/ Most Viewed

WHOIS Detractors and Advocates: Today’s Viewpoints Post-GDPR

Opposing parties continue to debate whether WHOIS should stay after the General Data Protection Regulation (GDPR) took effect across the EU in May 2018. While the Internet Corporation for Assigned Names and Numbers (ICANN), which oversees WHOIS, is looking for ways to be GDPR compliant, experts from various fields are contemplating the problems pointed out by officials. more

Most Cyberattacks Are From Hostile States, Reports U.K.‘s National Cyber Security Centre

A report from the U.K.'s National Cyber Security Centre blames hostile foreign states for the majority of the 1,167 attacks dealt with in the past two years. more

Why Platform Regulation Concerns ICANN

With the publication of the Australian Governmental report on Digital Platforms1and in the light of the ongoing work on the EU's Digital Services Act, the spotlight of policymaking is on platforms such as Google, Facebook and Amazon. It is natural that members of the ICANN community want to discuss the role of platforms within the ICANN framework, but sadly and predictably, the usual bylaws jockeys and keepers of the true ICANN faith were quick to stifle the conversation. more

Will ICANN’s gTLD Flood the Sub-Domain Registrations?

Obviously, the market will explode if there were a few hundred new gTLDs creating global excitement and building new platforms on ecommerce and cyber-branding. The media hype and breakaway stories will create a boom to the traffic; all types of new and old names will be registered under current and re-registered under new gTLDs wherever possible. more

Landmark IPv6 Report Published: State of Deployment 2017

On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five years. In mid-2012, Google measured less than 1% of users accessing their services over IPv6. Today that figure is getting close to 20%. Since World IPv6 Launch, several major operators are now delivering the majority of traffic from major content sources like Google, Akamai and others over IPv6. more

Meeting Report: ICANN’s Registration Data Request Service Requestor Experiences

During CSG Open Working Session at ICANN79, Members from the ICANN Community were invited to an open meeting to share their experiences with Registration Data Request System (RDRS) from the Requestor side. As President of the Edgemoor Research Institute (ERI), I had the honor to present the keynote address and I am pleased to be able to provide you with ERI's report of the meeting. more

Cuba Claims New Regulations Expand Internet Access to Homes and Businesses, But Here’s the Downside

New Cuban regulations regarding private WiFi networks went into effect yesterday, and the New York Times and others proclaimed that "Cuba expands Internet access to private homes and businesses." Yes, Cubans can legally import and install WiFi routers in their homes, small cafes, B&Bs, etc., but these regulations will make little difference in Internet access. more

Correlation Between Country Governance Regimes & Reputation of Their Internet Address Allocations

We recently analyzed the reputation of a country's Internet (IPv4) addresses by examining the number of blacklisted IPv4 addresses that geolocate to a given country. We compared this indicator with two qualitative measures of each country's governance. We hypothesized that countries with more transparent, democratic governmental institutions would harbor a smaller fraction of misbehaving (blacklisted) hosts. The available data confirms this hypothesis. A similar correlation exists between perceived corruption and fraction of blacklisted IP addresses. more

A Climate of Change for the Caribbean Internet

Spring storms with winter qualities clobbered North America this week, threatening Canada with slow-moving storms, and pounding the United States with near-record snowfall in the midwest, low temperatures in the south and tornadoes further east. You could say change was in the air. And although the unseasonable weather didn't reach as far south as Florida, the climate of change still dominated the atmosphere at the fifteenth regional meeting of the Caribbean Network Operators Group (CaribNOG). more

Dissecting the (Likely) Forthcoming Repeal of the FCC’s Privacy Rulemaking

Last week, the House and Senate both passed a joint resolution that prevent's the new privacy rules from the Federal Communications Commission (FCC) from taking effect; the rules were released by the FCC last November, and would have bound Internet Service Providers (ISPs) in the United States to a set of practices concerning the collection and sharing of data about consumers. The rules were widely heralded by consumer advocates, and several researchers in the computer science community, including myself, played a role in helping to shape aspects of the rules. more

Remote Work Demands Encryption

Now that we are all working from home (WFH), the need for encryption must also increase in priority and awareness. Zoom's popular video conferencing solution got in hot water because they promised "end-to-end" encryption but didn't deliver on it - prompting some organizations to ban it from use altogether. Encryption protects confidential information from being exposed in transmission, providing a secure way for the intended recipient to get the information without snooping by others. more

When to Consider ‘Both Sides of the Dot’ in a Domain Name Dispute

In the case, filed by Michelin, the panel found the domain name 'tyre.plus' confusingly similar to the trademark TYREPLUS. Specifically, the panel wrote: "If one ignores the 'dot' between the Second-Level Domain ('tyre') and the Top-Level Domain ('plus'), the mark and the Domain Name are identical..." It's an issue that's arising with increasing frequency -- just as I had predicted. more

German Minister: Facebook Should Be Treated as Media Company, Held Criminally Liable for Hate Speech

Germany's Justice Minister says Facebook should be treated like a media company rather than a technology platform, suggesting he favors moves to make social media groups criminally liable for failing to remove hate speech. more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

Why Domain Security Is Your First Line of Defense to Mitigate Phishing Attacks

According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more