/ Most Commented

CAICT Holds ICANN 58 China Internet Community Readout Session

In the afternoon of March 29, the CAICT held the ICANN 58 China Internet Community Readout Session in the CAICT together with the ICANN Beijing Engagement Center. Mr.Li Xiangning, Deputy Director General of Information and Communication Administration under the Ministry of Industry and Information Technology (MIIT), attended the event and gave a speech on the meeting. Over 60 representatives from related governmental agencies including the Office of the Central Leading Group for Cyberspace Affairs, the Ministry of Foreign Affairs and Beijing Communications Administration, domain name registries and registrars, industrial organizations, institutes and universities participated in the seminar. more

New In-depth Analysis Finds Thousands of Domains Used in Technical Support Scams

A study conducted by PhD candidates at the Stony Brook University resulted in identifying malvertising as a major culprit for exposing users to technical support scams which allowed them to build an automated system capable of discovering, on a weekly basis, hundreds of phone numbers and domains operated by scammers. more

M3AAWG Offers Some Sensible Password Advice

M3AAWG is a trade association that brings together ISPs, hosting providers, bulk mailers, and a lot of infrastructure vendors to discuss messaging abuse, malware, and mobile abuse. (Those comprise the M3.) One of the things they do is publish best practice documents for network and mail operators, including two recently published, one on Password Recommendations for Account Providers, and another on Password Managers Usage Recommendations. more

Dot Brand Trends and Recent Launches

Our latest research shows that dot brand domains continue their qualitative and quantitative growth. We carried out a complete cycle of analysis in April 2017, and found that brands had registered 6,505 domains in their Top Level Domains, which represents a progression of 3% compared to February 2017. 761 actual websites are published on these domains, which represents an increase of 6% form February 2017. more

Understand More, Fear Less: Will G20 Be Able to Contribute to an Internet Future with a Human Face?

Last week, the G20's ministers responsible for the digital economy met in Düsseldorf to prepare this year's G20 summit, scheduled for Hamburg, July 2017. Building on important strides initiated two years ago during the G20 summit in Antalya and based on the G20 Digital Economy Development and Cooperation Initiative (DEDCI), which was adopted last year under the Chinese G20 presidency, the Düsseldorf meeting adopted a "G20 Digital Economy Ministerial Declaration" which also includes a "Roadmap for Digitalisation". One day before the ministerial meeting, non-state actors were invited to discuss "Policies for a Digital Future" within a so-called Multistakeholder Conference. more

How to Get a Domain Name Transferred Under the URS

The Uniform Rapid Suspension System (URS) is designed to get a domain name suspended, but in some cases this dispute policy can be used to help get a domain name transferred. It's an uncommon result but one that trademark owners may want to keep in mind. The suspension remedy is often viewed as the greatest limitation of the URS. Trademark owners that want to have a domain name transferred typically file a complaint under the Uniform Domain Name Dispute Resolution Policy (UDRP) instead of the URS - but, the UDRP is more expensive and time-consuming. more

Internet Association Meets With the FCC In Efforts to Preserve Net-Neutrality Rules

Jon Brodkin reporting in Ars Technica: "Federal Communications Commission Chairman Ajit Pai and his staff met yesterday with the Internet Association, a trade group whose members include Amazon, Dropbox, eBay, Facebook, Google, Microsoft, Netflix, PayPal, Reddit, Spotify, Twitter, and about 30 other Web companies. The meeting occurred about a week after Pai reportedly met with broadband industry lobby groups to discuss his plans for eliminating net neutrality rules." more

Study Finds $9.8B Opportunity In Universal Acceptance of All New Generic and Internationalized TLDs

Report from a new study by Analysys Mason, commissioned by the Universal Acceptance Steering Group (UASG), says there is a potential USD $9.8 billion growth opportunity in online revenue through a routine update to Internet systems, including those for speakers of languages that do not use the English script. more

German Minister Calls for Rules Allowing Nations to Attack Foreign Hackers

Germany is trying to beef up its cyber defense, after the interior minister called for rules that allow nations to attack foreign hackers targeting critical infrastructure. more

Worldwide Cloud IT Infrastructure Spend Grew 9.2% to $32.6 Billion in 2016, Reports IDC

Vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew by 9.2% year over year to $32.6 billion in 2016, with vendor revenue for the fourth quarter (4Q16) growing at 7.3% to $9.2 billion. more

Inter-Process Communication - Building Block for the New Internet

The blog on the need for a new internet received quite a bit of (international) attention, and with the assistance of colleague John Day, we would like to elaborate a bit further on this. I mentioned RINA as a good example that can be used to have a look at how such a new internet should look like. Interestingly the basics are not all that new. Already in the 1970s, but certainly two decades later, there were plenty of telecoms and computer engineers who started to understand that the future telecommunications work would have more to do with computing than with telecoms. more

Researches Demonstrate How IPv6 Attacks Can Bypass Network Intrusion Detection Systems

With the increasing popularity of IoT devices and the added interest of transition to IPv6, a whole new range of threat vectors are evolving that allow attackers to set up undetectable communications channels across networks. more

Permanent Denial-of-Service Attacks on the Rise, Incidents Involve Hardware-Damaging Assaults

Also known loosely as "phlashing" in some circles, Permanent Denial-of-Service (PDoS) is an increasing popular form of cyberattack that damages a system so badly that it requires replacement or reinstallation of hardware. more

IRS Reports Hackers Accessed Data of Up to 100,000 People via Financial Aid Site for Students

U.S. Internal Revenue Service Commissioner (IRS) testified before the Senate Finance Committee stating the agency has discovered fraudsters could use someone's personal data to fill out a financial aid application, and the "Data Retrieval Tool" would populate the application with tax information. more

WikiLeaks Releases CIA Documents on Grasshopper Framework for Building Customized Malware Payloads

WikiLeaks on Friday released a new set of leaks -- Vault 7 "Grasshopper" -- containing 27 documents from the CIA's Grasshopper framework, a platform used to build customized malware payloads for Microsoft Windows operating systems. more