Between December 2, 2018 and May 4, 2019, 197,524 phishing domains were discovered, 66% of which directly targeted consumers according to the latest State of the Internet report by Akamai. more
People have been trying to measure the global diffusion of the Internet and the digital divide between rich and poor nation for twenty five years. The first to do so was Larry Landweber, who noted whether or not a nation had an Internet (or other) connection. It was a binary metric -- yes or no -- and it was suitable to its time because there were only a handful of users who were restricted to teaching and research, using a few applications like email, file transfer, news groups and remote login. more
The notorious social networking website 8chan was taken offline on Monday afternoon following discontinuation of support from various service providers to the platform over its links to the mass shooting in El Paso, Texas. more
This week, the headlines seem to be full of fresh doom and gloom for wireline carriers, who employ people in every congressional district across America. Sooner or later, someone is going to call for Congress to tap some of the hundreds of billions in 2009 economic stimulus to help the LECs through troubled times, save lots of jobs, and preserve the way we do business in our critical last-mile communications infrastructure. Is this wise? Is there a better way? more
On December 9, 2009, the ICANN Board announced its intention to vote during its upcoming February 4, 2010 meeting to approve a plan by which ICANN would solicit "Expressions of Interest" (EOI) from prospective applicants for new Generic Top Level Domains (gTLDs) such as .BLOG. But given a number of significant governance and public policy concerns raised by the current EOI proposal, the ICANN Board should take no action on it before the next in-person ICANN regional meeting--in Nairobi, March 3-7, 2010. more
Over the last few years, there has been an increased effort to modernize the U.S. electric grid. Building a "Smart Grid" has been central in the effort to help utilities better manage their resources, minimize power outages and reduce energy consumption. However, adding more electronic devices and sensors to the grid's network has made it a prime target of cyberattacks, like Distributed Denial of Service (DDoS) attacks, which if successful, could cause wide-spread disruption of services affecting many other sectors. more
The Domain Name System has provided the fundamental service of mapping internet names to addresses from almost the earliest days of the internet’s history. Billions of internet-connected devices use DNS continuously to look up Internet Protocol addresses of the named resources they want to connect to - for instance, a website such as blog.verisign.com. Once a device has the resource’s address, it can then communicate with the resource using the internet’s routing system. more
Last year, around the same time, the release on the same day of two flagship reports on 'the Internet' had prompted me to write an article on CircleID entitled 'Connecting the Next 46 Percent: Time to Pick the Good From the Bad and the Ugly'. I was then prudently asking whether 'the more we connect the world, the less free it becomes?'. Who would have known that a pandemic would erupt a few months later, unveiling different perspectives in assessing that very same question? more
A very long time ago, back in the ancient time of year 2006, the registry for .se domains, also called .SE, opened up for signing .se zones with DNSSEC. In those days .SE did not have a registrar/registry model and my own company Interlan was then an agent for .SE. One day I suddenly got a mail from .SE regarding secure DNS -- DNSSEC. ...I almost immediately saw the benefits that such a solution could give to a better and more secure Internet. more
Cybersecurity is a top-of-mind issue with calls for individual vigilance, national legislation, and international treaties to address gaps that are exploited causing significant harm and financial loss on a daily basis. The vast majority of these calls are well-intentioned though even among the best-intentioned, some are poorly directed. Such is the case with all of the proposals that would introduce security into the International Telecommunication Regulations (ITRs) of the International Telecommunication Union (ITU). more
A new IETF draft has been published that specifies a new HTTP status code for legally restricted resources. That is, if the government restricts your access to the web page, return this code (similar to how something not found is a 404). The error code: 451. From the Internet Draft, if the user tries to access a page, but access to the page is restricted by the government, display the following... more
The world is abuzz this week with some flaming malware - well "Flame" is the family name if you want to be precise. The malware package itself is considerably larger than what you'll typically bump into on average, but the interest it is garnering with the media and antivirus vendors has more to do with the kinds of victims that have sprung up - victims mostly in the Middle East, including Iran - and a couple of vendors claiming the malware as being related to Stuxnet and Duku. more
Adolescents were fascinated by the book and film called "Hunger Games". The plot is about a government forcing people to watch, and forcing some to play, a cruel game for life and death. ICANN's own Hunger Games, the so-called "digital archery" or "batching" process, is not lethal to people, but shares all other features: it is forced upon the participants, it is destructive, unfair and unnecessary. more
The Trademark Act of 1946 defines trademarks and service marks to include "any word, name, symbol, or device, or any combination thereof." Marks composed of lexical and numeric elements (as opposed to images) also can be described as strings of characters. Before the Internet there was no commercial use of such strings other than as marks, but the functionality of the Internet depends on strings of lexical and numeric characters in the form of domain names that serve as electronic addresses. more
Security firm, Armis Labs, has revealed a new attack vector that can target major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them.
more