/ Most Viewed

Worldwide Broadband Trends as the World Wide Web Turns 30

Hootsuite is the premier tracker of social media usage around the world. They publish numerous reports annually that track broadband statistics and social media statistic from around the world. They report the following statistics for the end of 2018. The world has been seeing one million new users online every day since January 2018. That means there are 11 new users on the web every second. There are now 5.11 billion mobile subscribers in the world, 67% of the world's population. more

Gary Warner: We Are Well Past Time to Declare a Spam Crisis in China

In a blog post last week, Gary Warner, director of research in computer forensics at the University of Alabama's (UAB) computer and information sciences department, wrote that it is well past time for someone to declare a "Spam Crisis in China". The warning comes along with UAB's reports that most of the spam they receive has ties to China. "It is very normal that more than one-third of the domain names we see each day in spam messages come from China," Warner wrote. "When one also considers the many '.com' and '.ru' domain names which are also hosted in China, the problem is much worse. More than half of all spam either uses domain names registered in China, is sent from computers in China, or uses computer in China to host their web pages." more

Eight-Year Legal Battle Recap: DCA Blocked From Being Heard on Its Merit

It has been a while, nearly eight years since we have been in touch. I thought I would post an update to the DCA vs ICANN case, to the interested party of the global internet, towards the eight-year legal battle DCA had with ICANN. I believe there would be useful lessons learned that would shed some light on ICANN's activities in the Internet community. For those not aware, the DCA vs. ICANN case involved many twists and turns, spanning nearly a decade of DCA's efforts to hold ICANN accountable for the harm it caused to DCA over the delegation rights of the .Africa new gTLD Registry. more

New ICANN Requirements for New gTLDs Are Irrelevant

ICANN is barking up a number of wrong trees with the latest version of its Evaluation and Questions Criteria for generic top-level domains (gTLDs). The document asks for financial projections, the applicant's goals for its TLD, and the benefits the applicant expects to derive. All that information is meaningless. more

Breaking Down Silos Doesn’t Come Easy

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so? more

U.S. VoIP and Broadband Policy: Today’s Debate is Off the Mark!

Despite rather rapid growth in broadband access, the U.S. is falling further and further behind other countries -- we're now ranked #16 in the world. What's slowing the U.S. down? Two threads dominate U.S. broadband policy debate today. The first focuses on traditional telecom regulation -- reciprocal compensation, universal service, e911, and CALEA (wiretap capabilities). The second focuses on "Internet freedoms," i.e., guarantees that your broadband access provider won't block or inhibit specific applications like VoIP. more

10/2 & Innovations for Internationalized Domain Names

According to the 10/10 rule, it takes about a decade to take a product from initial idea to having a standard developed, and then another decade to reach mass market adoption. How can that second decade be reduced in the case of Internationalized Domain Names and their adoption by Internet users? The most effective way to speed up IDN mainstream adoption is learning from history. more

Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3)

Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. more

ESP Compromises and Their Lack of Security

Over at Word to the Wise, Laura Atkins has a post up where she talks about the real problem with ESPs and their lack of internal security procedures which resulted in the breach of many thousands of email addresses (especially Epsilon). However, Atkins isn't only criticizing ESP's lack of security but also the industry's response wherein they have suggested countermeasures that are irrelevant to the problem.  more

Mind the Step(-function): Are We Really Less Secure Than We Were a Year Ago?

In January 1995, the RFC Editor published RFC 1752: "The Recommendation for the IP Next Generation Protocol"... The Internet is a security officer's nightmare -- so much openness, so easy to capture packet traffic (and/or spoof it!) and send all manner of unwanted traffic. It was built as a research network, hosted by institutes that were 1/ professionally responsible and 2/ interested in working together collegially. So, in the 19 years since the publication of that statement, have we really failed to address the stated goal? more

ICANN Hires Black Hat Founder as New CSO

ICANN has apparently hired Jeff Moss (aka Dark Tangent) as CSO. Moss is a well known figure in the internet security community and was founder of Black Hat and the Def Con conferences. However isn't Moss a bit conflicted? Isn't he on one of the review teams? more

Can SpaceX Launch Version 2 Starlink Satellites This Year?

The answer to the question in the title depends on the availability of SpaceX's new Starship spacecraft and Super Heavy booster rocket, collectively referred to as Starship. Elon Musk says he is highly confident about getting Starship to orbit this year. He also says, "At SpaceX, we specialize in converting things from impossible to late." Starship is critical to Starlink because the version 2 satellites are seven meters long and weigh about 1.25 tons... more

Montana Becomes First State to Require ISPs to Abide by Net Neutrality Principles Despite FCC Repeal

Montana Governor Steve Bullock signs an executive order requiring ISPs with state contracts to adhere to internet neutrality principles. more

Overreaching Trademark Owners and the Misguided Better Right Theory of Domain Name Ownership

In Blogs devoted to news from the domain name industry and domainers, there is great glee in reporting about overreaching trademark owners. The reason for the glee, I think, is that it's a form of collective sigh from domainers and the domain industry that the UDRP is working as it should, which means that Panels are careful in their assessments of parties' rights. more

Emoji in Domain Names Bad Idea Warns ICANN Security Advisory Group

Coca-Cola received a fair amount of press for using a number of emoji domains for its 2015 marketing campaign in Puerto Rico. And other companies including Budweiser, Honda and Ray-Ban followed suit, registering various emoji domains to tap into the youth market. However, the increasing interest in their use has raised some questions and concerns. more