/ Most Viewed

Is IPv6 Wrestling Within an Unpredictable Telecommunications Industry?

The theme of the 40th International Institute of Communications (IIC) conference in Montreal this week was "Wrestling with unpredictability in Global Communications". The panel I had the pleasure to be part of was under the motto : "Broadband futures". One of the questions addressed to me : Should we be concerned about a shortage of IP addresses as more people use broadband networks for more things? more

Could Bulk-Registered Typosquatting Domains Be Connected to .ORG DNS Abuse?

Public Interest Registry (PIR) announced the creation of the DNS Abuse Institute about two months ago as it believes that "every .ORG makes the world a better place" and "anything that gets in the way of that is a threat," notably in the form of Domain Name System (DNS) abuse. To show support for the initiative, WhoisXML API analyzed monthly typosquatting data feeds for December 2020, January 2021, and February 2021 to identify .ORG domain trends... more

The Kindness of Strangers, or Not

A few days ago I was startled to get an anti-spam challenge from an Earthlink user, to whom I had not written. Challenges are a WKBA (well known bad idea) which I thought had been stamped out, but apparently not. The plan of challenges seems simple enough; they demand that the sender does something to prove he's human that a spammer is unlikely to do. more

Why Most People Haven’t Heard of the DNS Root Server System

At the ICANN 81 meeting in Istanbul on 10 November 2024, I gave a presentation about the DNS Root Server System, in an effort to increase understanding of the Root Server System (RSS) and Root Server Operators (RSOs). The talk was intended for the members of the ICANN Governmental Advisory Committee (GAC), but much of this explanation may be of interest to general audiences. more

Routing Without Rumor: Securing the Internet’s Routing System

The Domain Name System has provided the fundamental service of mapping internet names to addresses from almost the earliest days of the internet’s history. Billions of internet-connected devices use DNS continuously to look up Internet Protocol addresses of the named resources they want to connect to - for instance, a website such as blog.verisign.com. Once a device has the resource’s address, it can then communicate with the resource using the internet’s routing system. more

Making the Platform Relationship Win-Win

CSC recently participated in an open discussion at the World Trademark Review's APAC WTR Connect, where we moderated a discussion with brand owners, Western Digital and PVH, and platform owner, Alibaba, on the topic: "Making the Platform Relationship Win-Win." How do brands define what a platform is? For the brand owners, a platform could be any distribution service of their products -- be it a traditional eCommerce marketplace like Alibaba or Amazon.com -- or other digital service enablers... more

ICANN Must Now Decide String Similarity Question

Yesterday, a decision on a string confusion objection was reached by a dispute resolution provider that resulted in a scenario that ICANN and the Applicant Guidebook had not addressed - conflicting opinions have been rendered by expert panelists ruling on the exact same pair of strings. One of our applications now hangs in the balance. The expert panelist for the International Centre for Dispute Resolution (ICDR) assigned to decide the string confusion objection filed by VeriSign against United TLD's .CAM application, issued a decision sustaining VeriSign's objection that .CAM and .COM are confusingly similar. more

The Utility Formerly Known As WHOIS

Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more

Bluetooth-Based Attack Vector Dubbed “BlueBorne” Exposes Almost Every Connected Device

Security firm, Armis Labs, has revealed a new attack vector that can target major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them.

 more

VoIP Services Market Nears $50 Billion Mark

Market research firm Infonetics Research this week released VoIP and UC Services and Subscribers, a market share and forecast report that includes two Business VoIP Service Provider Scorecards that will be published later this year, and an IP Centrex Provider Tracker highlighting deployments by provider, region, service, and platform. more

Recommendations for Adding Cybersecurity Intelligence to the Smart Grid

Over the last few years, there has been an increased effort to modernize the U.S. electric grid. Building a "Smart Grid" has been central in the effort to help utilities better manage their resources, minimize power outages and reduce energy consumption. However, adding more electronic devices and sensors to the grid's network has made it a prime target of cyberattacks, like Distributed Denial of Service (DDoS) attacks, which if successful, could cause wide-spread disruption of services affecting many other sectors. more

Broadband Technology Improving - Faster, Smarter, and More Versatile Connectivity

Broadband infrastructure is advancing rapidly, from multi-gigabit cable and fiber networks to next-generation fixed wireless and satellite systems. With speeds reaching up to 25 Gbps for consumers and 1 Tbps in orbit, these developments mark a pivotal shift in connectivity, setting the stage for more scalable, flexible, and high-capacity networks. more

Defining KPIs to Measure the Success of Your AI Strategy

KPIs are industry-specific and should be aligned carefully with your AI strategy. My course at UC Berkeley drills down heavily on how to define success when implementing your AI strategy, and measurement, like anything else, is the top priority. One technique that can potentially be used in your organization as you embark on your AI strategy is to use the SMART method for KPIs. SMART stands for Specific, Measurable, Attainable, Relevant, and Time-Sensitive. more

Close to 200K Phishing Domains Discovered in a 5-Month Span, 66% Targetted Consumers, Akamai Reports

Between December 2, 2018 and May 4, 2019, 197,524 phishing domains were discovered, 66% of which directly targeted consumers according to the latest State of the Internet report by Akamai. more

US-China Tech War Threatens Global Internet Infrastructure: China Plans $500 Million Subsea Cable Rival

Chinese state-owned telecom firms plan an extensive undersea fiber-optic internet cable network to link Asia, the Middle East, and Europe. The cable, to be named EMA (Europe-Middle East-Asia), would cost approximately $500 million to complete and be manufactured and laid by China's HMN Technologies Co Ltd, a fast-growing cable firm whose predecessor company was majority-owned by Chinese telecom giant Huawei Technologies Co Ltd. more