/ Most Commented

China Using Cybertechnologies to Expand Their Political Cloud

A few months ago, I mentioned that China’s social code would also be expanded to companies who want to deal with China. I have come across information that shows that China is indeed serious about this. China’s cyberspace regulator has proposed requiring companies pursuing share listings in Hong Kong to apply for cybersecurity inspections if they handle data that concerns national security. Large internet platforms planning to set up headquarters, operating or research centers abroad will have to submit a report to regulators. more

JD Falk – a Decade Afterwards

I can still hear it. ‘Hee hee’. That’s good. We all have unique laughs, but few are distinctive. Fewer yet belly the true nature of the human being issuing them. British insult comedian Jimmy Carr has one such laugh, a tri-tone ‘dah dah DUH,’ rising on the third expulsion. It has a bell-like quality, ringing, embodying the deft touch that Don Rickles had of insulting while loving, something Carr has mastered. It lets you know that despite him having just said something shocking and horrid, he is laughing with, never at, reassuring the target, ‘all is well.’ more

Big Internet Outages - There Is No Such Thing as a Routine Software Upgrade

Last year I wrote about big disruptive outages on the T-Mobile and the CenturyLink networks. Those outages demonstrate how a single circuit failure on a transport route or a single software error in a data center can spread quickly and cause big outages. I join a lot of the industry in blaming the spread of these outages on the concentration and centralization of networks where the nationwide routing of big networks is now controlled by only a handful of technicians in a few locations. In early October, we saw the granddaddy of all network outages... more

The Internet Infrastructure in Afghanistan (Event)

Join the upcoming discussion today on the past, present and future of the Internet in Afghanistan in the context of the Middle East. Panelists will address the national and international challenges and opportunities Afghans face in the changing environment of global Internet governance and sanctions laws. more

DOTZON Study: Digital Company Brands 2021

DOTZON presents the fourth edition of the Digital Company Brands study. After having introduced the study in 2018, DOTZON continued to expand and enhance the underlying data to display how cities successfully use their Digital Company Brands. The Digital Company Brand is the digital dimension of a company brand and mirrors the "digitalness" of a company. Purely digital company brands developed for the first time in the 1990s, with the emergence of Internet business models. Some of them were based solely on a generic Internet address, for example, www.hotel.de or www.amazon.com. more

Why the Cloud Is the Solution for Telecom Upgrades

With so much "cloud-talk" across every industry -- many presume that every company with serious telecom operations has already moved there -- but they haven't. In fact, 20 to 25% of global companies are still using legacy PBX systems and MPLS networks and waiting to replace them and move over to SD-Wan/mesh solutions. These advancements can be done successfully after an infrastructure audit has been conducted to identify operational weaknesses and threat vulnerabilities and measuring efficiencies of each feature for usage optimization and increased productivity. more

SpaceX’s Rural Development Project in India

Sanjay Bhargava, Starlink Country Director for India at SpaceX (source)SpaceX Starlink is moving quickly in India. Last April, they said they would be offering service in 2022 and began accepting pre-orders. In July, SpaceX committed to manufacturing antenna systems and terminals in India and, at the end of September, Sanjay Bhargava, who had been with Elon Musk at Paypal, was selected to head Starlink in India. In the last week or two, they set up a wholly-owned subsidiary that will apply for licenses, seek Indian distribution partners, and attempt to sell 200,000 units - 80% in rural districts - in 2022. more

Predicting Future Broadband Prices

I've been giving a lot of thought lately to the long-term trajectory of broadband prices. This is something that should be considered by anybody who is thinking about competing in a market against a big cable company. It's not an easy question to get your hands around since many factors might affect future rates. The following are some of the major trends that I think must be considered. First is pressure on the big ISPs from Wall Street. more

Content Blocking at the DNS Level in Germany

For those who follow the issue of blocking illegal content from the Internet, there is an interesting development in relation to this issue here in Germany, and I will tell you a little about it. One way to make it difficult to access illegal content is to block it directly in the DNS. But what is DNS for? Basically, it serves to translate the domain name into the IP of the server that is hosting the content. By blocking directly at the DNS level, a query to a domain will no longer bring the server's IP number, and with that, the user no longer accesses that content. more

Searching for the Meaning of “Registers” in the Anticybersquatting Consumer Protection Act (ACPA)

Where outcomes depend on a word’s meaning, the first task is to define it. “Registers” which is one of the keywords in the Anticybersquatting Consumer Protection Act (ACPA), is still in the process of definition. Its statutory context provides that a domain name registrant is liable to the owner of a mark if “it has a bad faith intent to profit from that mark … and (ii) registers, traffics in, or uses a domain name [corresponding to a mark] that … is distinctive at the time of registration of the domain name [and] is identical or confusingly similar to that mark. more

Another Year, Another ICANN NomCom

Another challenging year due to the Corona pandemic is coming to a close, and ICANN has held another virtual annual general meeting (AGM) -- the 6th in a row. Unlike last year, today, we can hope for a better next year. In many regions of the world, the figures look better, and the opening is progressing. That at least gives us hope that ICANN will hold face-to-face meetings again next year -- at least they are planning it so. That should also make it easier for the new Nominating Committee (NomCom). more

Registrar Influence on the Domain Security Posture of the Forbes Global 2000

In the 2021 Domain Security Report, we analyzed the trend of domain security adoption with respect to the type of domain registrar used, and found that 57% of Global 2000 organizations use consumer-grade registrars with limited protection against domain and DNS hijacking, distributed denial of service (DDoS), man-in-the-middle attacks (MitM), or DNS cache poisoning. On average, the adoption of domain security controls is two times higher for enterprise-class registrars than for those using consumer-grade registrars. more

A Three-Step Process to Chase Compulsive Domain Brand Squatters

Domain brand squatting can be defined as the unauthorized or dishonest use of a brand or company identifiers in domain names. It is often linked to the use of look-alike domains in bad faith, and we see it all the time. The threat actors behind these domains are called different names, though a prevalent one would be “typosquatters.” The Hot on the Trail of Compulsive Brand Squatters webinar showcased how these people are infiltrating the Internet. The first page of PhishTank’s valid phish search alone as of this writing tells us that domain brand squatting is a real and present danger. more

On DNS Openness

When we deregulated the telephone industry, we replaced these national monopolies and their vertically bundled structures with a collection of separate enterprises whose actions are orchestrated by market forces rather than by the dictates of the incumbent monopoly telco. This was a comprehensive upheaval to the telecommunications industry, and one aspect of this broad sweep of changes was in the role of the regulator. Previously it was a rule-based framework: Is the incumbent playing by the rules we imposed on them? more

Cryptocurrency and DNS: Phishing Domains, Cryptomining and More

When we look at the intersection of cryptocurrency and domain data, we see something insidious: The prevalence of crypto-related threats. And it's not just cryptojacking. It's not even the use of cryptocurrency which has made ransomware attacks easier for threat actors to commit and all the more widespread. As with nearly every trend, there is always someone looking to capitalize on it and use it for their own, personal gain. Ever since cryptocurrency became the pandemic hobby of choice, threat actors have begun to target crypto novices for their schemes. more