/ Most Viewed

3 Strategies for Keeping ICANN and IANA On-Mission and Out of Politics

Over the last year, the ICANN community has been raging on about two issues: the looming IANA transition away from the US government, and how to ensure the organization is accountable to all the Internet's stakeholders. While the issues have run on separate tracks, they both boil down to one question: can ICANN be trusted to be a good steward of the Internet's future? The answer to this question will go a long way in deciding ICANN's future. more

US Fibre Projects: Go-Aheads Omit the Major Telcos

As the recent Senate vote on gun reform legislation has shown (wherein 42 of the 45 dissenting senators had recently received donations from gun industry lobbyists), getting things done for the good of the people is a hard task where legislation is concerned. It has been thus with the US's broadband infrastructure for years. A number of states have legislated against community broadband networks, often resulting from the lobbying efforts of the main telcos affected. State Legislatures commonly pass bills revoking local decision-making authorities from communities, effectively making them dependent on the dominant cableco and DSL provider. more

Total Domain Registrations Pass 193 Million Worldwide, Grew by 1 Million in Q1

The first quarter of 2010 closed with a base of over 193 million domain name registrations across all of the Top-Level Domain Names (TLDs), an increase of more than 1 million domain name registrations, or 0.6 percent, from the fourth quarter of 2009, according to the latest Domain Name Industry Brief published by VeriSign. "Compared to the first quarter of 2009, domain name registrations grew by 11 million, or 6 percent. The base of Country Code Top Level Domain Names (ccTLDs) dropped to 76.3 million domain names, a 2.9 percent decline quarter over quarter, but a 3.2 percent increase year over year." more

WHOIS Database Download: Proactive Defense Against the Rising Tide of BEC Fraud

How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more

Call for Participation – ICANN DNSSEC and Security Workshop at ICANN67, Cancun, Mexico

The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop during the ICANN67 meeting held from 07-12 March 2020 in Cancun, Mexico. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present, and discuss current and future DNSSEC deployments. more

The Legacy of the Pai FCC

As is normal with a change of administration, there are articles in the press discussing the likely legacy of the outgoing administration. Leading the pack in singing his own praises is former FCC Chairman Ajit Pai, who recently published this document listing a huge list of accomplishments of the FCC under his Chairmanship. Maybe it's just me, but it feels unseemly for a public servant to publish an official self-praise document. more

No Apparent Financial or Political Motivation Behind Dyn DDoS Attacks, Says Intelligence Firm

In an after-action analysis of the Mirai botnet attacks on Dyn, business intelligence firm, Flashpoint has assessed with "a moderate degree of confidence" that the perpetrators behind the attack were most likely not politically motivated, and most likely not nation-state actors. more

Pyeongchang Olympics Organizers Investigating Possible Cyberattack on Opening Day

Reports from various sources indicate Pyeongchang Olympics organizers were looking into a disruption of non-critical systems on the day of the opening ceremony but could not yet confirm if it was a cyberattack. more

Study Reveals 76% of Internet Users Vulnerable to Browser History Detection

A recent study reveals a browser history detection method, largely dismissed as an issue with minimal impact, can in fact be used against a vast majority of Internet users with significant malicious potential. Researchers, Artur Janc and Lukasz Olejnik, analyzed real-world results obtained from 271,576 Internet users and have reported the results in a paper titled, "Feasibility and Real-World Implications of Web Browser History Detection"more

USA Fibre Investments Encouraging Further Operator Expansion

According to data from the FttH Council, the number of homes passed with fibre in the US increased 13% in 2015, year-on-year, to 26 million. Combined with Canada and Mexico, the number of passed homes has reached 34 million. The take-up rate is excellent by international standards, at more than 50%. Commonly operators look to about 20% to 30% take-up before work can begin on new fibre infrastructure to communities. more

Will PDP 3.0 Save the Multi-Stakeholder Model?

For the past several months, there has been much discussion within the ICANN community about something called "PDP 3.0". This has been raised in a number of different contexts including as part of ICANN's new governance review. But what exactly is PDP 3.0? And, will it save ICANN's multi-stakeholder governance model? I believe that if we are to save the multi-stakeholder model then now is the time to address the big issues not just the low hanging fruit on the surface - a new approach to achieving consensus across parties with widely differing views is needed. more

Fear of Disaster: 5 Tips to Help Enterprises Cope

IT disasters can strike anywhere, anytime. In 1983, a faulty Soviet warning system nearly precipitated World War III -- the system claimed five missiles were en route from the U.S. Only quick thinking by Lt. Col. Stanislav Petrov saved the day when he realized the United States would never launch so few warheads. And in 2004, a private contractor working with the British Child Support Agency (CSA) suffered a glitch that overpaid 1.9 million people and underpaid 700,000. more

Is the Internet Sustaining the Growth Trajectories Observed as the COVID-19 Pandemic Hit the World?

With the COVID-19 pandemic hitting the fifth month of global disruption, many companies have readily shared data, statistics and observational insights on how the pandemic has impacted the global data infrastructure. At DE-CIX, we quickly observed core Internet infrastructure demand increasing and readily reported this data in April of 2020. Microsoft's CEO Satya Nadella remarked to DatacenterDynamics in April of 2020 "we have seen two years' worth of digital transformation in two months." more

Web Localization: Sometimes as Simple as a Black and White

The death of Thailand's King Bhumibol Adulyadej has led to stores running out of black and white clothing as the population mourns its leader in color-appropriate clothing. What does this mean for website localization? ...Web localization isn't just about creating a localized website and forgetting about it. It's about creating a living and breathing website that responds quickly to local events. Web localization is about respect. more

Best Practices for Implementing IPv6 and Avoiding Traffic Exposures

There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks. As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. more