/ Most Viewed

Faceobook on Connecting the World from the Sky

Facebook has announced more details on how its Connectivity Lab is working to connect the world from the sky with drones, satellites and lasers. more

Rewiring Internet Governance: Summing up ICANN Policy Walking Backward Into the Future (Part 4)

So-called "globalization" and its corollaries which are trade policy and, thus, foreign policy intersect with telecommunications. This ought to be obvious and it is not new. For example, in December 2011, OECD adopted its "Recommendation of the Council on Principles for Internet Policy Making", the latter which apparently connects with an earlier U.S. cyberspace strategy based on something called the "Internet Freedom Agenda" dated 21 January 2010... more

What Smaller Institutions Can Learn from DDoS Attacks on Big Banks

Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase, Wells Fargo and PNC were among the first to sustain intermittent damage. Eventually, the top 50 institutions found themselves in the crosshairs... In the months to come, security experts would praise the banks' collective response, from heightened DDoS protection to candid customer communications.. these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks. more

New gTLDs and the Power of “Because”

Despite numerous false starts over the last decade it appears that 2011 will be the year ICANN finally implements a new generic Top-Level Domain (gTLD) process that will lead to the responsible expansion of the domain name space. One of the important remaining steps in this process will be the upcoming meeting between the ICANN Board and the Government Advisory Committee (GAC) intended to resolve a number of outstanding differences. more

The Tale of Thousands of Hacked Modems in Brazil, Affecting Millions

Kaspersky Lab Expert, Fabio Assolini, has provided detailed description of an attack which as been underway in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, affecting 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems. more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Work in Progress: Preparing the Next Round of New gTLDs

There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more

The IANA Transition’s Terrible, Horrible, No Good, Very Bad Day

Thursday, September 8, 2016 was a terrible, horrible, no good, very bad day for the prospects of the IANA functions transition being completed by October 1, 2016. Indeed, that same date - but in 2017 - may be the earliest that the handoff from NTIA to ICANN can be completed, given what last Thursday. The day began with the announcement that Sen. Ted Cruz would be making his first Senate floor remarks since exiting the Republican Presidential race, and that the talk's focus would be a continuation and escalation of his long-standing opposition to "Obama's Internet giveaway". Shortly after 11 am, Sen. Cruz began speaking from his Senate desk... more

First Root Zone DNSSEC KSK Ceremony

ICANN will hold the first Root Zone DNSSEC KSK Ceremony on Wednesday 2010-06-16 in Culpeper, VA, USA. ... Attendance within the key ceremony room itself will be limited to just those with an operational requirement to execute the ceremony. However, since this event has generated significant interest, we have made additional space available in an adjacent room for observers who wish to attend the event. more

Why Small and Medium-Size Operators Should Care About Sustainability

A new resource dedicated to small and medium-sized digital infrastructure providers highlights the benefits of incorporating sustainability into their operations, offers a consolidated list of best practices and recommendations, and shares additional resources to help make practical changes to save time, energy, and money. more

The Perfect, the Good, and the FCC

It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more

The Over-Optimization Meltdown

In simple terms, Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month's worth of payroll. There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. more

Stealth Cyberattacks by China’s Volt Typhoon Threaten U.S. Infrastructure: Microsoft Unmasks Espionage Campaign

Microsoft today disclosed the detection of covert and targeted malicious activity aimed at critical infrastructure organizations in the United States. The attack is orchestrated by a state-sponsored group from China, known as Volt Typhoon, with the suspected objective of disrupting the communication infrastructure between the U.S. and Asia during potential future crises. more

Domain Abuse: Are We Speaking the Same Language?

For those of us in the domain name industry, it's clear that security threats and the way we track, report, and mitigate them has been a topic of increased discussion and focus in recent months. As we prepare to come together as a community again at the next ICANN public meeting in Marrakech, many of us will look to continue these conversations, as there is no doubt it is a topic of importance, relevance and urgency for our community at this time. more

Bring a Responsible Closure to the New gTLD Process - The Home Stretch

Over the course of the last year, the ICANN Board and Governmental Advisory Committee (GAC) have constructively worked through a long list of their differences contained in the GAC scorecard. As we near the finish line with Monday's scheduled ICANN Board meeting to approve the Applicant Guidebook, there remains a small handful of issues that will hopefully be resolved in a similar responsible manner during Sunday's ICANN Board/GAC consultation. more