/ Most Viewed

DNSSEC Taking Center Stage at 2010 Black Hat

On July 28th DNSSEC took center stage at the 2010 Black Hat Conference in Las Vegas. Two years ago, at the same conference, Dan Kaminsky unveiled the infamous DNS bug that many believe became a major catalyst for DNSSEC implementation. To kick things off, Jeff Moss -- founder of Black Hat -- in his opening speech called out the fact that "we have not solved any fundamental problems" and noted that the technical community must catch up. more

Meeting Report: ICANN’s Registration Data Request Service Requestor Experiences

During CSG Open Working Session at ICANN79, Members from the ICANN Community were invited to an open meeting to share their experiences with Registration Data Request System (RDRS) from the Requestor side. As President of the Edgemoor Research Institute (ERI), I had the honor to present the keynote address and I am pleased to be able to provide you with ERI's report of the meeting. more

UN Treaty Threatens Cybersecurity, Warns Google

As governments convene to discuss the UN Cybercrime Treaty, Google is urging caution, warning that the current draft could endanger online security and free expression.  more

Why are *.edu’s Compromised so Much?

When it comes to the problem of outbound spam, one of the experiences that I have, and this was reaffirmed at TechEd, is that the number one source of compromised accounts are educational institutions. That is to say, whenever we have an outbound spam problem and have to hunt down where it is coming from, the highest number of these accounts are phished accounts/credentials from users at an educational institution. Why is this? Why does so much spam originate from universities? more

Public and Private Infrastructure Investment Alternatives

Eric Yuan, CEO of the Zoom teleconferencing service, stated that the average number of daily meeting recipients increased from 10 million in December 2019 to 200 million in March 2020 in a webinar last month. I've been teaching 21 students using Zoom as a result of the COVID-19 pandemic, and the audio and video are smooth, and switching between speakers is seamless. Offhand, I cannot think of any technology that has scaled so well so fast. more

Will We See IPv6-Enabled Consumer Devices at CES This Week?

What kind of IPv6 support will we see in consumer devices at the massive Consumer Electronics Show (CES) happening in Las Vegas this week? The show is already underway and much of the tech media is already writing in breathless prose about the latest tablets, notebooks and zillions of other consumer devices making their debut at CES. While the bright-shiny-object-chasing side of me definitely notices those articles, my own interest is on a deeper and far more technical level. more

A Month in Africa Charts the Promise and Perils of Internet Governance

There may be no better illustration of how far we've come in Internet governance, than this: twice in the past 30 days, the global Internet community has gathered in sub-Saharan Africa to plot a path to bring the Internet to its next billion users. Just weeks after wrapping up the sixth annual Internet Governance Forum (IGF) in Kenya, Internet stakeholders from around the world traveled back to Africa for ICANN's 42nd meeting in Dakar, Senegal. more

A Peek Inside the FCC

I write a lot about the U.S. Federal Communications Commission (FCC), but I imagine a lot of folks don't realize the many functions the agency handles. Like any regulatory agency, the FCC staff and Commissioners have been tasked by Congress with a wide range of responsibilities. The public gets to hear from the FCC formally once each month ... more

The End of Broadband Networks as We Know Them

A group of major telecommunications companies -- Vodafone, BT, Telefonica and Deutsche Telekom -- recently announced something a bit unexpected. In the Open BNG Operator Position Paper, they call for a fundamental, industry-wide change to the way broadband networks are built. Specifically, they advocate for collaboration throughout the telco world, with a convergence around open broadband network gateways (BNGs). more

New Book: Managing Mission Critical Domains & DNS

The idea behind my recent book "Managing Mission Critical Domains & DNS" is to provide a unifying overview around the area of domains and naming where I think there exists an artificial divide, and that divide exists between domain policy, and managing ones' domain portfolio; and the DNS ops side of things: running your nameservers or outsourcing to a vendor, or both. I've been doing this for over 20 years, I've seen almost every failure condition that can happen to your domain or DNS... more

Internet Commerce Association Calls for ICANN to Withhold Approval of .Org Sale

The Internet Commerce Association (ICA) in an open letter issued today, has asked ICANN to withhold the approval of the assignment of the .ORG top-level domain to the private equity company Ethos Capital. more

A Cynic’s View of 2015 Security Predictions - Part 1

Cyber security was a hot topic in 2014. It seemed not a week went by without details of a high profile data breach hitting the headlines. To recap, the Sony breach was one of the most notable, as was the Home Depot hack, while details of widespread security vulnerabilities such as Heartbleed, Shellshock and Poodle were also revealed. But what will 2015 bring? Will it be more of the same, or have cyber criminals got some new tricks up their sleeves? more

Customer Confusion over New(ish) gTLDs Targeting Financial Services

For the last decade and a bit, banking customers have been relentlessly targeted by professional phishers with a never-ending barrage of deceitful emails, malicious websites and unstoppable crimeware -- each campaign seeking to relieve the victim of their online banking credentials and funds. In the battle for the high-ground, many client-side and server-side security technologies have been invented and consequently circumvented over the years. Now we're about to enter a new era of mitigation attempts... more

Unpacking the Framework to Address DNS Abuse

As the Internet has grown, so too have the abuses that go along with one of the world's most transformative technologies. For all of the positives the Internet brings, negatives like phishing, malware and child exploitation are a reality online. As of December 9, 2019, 48 registrars and registries have signed onto the "Framework to Address Abuse." This initiative was launched last month by a number of domain name registries and registrars, just prior to the ICANN meeting in Montreal. more

Limitations, Delays, and Laches as Defenses in Cybersquatting Claims

In passing the baton for combating cybersquatting to the Internet Corporation for Assigned Names and Numbers (ICANN) the World Intellectual Property Organization (WIPO) recommended that "claims under the administrative procedure [should not] be subject to a time limitation" (Final Report, Paragraph 199). ICANN agreed and the UDRP contains no limitation period for making a claim. The absence of a limitation period does not necessarily forego applying equitable defenses for delay, but the consensus of Panels appointed to decide disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) is that they are not applicable in countering cybersquatting claims. more