welcome as it was surprising. This bold, principled stance will fundamentally modernize the domain name industry and create competitive benefits that will be felt by consumers and under-served communities for years to come. more

It’s Time to Put a Bow on the URS: Our Work is Almost Done

For years our community has struggled with the rules of the URS - the Uniform Rapid Suspension - aimed at taking down the "worst of the worst" domain name registrations in a manner faster and cheaper than its predecessor, the Uniform Domain Name Dispute Resolution Policy - the UDRP. On June 27, in Prague, a diverse group met to discuss the fate of the URS. To my surprise, it was a rare "kumbaya" moment, and that makes it worthy of comment. more

Doing Our Part for a Safer, Stronger DNS

Public Interest Registry is the industry leader of DNS Anti-Abuse efforts on the Internet. Since our inception, we have worked to empower people and organizations that use the Internet to make the world a better place. Whether a .ORG is the foundation of an individual voice, a global non-profit, or any organization that is part of the mission-driven .ORG community, we are proud to have earned the trust of so many dedicated users. more

Coders, Crackers and Bots, Oh My!

There are more than just blue, black and white hat hackers. There are a few more types of folks out there that don't fit into the above categories. This article is taken from Stratfor with some commentary by myself... Many of the hackers described in my previous post are also coders, or "writers," who create viruses, worms, Trojans, bot protocols and other destructive "malware" tools used by hackers... more

If Compliance Were an Olympic Sport

It probably won't raise any eyebrows to know that for practically every penetration tester, security researcher, or would-be hacker I know, nothing is more likely to make their eyes glaze over and send them to sleep faster than a discussion on Governance, Risk, and Compliance (i.e. GRC); yet the dreaded "C-word" (Compliance) is a core tenet of modern enterprise security practice. more

Why the Internet is Not Like a Railroad

When one person transmits the speech of another, we have had three legal models, which I would characterize as Magazine, Bookstore, and Railroad. The Magazine model makes the transmitting party a publisher who is entirely responsible for whatever the material says. The publisher selects and reviews all the material it published. If users contribute content such as letters to the editor, the publisher reviews them and decides which to publish. more