A major concern about the present WHOIS is the level of data inaccuracy. The Expert Working Group (EWG) on Registration Directory Service (RDS), of which I had the pleasure of being a member, spent considerable time figuring out how to improve WHOIS data accuracy. The EWG in its final report proposed a new system, the RDS, which we believe will significantly address the flaws in the current WHOIS, including the data inaccuracy challenge. more
It's incredibly hard to keep things private in the new digital age. There are far too many stories circulating about people who talked to a friend on the phone or texted about something and almost instantly got hit with ads for the subject of the conversation. And that happens without malware - no telling what information you're giving out if your devices have been infected with malicious software that is spying on you. more
Delegation from the European Standardization Organizations (ESOs) - CEN, CENELEC and ETSI - met with Neelie Kroes, the Vice-President of the European Commission responsible for the Digital Agenda, in Brussels yesterday (2 April 2014) discussing how to maximize the positive contribution that standards can make to enhancing internet security and protecting personal data, in order to support the successful implementation of the EU Cybersecurity Strategy. more
In a major win for the public interest, the Broadband Data Improvement Act passed the Senate (on September 26th) and the House (on September 29th). Due to amendments, it now goes back to the Senate for final approval (should be pro-forma) before it lands on George Bush's desk. With the United States falling further and further behind a host of other countries, the question on many people's minds (including the folks over at Point-Topic who created this graphic) is, "Why is this happening?" more
There have been some interesting developments in cloud computing over the last year. For over five years our position has been that we acknowledge the enormous economic advantages that cloud computing has to offer, but at the same time recognise that the risk of losing control over data and IT systems is, at this stage, too great for most companies and governments to start utilising the cloud advantages in a serious way. more
The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more
Is it time for the IETF to give up? Martin Geddes makes a case that it is, in fact, time for the IETF to "fade out." The case he lays out is compelling -- first, the IETF is not really an engineering organization. There is a lot of running after "success modes," but very little consideration of failure modes and how they can and should be guarded against. Second, the IETF "the IETF takes on problems for which it lacks an ontological and epistemological framework to resolve." In essence, in Martin's view, the IETF is not about engineering, and hasn't ever really been. more
Among the hottest topics at the Broadband Leadership Summit, which was held during the ITU Telecom World 2011 in Geneva, were the issues in relation to the security of the various aspects of the digital economy. The key issue in relation to the governance of the internet relates to the many political, social and cultural differences between countries. This is one of the most contentious issues. more
Marketers and advertisers across the world pay close attention to Super Bowl ads, for good reason. At a cost of up to $5 million for a 30-second spot, Super Bowl ads represent the world's biggest stage for high-reach, large-impact marketing. The best practices seen on Sunday will set the standard across the industry and influence marketing behavior around the world. The call to action used in any Super Bowl spot can make or break the investment. more
As you may know, ICANN holds three public meetings every year. The most recent one, ICANN 54, was held in Dublin... So the next ICANN meeting is being held in Marrakech, Morocco starting Saturday, March 5th through March the 10th. Up until now all three meetings were the same length and had the same basic structure. However, from this year onwards, that'll change. How that will play out in reality, however, is anyone's best guess. more
During the 4th quarter of 2014, a record number of malware variants were detected -- an average of 255,000 new threats each day, according a recent report by Anti-Phishing Working Group (APWG). The group further reports that the number of unique phishing reports submitted to APWG during Q4 was 197,252 -- an increase of 18 percent from the 163,333 received in Q3 of 2014. more
Multiple new gTLD applicant Famous Four Media is having a very good week. "FFM", the name that they now use for the company to be acknowledged, is getting closer to an important period of its development: the General Availability, also known as "GA", for three of its domain name extension. Added to this, another announcement was made to make it known. more
Domain name monitoring - that is, the detection of domains with names containing a brand-term (or other string) of interest - is a very well-established element of brand protection services. Branded domain names are of key importance to brand owners (as the basis for business-critical infrastructure (i.e. 'core' domain names), and as part of a 'tactical' portfolio of strategic and defensive registrations), but also to infringers, who can utilise domains as a means of impersonation, passing off, claimed affiliation, or traffic direction and monetisation. more
With the COVID-19 pandemic persisting, online shopping will be the preferred method for the 2020 holiday shopping season. While staying home to shop is the safest option right now, it means consumers are more vulnerable to online fraud, counterfeits, and cyber crime. Increased online activity provides opportunities for unscrupulous infringers to abuse trusted brand names to drive visitors to their own fraudulent content. more
Want to learn more about DNSSEC deployment challenges? Interested in learning about a DANE middlebox for HTTPS? Curious about how the upcoming DNSSEC Root Key Rollover will affect systems? And have you heard about the CDS and CDNSKEY records for DNS? What are they -- and what impact will they have on ICANN policies? more