The much-maligned Uniform Rapid Suspension System (URS) is not only failing to catch on -- it's actually starting to fade. Once envisioned as a popular rights-protection mechanism for trademark owners under the new generic top-level domain names (gTLDs), the URS instead is seldom used. In fact, despite the growth in new gTLD registrations, the URS is in decline. more
At the end of 2015, 3.2 billion people were estimated to be online -- up from 3 billion in 2014, according to the study conducted by Connectivity Lab at Facebook. The increase is "partly attributed to more affordable data and rising global incomes in 2014." more
Facebook's chief executive, Mark Zuckerberg made comments at the Mobile World Congress tech show in Barcelona today stating he is sympathetic to Apple's position in its clash with the FBI. more
In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more
ICANN's current CEO Fadi Chehadé is leaving the organisation in a few weeks time. His replacement has been announced and the upcoming public meeting in Marrakech, Morrocco, will be Chehadé's final public engagement as ICANN CEO. A couple of days ago Chehadé sent the ICANN board a letter entitled "Summary of My Tenure". While the letter may have been addressed to the board, it was published on the ICANN website immediately. more
How can we make the Internet of Things (IoT) more interoperable? How can we help ensure that when you buy a light bulb from one IoT vendor it will work with the light bulb from another IoT vendor? How can we avoid getting to a place where we have to use many different apps to control all the different devices in our homes? As we said in the Internet Society's IoT Overview: Understanding the Issues and Challenges of a More Connected World, "a fragmented environment of proprietary IoT technical implementations will inhibit value for users and industry. more
Think your organization is exempt from in-house network abuse? Think again. A CFCA Global Fraud Survey of communication service providers found that dealer fraud was one of the top five methods of fraud, costing $US 3.35 billion annually. In this scenario, customer service representatives (CSRs) or administrators with access to account information may upgrade friends or family to a premium service package or even provide free access to services. more
As promised, 2016 is off to a busy start at ICANN, with important discussions about Whois/Registration Directory Services, subsequent rounds of the New gTLD Program and internet governance already underway, and more to come. Brand owner concerns will be front and center in the coming months, as community stakeholders set priorities and begin discussions of key challenges and desired results. more
Every year, Verisign iDefense Security Intelligence Services produces its Cyberthreats and Trends Report, which provides an overview of the key cybersecurity trends of the previous year and insight into how Verisign believes those trends will evolve. This report is designed to assist in informing cybersecurity and business operations teams of the critical cyberthreats and trends impacting their enterprises, helping them to anticipate key developments and more effectively triage attacks and allocate their limited resources. more
A dramatic increase in DNS reflection/amplification DDoS attacks abusing Domain Name System Security Extension (DNSSEC) configured domains have been observed in the past few months, according to a security bulletin released by Akamai’s Security Intelligence Response Team (SIRT). more
I have some bad news: the published literature on 'net neutrality' fails to grasp the stochastic nature of broadband and its implications. This means that the relationship of traffic management to QoE is universally misunderstood and/or misrepresented. As a result the whole policy process is being placed into opposition with nature! Nature isn't changing to accommodate the policy process. So the policy process has to change. more
The Internet Society today expressed concern over the recent order from the United States District Court for the Central District of California requiring Apple to bypass or disable the auto-erase function on a seized iPhone and to enable the FBI to more effectively conduct a brute force attack on the device. more
Google has expanded Google Ideas, its think tank project, to a technology incubator called Jigsaw, the company announced today. Jigsaw is tasked to tackle geopolitical challenges, countering violent extremism, censorship, and other political challenges through the use of technology, says Alphabet executive chairman, Eric Schmidt in post on Medium. more
I was fascinated to read today that over $1 billion (USD) in payments were made on Venmo in January 2016. What is Venmo, you might ask? Essentially it is a mobile app (on both iOS and Android) that provides an easy payment system, in many ways like a "digital wallet" where you can securely reach in and pull out some cash to give to someone... more
Over the last couple of years, the networking industry has grown aware of the various security issues that could potentially have a huge impact on their operations. One of the topics that has raised in appeal is DNS security. Considering that much of the publicity around DNS is made by vendors trying to differentiate their solutions, there are many misconceptions out there that guide people into making poor investment in their infrastructure. more