/ Most Commented

Dynamic DNS Customers, Check Your Router Settings!

There have been quite a few news stories released over the last 24 hours regarding a wide-scale compromise of 300,00 Internet gateway devices. Here's the executive summary of what happened, how to check if you are vulnerable, and what you can do to fix it... If you use any of these devices, you should check it to ensure your device has not been compromised. more

How Can Managers Support Their Engineers Deploy IPv6?

After interacting with over 1000 network engineers during training sessions about what they think could help drive IPv6 deployment in Africa, I have come to the realisation that a three prong approach is required... Many training courses focus on the first issue, and quite logically, that's where the real work lies. I've developed such a course that has been delivered in over 45 countries, and there are lots of other great training available, both free and paid. more

Proposal Aims to End US Control of ICANN

A proposal involving removal of root zone management functions from ICANN and creating an independent and neutral private sector consortium is to be presented at the Singapore ICANN meeting March 21, and then formally submitted to the "NETMundial" Global Multistakeholder Meeting on the Future of Internet Governance in SaoPaulo, Brazil. more

Jeff Schmidt to Present Name Collision Management Framework at Research Workshop

I'm delighted to announce that the name collisions workshop this weekend will include Jeff Schmidt, CEO of JAS Global Advisors, presenting the Name Collision Occurrence Management Framework that his firm just released for public review. Jeff's presentation is one of several on the program announced by the program committee for the Workshop and Prize on Root Causes and Mitigations of Name Collisions (WPNC). more

Widespread Compromised Routers Discovered With Altered DNS Configurations

A widespread compromise of consumer-grade small office/home office (SOHO) routers has been discovered by threat intelligence group Team Cymru. According to the report, "attackers are altering the DNS configuration on these devices in order to redirect victims DNS requests and subsequently replace the intended answers with IP addresses and domains controlled by the attackers, effectively conducting a Man-in-the-Middle attack." more

7 Major Current Trends in Cloud Computing

Cloud computing has experienced exponential growth over the last few years. As of December 2013, almost 60 percent of current small-to-medium businesses (SMB) use cloud services, and 72 percent of these businesses virtualize substantial portions of their servers. The growth is only expected to increase over the next few years. Here are just a few of the major current trends in the industry today. more

Best Practices in the Global Internet

In an increasingly global environment, the Internet infrastructure industry faces a diverse set of serious issues that we as an industry need to address together. To look at these concerns, an area of focus for the Internet Infrastructure Coalition (i2Coalition) has been best practices for our industry. Our approach to developing best practices encapsulates three areas, always with the goal of striking the right balance between security, safety and privacy: working with experts and industry professionals; identifying like-minded partners; and fostering the growth of the Internet economy. more

“Bitcoin and Internet Payment Systems” - IETF 89 Technical Plenary (Live Video Stream Available)

Are you interested in learning more about Bitcoin, cybercurrencies and Internet payment systems? On Monday, March 3, 2014, at 5:50pm UTC (London, UK) the Technical Plenary of the 89th meeting of the Internet Engineering Task Force (IETF) will be streamed live. The presentations during the "technical topic" part of the plenary will include... more

More Denial of Service Attacks

There are quite a lot of NTP-amplified denial of service attacks going around at the moment targeting tech and ecommerce companies, including some in the email space. What does NTP-amplifed mean? NTP is "Network Time Protocol" - it allows computers to set their clocks based on an accurate source, and keep them accurate. It's very widely used - OS X and Windows desktops typically use it by default, and most servers should have it running. more

Fifth Applicant Auction Concluded, 28 Contention Sets Resolved

After the successful conclusion of our fifth auction last week, the Applicant Auction has now resolved contention for a total of 28 strings. More than 20 gTLD applicants have participated in our auctions, ranging from many smaller companies with only one gTLD application in contention to large, publicly traded portfolio applicants like TLDH and Demand Media. more

Papers Now Available Publicly for W3C/IAB “Strengthening the Internet” Workshop

Want to read a wide range of views on how to strengthen the security and privacy of the Internet? Interested to hear how some of the leaders of the open standards world think we can make the Internet more secure? As I wrote about previously here on CircleID, the W3C and the Internet Architecture Board (IAB) are jointly sponsoring a workshop on "Strengthening The Internet" (STRINT) on February 28 and March 1 in London just prior to the IETF 89 meeting happening all next week. more

Uncontrolled Interruption? Dozens of “Blocked” Domains in New gTLDs Actually Delegated

The Mitigating the Risk of DNS Namespace Collisions report, just published by JAS Global Advisors, under contract to ICANN, centers on the technique of "controlled interruption," initially described in a public preview shared by Jeff Schmidt last month. With that technique, domain names that are currently on one of ICANN's second-level domain (SLD) block lists can be registered and delegated for regular use, provided that they first go through a trial period where they're mapped to a designated "test" address. more

How the Cloud Has Changed Over the Past 3 Years

Cloud computing is not a new concept. Having gotten its start back in the 1960s, when computation was first envisioned as a public utility, it has been in development ever since. However, the past few years have seen more significant changes than we have seen in the entire history of the technology. In an age with ever increasing digitization of data and records, the cloud and cloud software have become unavoidable for virtually every business from small start-up initiatives to large multibillion-dollar corporations... During the past three years, we have seen the following significant developments relative to the cloud. more

NTAG Chair Blog: Odds and Endings

Imagine if the US Bureau of Labor Statistics delayed one of its reports for say, two months. No explanation. Just didn't release the employment numbers when it said it would. What if the Federal Reserve decided to say it was going to raise interest rates, but then just didn't? The global economy would be thrown into chaos. These organizations know that when you run critical infrastructure your word is part of that infrastructure. more

Lead With Privacy and Customers Will Follow

From high-profile data breaches to increasingly sophisticated tracking systems, the issue of consumer privacy is earning a lot of headlines these days. To better protect their personal privacy, many consumers are taking matters into their own hands. A Forrester Consulting survey revealed that one-third of consumers polled admitted to using do-not-track tools and ad blockers to protect their online privacy, while another 25 percent have cancelled at least one online transaction after reading the seller's privacy policy. more