/ Most Viewed

Wi-Fi 8: Beyond Speed, Towards Seamless Connectivity

As the IEEE 802.11 task force turns its attention to developing Wi-Fi 8, the next iteration of wireless networking standards, the focus has shifted from sheer speed to enhancing user experience. more

Water Supply System Apparently Hacked, with Physical Damage

According to press reports, a water utility's SCADA network was hacked. The attacker turned a pump on and off too much, resulting in physical damage to the pump. ... For years, security specialists have been warning that something like this could happen. Although more and more people have started to believe it, we still hear all of the usual reassuring noises -- the hackers don't know enough, we have defenses, there are other safeguards, etc. That debate is now over... more

The U.S. “Scorecard” for Brussels: Draconian Trademark Rules & The End of Private-Sector Leaders

The U.S. "Scorecard" for Brussels Proposes Draconian Trademark Rules - And May Mean the End of Unlimited New gTLDs and/or the ICANN Experiment in Private Sector-Led Internet Governance... On Friday, January 28th the U.S. Department of Commerce (DOC) circulated its submission to ICANN's Governmental Advisory Committee (GAC) containing suggestions for what positions the GAC should push for at its February 28 - March 1 meeting with ICANN's Board to air disagreements over provisions of the Proposed Final Applicant Guidebook (AG) for new gTLDs. more

Harmonizing WHOIS With NIS2 Article 28 - the Rubber Is About to Meet the Road

ICANN must act now to harmonize its domain name registration data (commonly known as WHOIS) policies with Article 28 of the European Union's Network and Information Security (NIS2) directive, first to adhere to applicable laws as it fulfills its oversight responsibilities and, second, to keep its word to the community to preserve WHOIS to the fullest extent possible under law. more

The Insecurity of Ambiguous Standards

Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... more

ICANN Begins Publishing Monthly Reports on Generic Top-Level Domain Security Threats

ICANN has published its first new monthly report providing statistics and insight into security threats to generic top-level domains (gTLDs). more

Global DNS Record Manipulation, Hijacking Campaign at Massive Scale Linked to Iran

A wave of DNS hijacking is reported to have affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. more

The ICANN New Generic TLD Process (Las Vegas Edition)

I have not submitted any comments on ICANN's new gTLD process, mostly because many other people have said more diplomatically what I think, but I thought I could blog about it. My main concern from the beginning was that the process should allow any serious candidate to run with a reasonable chance to be able to actually start running a gTLD. This includes small and medium sized communities and startup companies with little seed money. This also includes registry models that may not favour mass registrations. For all these, the current model is flawed. more

Is Your New TLD Protected Against Phishing and Malware?

Until now, the criminals behind malware and phishing have had only 22 generic top-level domain names (TLDs) to abuse -- names like .com, .net or .org. But with hundreds of new TLDs entering the marketplace, e.g. .buzz, .email, and .shop, there are many more targets than ever... What can attackers do with domain names? more

FISMA Failings: Could EPA’s IT Defense Deficiencies Silence the Agency?

The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more

URS Is a Bad Fit for .ORG, Says EFF

The online digital rights group, Electronic Frontier Foundation (EFF) on Tuesday published a post warning ICANN's latest move requiring the use of Uniform Rapid Suspension (URS) for .org domain names is a "bad fit." more

Mozilla Named “Internet Villain” for Supporting DNS-Over-HTTPS by a UK ISP Association

Mozilla was nominated as one of the three ISPAUK's 2019 Internet Villains for their proposed approach "to introduce DNS-over-HTTPS in such a way as to bypass UK filtering obligations and parental controls, undermining internet safety standards in the UK." more

Massive AWS Outage Disrupts Global Internet, Services Restored After DNS Failure

A major Amazon Web Services outage briefly disrupted millions of websites, apps, and smart devices worldwide. The DNS-related failure exposed the internet's heavy dependence on a few cloud providers before full recovery was achieved. more

IPv6: SAVA, Ca va pas?

Sender Address Validation and Authentication (SAVA) is the silver bullet. It will send to Cyberia all dark forces that make us shiver when we make a purchase on the internet, pose a threat to our very identities and have made DDoS a feared acronym. Some of you will remember the heated debates when Calling Line Identification (CLID) was first introduced in telephony. Libertarians of all stripes called passionately to ban such an evil tool... more

Internet Governance Forum in Hyderabad, India

Tomorrow Internet Governance Forum (IGF) starts. The overall discussion topic this year is How to reach the next billion(s), and that builds on the fact that today we have around one billion Internet users. A number that will explode when all different kinds of devices, from cellphones, to TV sets to toasters will be Internet connected... Some workshops have been cancelled and panelists have been replaced as many people and organisations have made the decision to not go to India. more