Think your organization is exempt from in-house network abuse? Think again. A CFCA Global Fraud Survey of communication service providers found that dealer fraud was one of the top five methods of fraud, costing $US 3.35 billion annually. In this scenario, customer service representatives (CSRs) or administrators with access to account information may upgrade friends or family to a premium service package or even provide free access to services. more
At the start of the year, many responsible for managing domain name portfolios may be considering spring cleaning! Traditionally, such a task consists of a review to check that all domains in the portfolio serve a purpose either from a commercial or defensive perspective. The aim is to ensure budget isn't wasted on domains of little to no value. It's fair to say that for many organizations, this is a difficult process - almost as feared as actually spring cleaning our own homes. more
European Union antitrust regulators today approved Google's acquisition of the U.S. cellphone maker Motorola Mobility without conditions, but added a stern warning: Play fair in markets for smartphones and tablet computers, or face tough sanctions. The $12.5 billion deal represents Google's first foray into hardware. more
The entire internet infrastructure of the African nation of Liberia is distributed by the same weapon used to cause the historic cyberattack just two weeks ago. more
As the ICANN's 40th international meetings start off in San Francisco, Kieren McCarthy, General Manager (US) of the Global Internet Business Coalition (GIBC), and founder of the .NXT conference, has released a guide for the most important topics (listed below) with some added commentary, background and links to relevant resources. more
The U.S. government has declared criminal charges, economic sanctions, and a $10 million reward for information leading to the arrest of a Russian citizen, Mikhail Matveev. Accused of a series of ransomware attacks, Matveev's alleged operations, known as Babuk, have targeted entities such as the D.C. police, an airline, and other American industries. more
ICANN made an announcement today stating that in response to ensuring the community has sufficient time, while also having the process in parallel to, and informing, the process to Transition NTIA's Stewardship of the IANA Functions, there is a one week extension of the comment period to 6 June. more
Public cloud infrastructure as a service (IaaS) offerings are rapidly gaining acceptance among enterprises as a viable alternative to on-premises hardware for IT infrastructure, According to new IDC study more
Although not quite there yet, statistical figures indicate total registration for the .com top-level domain will soon be reaching 100 million by the end of this year. The worlds most popular TLD currently has 98 million registered domains and accounts for 45% of all TLDs. more
For the first time in my career, we face the possibility of some big changes for broadband in low-income neighborhoods in cities. The recent American Rescue Plan Act (ARPA) gave cities significant funding that can be used for various kinds of infrastructure, including broadband. Cities have been handed a once-in-a-lifetime chance to fix some of the broadband deserts that have grown in poor neighborhoods. I'm already working with several cities that are taking this opportunity seriously. more
"Preserving a Free and Open Internet," is the title of a post published today by Kent Walker, Google's SVP and General Counsel. more
Om has burnt the midnight oil analyzing Vonage's S-1 filing, coming to the conclusion that, while churn may not be as ugly as people thought, it's still cause for concern, and apparently intensifying. His point at the end about definitions is particularly good, as excluding cancellations in the first 30-days is undoubtedly flattering to the numbers. The net present value of Vonage's lifetime customer revenues is an issue which VoIP-watchers have long speculated about with trepidation -- what if marketing spending, churn, and price competition combined to form a toxic soup which fatally poisoned the economic proposition for access-independent VoIP? more
The Australian Bureau of Statistics reports deliberate and "malicious" attacks from offshore, designed to sabotage nation's first online 2016 Census. more
Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more
Advancements in virtual private networking have extended system capabilities for service providers. Providers can divide LANs into multiple discrete segments using either Virtual Local Area Networks (vLANs), leverage Multiprotocol Label Switching (MPLS) or Virtual Routing and Forwarding (VRF) to host Virtual Private Networks (VPNs) that support service operations over multiple instances. more