The Top-Level Domain (TLD) .versicherung (German word for INSURANCE) managed by dotversicherung-registry GmbH in Hamburg, will be holding an international auction executed by Right of the dot, LLC in Lauderdale USA in collaboration with Heritage Auctions. The auction will take place on 26th of August 2015, 10:00 am Eastern Standard Time (UTC -4:00). more
Last week (29-30 April), Global Partners Digital (GPD) joined other civil society groups, business actors, the technical community and governments in São Paulo, Brazil for NETmundial+10: the ten year follow up to the landmark NETmundial process in 2014, which set out principles for multistakeholder approaches to Internet governance. In the intervening decade, the policy landscape has been transformed by an increase in policy and normative frameworks related to digital technologies, as well the advent of new technologies—particularly AI—and their attendant opportunities and challenges. more
Brandsight recently concluded their Second Annual Domain Management Survey. Respondents to the survey were corporate domain name professionals. Of those that responded, 35% had portfolios that were between 3,000-10,000 domains and another 30% had portfolios greater than 10,000 domains. Fifty-seven percent of respondents reported that they manage domains out of the legal department, with the remaining respondents' portfolios managed out of IT, marketing and other groups. more
I've had a number of people ask me about how I think COVID-19 will impact the ISP industry over the next six months. It's an interesting question to consider because there are both positive and negative trends that ISPs need to be concerned about. The chances are that these various trends will affect markets and ISPs differently - making it that much harder for an individual ISP to understand what they are going to see over the next six months. more
Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more
Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation." more
Juliana Gruenwald reporting in the NationalJournal: "Nearly six months after the program was launched, key members of Congress are still raising concerns about a plan to introduce hundreds of new Internet addresses into the domain name systems, saying they want fresh assurances that the new strings will not harm trademark holders and that the public has adequate opportunity to comment. The latest salvo came on Tuesday from the top leaders of the House and Senate Judiciary committees..." more
Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more
As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more
Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more
According to a report from The Washington Post, the NSA has linked the North Korean government to the creation of the WannaCry ransomeware that resulted in affecting over 300,000 people in almost 150 countries last month. more
Journalists and political activists critical of Kazakhstan's authoritarian government, along with their family members, lawyers, and associates, have been targets of an online phishing and malware campaign believed to be carried out on behalf of the government of Kazakhstan, according to a new report by the Electronic Frontier Foundation (EFF). more
To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures. more
United Nations Human Rights Council today adopted resolutions condemning measures to intentionally prevent or disrupt access or dissemination of information on the Internet in violation of international human rights law. more
Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more