/ Most Viewed

Survey Results Expose Widespread DNS Vulnerabilities

The Measurement Factory and Infoblox have announced results of a survey of more than 1.3 million Internet-connected, authoritative domain name system (DNS) servers around the globe. The results of the survey indicate that as many as 84 percent of Internet name servers could be vulnerable to pharming attacks, and that many exhibit other security and deployment-related vulnerabilities. The surveys consisted of several queries directed at each of a large set of external DNS servers to estimate the number of systems deployed today and determine specific configuration details. more

Email Recommendation System-Abstract: Deployment Considerations (Part III)

Perhaps, one of the most thrilling moments of any machine learning project for a data science team is learning that they get to deploy the model in a production environment. However, this can be a daunting task or a simplified one, if all the tools are readily available. Machine-learning (ML) models "require" deployment to a production environment to deliver optimal business value, and the reality is that most models never make it to production. more

ICANN.WTF? FTC & OCA Asked Whether .SUCKS is a Law Breaker (Part I)

On April 9, 2015 ICANN took the unprecedented step of asking two national consumer protection agencies whether the .Sucks registry, one of the new gTLDs it has approved and which is currently in its sunrise registration period, has a business plan which violates any laws or regulations those agencies enforce. This is the equivalent of sending a message stating, "Dear Regulator: We have lit a fuse. Can you please tell us whether it is connected to a bomb?" more

Searching for Truth in DKIM: Part 3 of 5

Last year, MAAWG published a white paper titled Trust in Email Begins with Authentication [PDF], which explains that authentication (DKIM) is “[a] safe means of identifying a participant-such as an author or an operator of an email service” while reputation is a “means of assessing their trustworthiness.”

 more

Deep Packet Inspection: When the Man-In-The-Middle Wants Money

Say you're walking down the sidewalk having a talk with your best friend about all kinds of things. What if you found out later that the sidewalk you were using wasn't really a sidewalk -- but instead a kind of false-front giant copying machine, unobstrusively vacuuming up what you were saying and adding to its database of information about you? Or, say you send a letter to a client of yours (to the extent you still do this), and it turns out later that your letter was intercepted, steamed open, and the contents were read... more

Donuts Completes the Acquisition of Afilias

Donuts stated today that it has completed the acquisition of Afilias announced on November 19. Donuts' CEO Akram Atallah says the company is now ready to begin the integration plan promising minimal disruptions to customers. more

Proxy-Privacy User Higher for Illicit Domains

WHOIS issues are looming large for the ICANN meeting next week, starting with an all-day WHOIS Policy Review on Sunday (background). WHOIS is a subject that has been the recent topic of a number of issues including a debacle over potentially disclosing the identities of compliance reporters to spammers and criminal domainers. more

Terrorism, New gTLDs, DAG4, and ICANN’s Continued US and Western Centric Bias

Those who have been involved in the ICANN process as long as I have naturally become accustomed to ICANN controversies at all levels. But the latest is a "wrong" of international ramifications. The four (4) versions of the Guidebook for the new generic Top-Level Domains (gTLDs) have been hundreds of pages long with a lot of The Good, The Bad, and to some, The Ugly. However, something new has appeared in the 4th and latest version called DAG4 can be called: "The Disturbing". more

IANA Transition Planning Proceeding in Fine Internet Style

Hundreds of individuals from across the Internet community have spent countless hours over the last several months crafting plans for the transition of the stewardship of the IANA functions from NTIA to the global multistakeholder community. The fruits of that labor have become highly evident within the past weeks, as two out of three components of the transition plan obtained the consensus of their communities while the third continued its intensive progress. more

Amount of Unsolicited Internet Traffic Reflecting Situation in Libya

During the recent political unrest in the Middle East, researchers have observed significant changes in Internet traffic and connectivity. Typically people look at routing data, latencies when connecting to sites and search and query statistics. Here we show results from a previously unused source of data: unsolicited Internet traffic arriving from Libya. The traffic data we captured shows distinct changes in unsolicited traffic patterns since 17 February 2011. more

As the Comcast Saga Unfolds, Be Careful What You Wish For

Comcast has been in the news recently for deliberately "slowing down" some subscribers and applications in its broadband cable service. There was an article in the Washington Post today updating the case, and there was a recent article in Network World that actually favors the groups filing the complaints and calls for the FCC to crack down on Comcast. more

Internet Governance: Why Africa Should Take the Lead

Recently during an afternoon meeting with a friend of mine, Bob Ochieng, who happens to work for ICANN (Internet Corporation for Assigned Names and Numbers) Africa Operations, he lamented that at online Internet Governance discussions fora such as CircleID, and 1net.org, there is no serious frequent engagements from African Voices. This got me thinking and I realized that most African Internet Stakeholders would rather use a "wait and see approach" in matters as critical as Internet Governance. more

ICANN’s At-Large Process: Exit, Without Voice

ICANN seems to be out to re-prove Hirschman's theories of exit, voice, and loyalty by driving all of its good people to exit rather than giving them meaningful voices. Thomas Roessler, a long-time advocate of individual users' interests on the interim ALAC now suggests it's Time to Reconsider the structure of ICANN's At-Large, as he feels compelled to promise himself not to get involved with ICANN again... more

New Chapter Working Groups Open Closed Doors

One thing was clear from a recent presentation by the new leaders of the SF-Bay Internet Society (ISOC) Chapter Working Groups: inclusion and collaboration will be the key to these groups' success. As Dr. Brandie Nonnecke, the Internet Governance Working Group (WG) Chair said, "We haven't yet cracked the code on what 'multistakeholder' means." But that won't stop her and Dr. Jaclyn Kerr, the Data Protection, Privacy, and Security WG Chair, from trying. more

Trademark Owners Beware: Cybersquatting Spreads to Twitter

TechCrunch reports that its brand has been taken as a Twitter name, and that there is a landrush going on to get these names, which are already trading for money. The problem is so bad that a name brokerage, Tweexchange, has sprung up to get to facilitate sales. more