/ Most Viewed

Choosing the Right Path to a Permanent Accountability Framework for ICANN

Over the next month, the ICANN Board will consider its options for ensuring that some framework is in place to ensure ICANN's accountability to the global Internet community after the approaching expiration of its Memorandum of Understanding and Joint Project Agreement (MOU/JPA) with the U.S. Department of Commerce. We analyze these options in our new paper... more

ISPs and the Digital Divide

It seems almost monthly that I am asked about the role that ISPs should take in making sure that we solve the digital divide. I think that people are somewhat shocked every time when I tell them this is not a role for ISPs. In explaining my answer, let me start by parsing what is meant by the question. We are about to see a lot of grant funding for getting computers into homes and training folks on how to use them. more

Draft 0.5 of the New gTLD Applicant Guidebook

We all remember the nightmare of following the multiple versions of the "AGB" from the ICANN new gTLD program, and the time it took to get to the final version, which then took to allowing applicants to submit their new gTLD application, and which then took them to wait for their application to proceed... Welcome to version 0.5 of the next Applicant Guidebook. more

M3AAWG & i2Coalition Collaborate on Best Practices on Anti-Abuse in Hosting & Cloud Environments

I am excited to announce the recent release of the industry first Best Common Practices document for Cloud and Hosting providers for addressing abuse issues that was created by M3AAWG and the i2Coalition. M3AAWG has been collaborating with the Best Practices Working Group of the i2Coalition over the past 2 years to discuss ways to solve malicious activity within hosting and cloud ecosystems.  more

Alliance for Safe Online Pharmacies to Recognize Contribution from Internet Industry

ASOP (Alliance for Safe Online Pharmacies) is often seen as taking a rather confrontational stance towards domain name registrars, registries and hosting providers. However both ASOP and others, including LegitScript, often cite the assistance they've received from internet industry players in their work. This year ASOP has decided to take this a step further... more

IPv4 Market Outlook

When 2015 began, there were several million IPv4 numbers still in the American Registry for Internet Numbers (ARIN) IPv4 free pool, ARIN was processing 4-5 unique IPv4 transfer transactions per month, and fewer than 5 million numbers had been transferred publicly in the prior 12 months. The end of 2015 told a different story. In late September, the ARIN free pool was depleted. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

Are New TLDs Truly About Competition and Innovation or Is It to Make ICANN Rich and Powerful?

The ICANN Board resolutions adopted during the retreat in Trondheim, Norway on the 25th of September, 2010, painted yet another question mark for new Top-Level Domains (TLDs), despite its positive outlook. While the Board seems dedicated to resolve all the outstanding issues, applicants were still left in the dark in regards to some key issues that affect the economics of launching new TLDs. more

Closing in on the Google Hackers

Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more

The Rise of WiFi Sensing and Its Implications for Home Security and Surveillance

It's incredibly hard to keep things private in the new digital age. There are far too many stories circulating about people who talked to a friend on the phone or texted about something and almost instantly got hit with ads for the subject of the conversation. And that happens without malware - no telling what information you're giving out if your devices have been infected with malicious software that is spying on you. more

How to Make DNS Green

The Dutch Internet registry SIDN has launched a unique program in partnership with CleanBits to identify what proportion of .nl domain names were hosted on a green or CO2-neutral basis. The results show a strong trend towards the 'greening' of the .nl internet zone. Nearly 30 per cent of .nl names were found to have green hosts. more

Unfamiliarity and Unpreparedness in Proceedings Under the UDRP

There is a difference, of course, between asserting a claim that cannot possibly succeed in an administrative proceeding under the Uniform Domain Name Dispute Resolution Policy (UDRP) and being unprepared to prove a claim that may have merit with the right evidence. Still, there is also an overlapping similarity in that complainants are either shockingly unfamiliar with UDRP procedures and jurisprudence... more

AWS Unveils Route 53 “Accelerated Recovery” to Bolster DNS Resilience

AWS is introducing Route 53 Accelerated Recovery to help organizations maintain DNS control during regional outages, offering a 60-minute recovery objective and sustained access to key API operations for critical updates and traffic management. more

America Closing Down Its Copper Network - So What’s Next?

We have reported in the past on the rapid decline of the copper telecoms network in the USA. A decade ago BuddeComm predicted that it would be impossible to move two customer access networks in parallel towards the new fibre future, the one operated by the telcos and the other operated by the cable companies. At that stage we indicated that a possible outcome could be that the telcos would upgrade their networks to FttH and that the cable companies would become the key tenants on that network. more

DDoS Attacks on US Banks This Week Peaked at 60 Gbps

Distributed denial-of-service (DDoS) attacks that targeted U.S. financial institutions this week have reached 60 Gbps, according to researchers from DDoS mitigation provider Arbor Networks. more