/ Most Commented

Caribbean Network Operators Group Hosts 17th Regional Meeting

The seventeenth regional meeting of the Caribbean Network Operators Group, CaribNOG 17, took place at the Hilton Barbados Resort, Bridgetown, Barbados from April 10 to 12, 2019, with the theme "Securing Caribbean Networks." Approximately 100 participants, including technical experts from the global Internet community and other stakeholders from across the Caribbean, joined dozens of online participants for this first of two regional gatherings for the year. more

8th Registration Operations Workshop (ROW), May 9th, 2019, Bangkok

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 8th ROW will be held in Bangkok, Thailand on Thursday, May 9th, 2019 in the afternoon, at the end of the GDD Industry Summit, in the same venue. more

Britain to Involve Huwawei in Nation’s 5G Rollout Amid US Ban

Top British officials have given the green light to the Chinese technology giant Huawei to participate in the development of the 5G wireless network in the United Kingdom, reports the Washington Post. more

ARIN Increases Support for Caribbean Internet Development

For anyone wondering how Internet development is evolving in the Caribbean, an international conference held in Bridgetown, Barbados, hosted by the American Registry for Internet Numbers (ARIN), provided more than a few positive clues. The second annual ARIN Caribbean Forum attracted Internet policymakers, computer networking and cybersecurity experts and law enforcement officials from across the Caribbean, North America and Europe for high-level talks under the theme "Caribbean priorities for the global Internet." more

Why Passive DNS Matters in Cybersecurity

Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more

The Three-Character Question at the Heart of Single-Character .COMs: W-H-Y?

In the matter relating to O.COM, I've focused on the fact that VeriSign has -- in correspondence to the organization that is counter-party to its .COM and transliterated .COM IDN Registry Agreements, in earnings calls with its investors and financial analysts, and in policy published on its website for every innocent and unsuspecting Tom, Dick, and Harry in the world to be duped by -- stated an unequivocal and unwavering commitment . more

How to Best Manage the Social Media

The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more

Domain Name Variants Still Won’t Work

ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more

Open Data Leads to Competition

In a previous post, I spoke of Amazon's use of customer and market data in restraint of trade, but they are not alone. For example, leaked internal documents show that plans to sell access to user data were discussed for years and received support from Facebook's most senior executives. Facebook gave Amazon extended access to user data because Amazon was spending money on advertising and partnered with them on the launch of the Fire smartphone. more

Mueller Report: Russians Used Spear Phishing, SQL Injection to Penetrate US Election Administration

The nearly 400-page copy of the Mueller report released on Thursday includes some details on how Russia's foreign military intelligence agency (GRU), targetted individuals and entities involved in the administration of the U.S. elections. more

Domain Related Crime: The 4 Steps of Effective Investigations

There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more

FCC to Block China Mobile From Gaining Access to the U.S. Market

Federal Communications Commission Chairman Ajit Pai has opposed China Mobile's Application to provide telecom services in the United States. more

State-Sponsored Attack Is Manipulating DNS Systems of National Security Organizations

A team of security researchers on Wednesday issued a stern warning about a DNS Hijacking campaign being carried out by an advanced, state-sponsored actor believed to be targetting sensitive networks and systems. more

Is Digital Democracy an Option – and What Is Involved in It?

Celebrating the 30th anniversary of the internet Berners-Lee, the father of the internet, reiterated his suggestion for a radical change, which would improve the functionality of the internet for the benefit of society. He suggests a sort of refoundation of the web, creating a fresh set of rules, both legal and technical, to unite the world behind a process that can avoid some of the missteps of the past 30 years. While this most certainly would be an excellent development, I am rather pessimistic about a rapid implementation of such a radical change more

US Presidential Candidate John Delaney Wants to Create Department of Cybersecurity

On Tuesday, 2020 U.S. presidential candidate John Delaney announced a plan to create a Department of Cybersecurity. more