/ Most Commented

Why Passive DNS Matters in Cybersecurity

Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more

The Three-Character Question at the Heart of Single-Character .COMs: W-H-Y?

In the matter relating to O.COM, I've focused on the fact that VeriSign has -- in correspondence to the organization that is counter-party to its .COM and transliterated .COM IDN Registry Agreements, in earnings calls with its investors and financial analysts, and in policy published on its website for every innocent and unsuspecting Tom, Dick, and Harry in the world to be duped by -- stated an unequivocal and unwavering commitment . more

How to Best Manage the Social Media

The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more

Domain Name Variants Still Won’t Work

ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more

Open Data Leads to Competition

In a previous post, I spoke of Amazon's use of customer and market data in restraint of trade, but they are not alone. For example, leaked internal documents show that plans to sell access to user data were discussed for years and received support from Facebook's most senior executives. Facebook gave Amazon extended access to user data because Amazon was spending money on advertising and partnered with them on the launch of the Fire smartphone. more

Mueller Report: Russians Used Spear Phishing, SQL Injection to Penetrate US Election Administration

The nearly 400-page copy of the Mueller report released on Thursday includes some details on how Russia's foreign military intelligence agency (GRU), targetted individuals and entities involved in the administration of the U.S. elections. more

Domain Related Crime: The 4 Steps of Effective Investigations

There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more

FCC to Block China Mobile From Gaining Access to the U.S. Market

Federal Communications Commission Chairman Ajit Pai has opposed China Mobile's Application to provide telecom services in the United States. more

State-Sponsored Attack Is Manipulating DNS Systems of National Security Organizations

A team of security researchers on Wednesday issued a stern warning about a DNS Hijacking campaign being carried out by an advanced, state-sponsored actor believed to be targetting sensitive networks and systems. more

Is Digital Democracy an Option – and What Is Involved in It?

Celebrating the 30th anniversary of the internet Berners-Lee, the father of the internet, reiterated his suggestion for a radical change, which would improve the functionality of the internet for the benefit of society. He suggests a sort of refoundation of the web, creating a fresh set of rules, both legal and technical, to unite the world behind a process that can avoid some of the missteps of the past 30 years. While this most certainly would be an excellent development, I am rather pessimistic about a rapid implementation of such a radical change more

US Presidential Candidate John Delaney Wants to Create Department of Cybersecurity

On Tuesday, 2020 U.S. presidential candidate John Delaney announced a plan to create a Department of Cybersecurity. more

A Case for Regulating Social Media Platforms

There are some who see the regulation of social media platforms as an attack on the open internet and free speech and argue that the way to protect that is to let those platforms continue to self-regulate. While it is true that the open internet is the product of the same freedom to innovate that the platforms have sprung from, it is equally the product of the cooperative, multi-stakeholder organisations where common policy and norms are agreed. more

Hacker Has Released Close to a Billion User Records Over the Past Two Months, Reports ZDNet

A hacker by the name of Gnosticplayers has claimed responsibility for the hacking of 44 companies resulting in over a billion user data. Hacker also gotten dangerously close to releasing the records, ZDNet reports. more

EURid Report Reveals Europe’s .EU TLD Shrank by Over 130K Domains in 2018

EURid, the registry manager of Europe's .EU top-level domain, released its Annual Report today, revealing that in 2018 the total net registrations decreased by 130,305 (from 3,815,055 to 3,684,750). more

FBI, Department of Homeland Security Issue Warning About a North Korean Trojan Malware Variant

The US Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) this week issued a malware analysis report on Trojan malware variants linked to the North Korean government. more