/ Most Viewed

As DENIC’s CEO Jörg Schweiger Prepares to Step Down, He Speaks About His Time at DENIC

In January Jörg Schweiger, DENIC's CTO from 2007 to 2014 and CEO since 2014, announced he was stepping down from his position in December. It's been quite a ride, and the domain name industry has evolved quite a lot. So we asked Jörg a few questions about his time with DENIC and the changes he's seen... he came up with some insightful views on why he thought new TLDs missed a great opportunity to do something with "innovative new business models," the importance of security to DENIC... more

Strategic Use of Screenshots from the Wayback Machine

Internet Archive contains a vast library of screenshots of websites that its Wayback Machine captures sporadically over the course of domain names' histories. While it doesn't compile daily images it opens a sufficient window to past use which is unique, invaluable, and free. (There are also subscription services, but they come at a hefty cost!). How it's used (and why the Wayback Machine should be in a party's toolkit) for supporting and opposing claims of cybersquatting is illuminated in a number of recent UDRP cases. more

The Path to DNS Privacy

The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various forms of content access control. But all this is poised to change. more

Trust Has Eroded Within the Cybercriminal Underground Causing a Switch to Ecommerce Platforms

New data released today indicates that trust has eroded among criminal interactions, causing a switch to ecommerce platforms and communication using Discord, which both increase user anonymization. more

The UK Seeks to Enforce Tougher Standards on MSPs

The UK government is proposing new regulations to strengthen cyber resilience in the private sector. Their intention is to expand cybersecurity rules for critical infrastructure (CI) operators to include managed service providers (MSPs), more stringent breach notification requirements, and legislation to establish the UK Cyber Security Council as the standards development organization for the cybersecurity profession. This is a welcomed development, but more details about implementation and enforcement are needed. more

The DNSSEC Industry Coalition Meets to “Make It So”

The DNSSEC Industry Coalition conducted its first face to face meeting on Friday, March 13, 2009 at Google's Washington, DC office. Google's fun filled meeting room was packed with organizations that share a keen interest in DNS Security through the implementation of DNSSEC. more

“Do’s and Don’ts”: Commenting on New gTLD Applications

regarding the new gTLD applications and, unfortunately, I have been largely disappointed with the substance of most of them. Too many of the earliest comments express concern over the possibility of having more adult-related extensions. Okay, we hear you... Also, with all due respect to the supporters of Dadotart's application, I appreciate the display of loyalty to this particular applicant but if I have to read another comment from an "impassioned supporter" of the .ART application, I will bang my head on my desk. more

Newly Discovered Malware Called VPNFilter is Targeting at Least 500K Networking Devices Worldwide

Cisco's security arm, Talos, today revealed a several-month-old research on a sophisticated modular malware system dubbed "VPNFilter. more

Does ICANN’s UDRP Preserve Free Speech and Allow Room for Criticism?

The phenomenal growth of the Internet has resulted in a proliferation of domain names. The explosion of '.com' registrations coincided with an increase in domain name disputes, and with it the legal branch of intellectual property devolved into virtual mayhem. ICANN's Uniform Domain-Name Dispute-Resolution Policy (UDRP) was created... The UDRP was brought into force in October 1999, and it can be said that it has contributed handily to the resolution of domain name disputes. However, deeper investigation into the UDRP paints a different picture. more

Time for Reformation of the Internet

An anonymous writer posted an article titled Time for Reformation of the Internet on Susan Crawford's blog. The article calls for a liberal approach towards ICANN, making a number of references to IETF and its process. "It's time for netizens to come to a similar realization about their direct relationship with the empowerment offered by the internet. None of the core principles that produced the net give any set of clerics -- even the original engineers, or ISOC, much less ICANN -- the right to prevent innovation at the edge..." more

The Sad State of WHOIS, and Why Criminals Love It

I'm not even sure how to begin this post, but let me tell you -- my head explodes when I try to contact WHOIS "contacts" about criminal activity - FAIL. I think ICANN wants to do the right thing here, and has stated on multiple occasions that inaccurate WHOIS data is reason for registrar termination. That's a Good Thing... more

As the Comcast Saga Unfolds, Be Careful What You Wish For

Comcast has been in the news recently for deliberately "slowing down" some subscribers and applications in its broadband cable service. There was an article in the Washington Post today updating the case, and there was a recent article in Network World that actually favors the groups filing the complaints and calls for the FCC to crack down on Comcast. more

Enterprise Networks Are Being Impacted by Unwanted and Unidentified Cryptomining Activity

Researchers at security service provider, Zscaler, are reporting that in the past six months they have blocked over 2.5 billion web-based cryptomining attempts within their cloud service. more

Namecoin Decentralized DNS Research

The holidays open up a block of time to catch up on "I meant to read that" bookmarks, RSS feeds, and all the favorited and forgotten tweets. I made it through 50 before a NormanShark blog post kicked off a research project. The analysts found a malware sample which was using .bit domains in their communications infrastructure, but .bit ... what is that? .bit is a TLD operating outside of ICANN. Some would say they are TLD squatting, but I leave that opinion up to the reader. more

Can VeriSign Sue You Over SiteFinder?

Attention so far has been focusing on the ethics of the move (positively satanic), its effects on DNS and non-Web applications (Considered Harmful), and on possible technical responses (Software Aimed at Blocking VeriSign's Search Program). On the legal side of the fence, though, we're not just talking about a can of worms. We're talking about an oil drum of Arcturan Flesh-Eating Tapeworms. more