/ Most Viewed

Domain Security: An Underused Cybersecurity Strategy and First Line of Defense in Your Zero Trust Model

Domain security is a critical component to help mitigate cyberattacks in the early stages - your first line of defense in your organization's Zero Trust model. According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks - including ransomware and business email compromise (BEC) - begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't adequately address phishing risks in the early stages of an attack because they don't include domain security measures to protect against the most common phishing attacks. more

Now Available: Worldwide and Local Current Starlink Performance

The blue dot circled is our dish in the center of Vermont. Volunteers run software that collects statistics every 15 minutes and uploads them to update the tables and the map at https://starlinkstatus.space. You can see below that we have been averaging download speeds of 143Mbps, upload around 12Mbps, and ping times of 43ms. Below, you can see our most recent updates, including the percentage of time our dish was obstructed (0% happily). There are also tables with country and region-wide averages. more

Innovative Solutions for Farming Emerge at the Apps for Ag Hackathon

Too often, people consider themselves passive consumers of the Internet. The apps and websites we visit are made by people with technical expertise using languages we don't understand. It's hard to know how to plug in, even if you have a great idea to contribute. One solution for this problem is the hackathon. For the uninitiated, a hackathon is a place of hyper-productivity. A group of people converge for a set period of time, generally a weekend to build solutions to specific problems. more

OIAC Report: Views on Economic Impacts of Open Internet, Mobile Ecosystems, Specialized Services

Having been a member of the Committee for this past year, I'm pleased to share that the US Federal Communications Commission (FCC) "Open Internet Advisory Committee" has published its first annual report... The report is weighty - 98pp if you kill trees to print it. The OIAC was established as part of the US FCC Open Internet activity and Open Internet Report and Order from 2010. The FCC appointed expert committee members from a broad range of commercial, academic, and not-for-profit organizations. more

The [Dot]Brand Tribes - Part 3

In part two of The [Dot] Brand Tribes we argued that introducing new branded generic Top-Level Domains (gTLDs) would bring value to brand owners and have positive effects on customer recognition. In this last post we'll continue that theme and talk about how brand owners can come together to provide shared spaces using the banking industry as an example. more

FTC Report on Broadband Resurrects Freedom of Service Information

The Federal Trade Commission intends to monitor the information that telecom and cable companies provide about high-speed Internet service in the service plans they offer to customers, according to a report issued last week by the agency. The FTC asserts in the report, released on June 27, that since it has jurisdiction over matters involving consumer protection, it "will continue to enforce the consumer protection laws in the area of broadband access."... The consumer protection sections of the FTC report raise this question: are broadband providers engaging in a deceptive practice when they advertise a connection speed of, for example, "up to" 768 kilobits per second (kbps) - and yet actual speeds are considerably lower? more

Marketing Activities for New TLDs That Can Start Right Now

Sitting on the plane after a tightly packed 3 days in Amsterdam for the regional registrars meeting, I'm bursting with ideas and thoughts. The highlight of the event for me was the meeting organized by Google to propose the creation of a trade association on behalf of TLDs. Brilliant and long overdue. The comedy of the situation the domain name industry has lived with since its inception is the fact that it actually doesn't exist in the eyes and minds of the average business or consumer. Domain names are simply a by-product of websites, or possibly even web-hosting.  more

Q3 Saw Massive Virus Volumes While Spam Remained Steady

Spam and virus trends in Q3'10 confirm that spammers are still hard at work distributing malicious content in new and creative ways, according to the latest reports. The latest spam and virus trends report is produced by Postini, Google's email security and archiving service that, according to the company, processes more than 3 billion email messages per day and more than 50,000 businesses. more

A Brief Primer on Anti-Satellite Warfare Tactics

Satellites make it possible for governments to provide essential services, such as national defense, navigation, and weather forecasting. Private ventures use satellites to offer highly desired services that include video program distribution, telecommunications, and Internet access. The Russian launch of a satellite, with nuclear power and the likely ability to disable satellites, underscores how satellites are quite vulnerable to both natural and manmade ruin. more

If It Doesn’t Exist, It Can’t Be Abused

A number of outlets have reported that the U.S. Post Service was hacked, apparently by the Chinese government. The big question, of course, is why. It probably isn't for ordinary criminal reasons: The intrusion was carried out by "a sophisticated actor that appears not to be interested in identity theft or credit card fraud," USPS spokesman David Partenheimer said. ... But no customer credit card information from post offices or online purchases at usps.com was breached, they said. more

Toxic Information

U.S. intelligence officials are increasingly worried that hackers could wreak havoc on the financial system. Read the story here in National Journal. Not that we need it, but here's yet another reason to worry about havoc in financial markets: U.S. intelligence officials increasingly fear that computer hackers could wreck banks and large financial institutions, or send stock markets into one more panicked frenzy, by covertly manipulating data and spreading false information. more

How Long Does a URS Case Take?

The Uniform Rapid Suspension System (URS) -- which allows a trademark owner to suspend certain domain names, especially those in the "new" gTLDs -- was designed as a quicker and less-expensive alternative to the Uniform Domain Name Dispute Resolution Policy (UDRP). As I've written frequently before, there are significant differences between the URS and the UDRP. One of those differences is how long a typical proceeding lasts. more

China Accused of ‘Weaponizing’ Global Internet Users to Launch DDoS Attack

Activists battling internet censorship in China are reporting that they have proof of a massive online assault on their websites by the Chinese authorities. The attack, which began last Thursday, targeted two GitHub projects designed to combat censorship in China: GreatFire and CN-NYTimes, a Chinese language version of the New York Times. more

China and Taiwan to Lead the Development of 4G

China missed out on playing a leadership role in the development of 3G and as we predicted at that time, China would most certainly start looking at 4G for a major involvement in developing the technologies for it. more

‘Internet Fragmentation’: A Defining Challenge for Digital Technology Governance?

At the recent Internet Corporation for Assigned Names and Numbers (ICANN) 80 Policy Forum meeting, one notable takeaway was its close focus on questions around the stability and security of the technical layer of the Internet: the growing risks which assail it, and potential ways to address these through governance. more