/ Most Viewed

Examining Stuart Lynn’s Domain Name Plans - Part II

In the last article we examined the language in Stuart Lynn's A Plan for Action Regarding New gTLDs, and I addressed concerns about specific language in that document. In this article, I will examine several questions of importance that need to be addressed when discussing new gTLD policy; questions that Mr. Lynn leaves unanswered in his proposal... more

ICANN New gTLD Program SWOT Analysis: OPPORTUNITIES (Part 3)

The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more

FBI, Department of Homeland Security Issue Warning About a North Korean Trojan Malware Variant

The US Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) this week issued a malware analysis report on Trojan malware variants linked to the North Korean government. more

IPv6: SAVA, Ca va pas?

Sender Address Validation and Authentication (SAVA) is the silver bullet. It will send to Cyberia all dark forces that make us shiver when we make a purchase on the internet, pose a threat to our very identities and have made DDoS a feared acronym. Some of you will remember the heated debates when Calling Line Identification (CLID) was first introduced in telephony. Libertarians of all stripes called passionately to ban such an evil tool... more

Is Your New TLD Protected Against Phishing and Malware?

Until now, the criminals behind malware and phishing have had only 22 generic top-level domain names (TLDs) to abuse -- names like .com, .net or .org. But with hundreds of new TLDs entering the marketplace, e.g. .buzz, .email, and .shop, there are many more targets than ever... What can attackers do with domain names? more

A Few More Thoughts on Email Authentication… errr… Trust

Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more

The DotBible Litmus Test for Domain Name Dispute Panelists

A dispute policy for the new '.bible' top-level domain name requires panelists who agree to hear cases to affirm that they "enthusiastically support the mission of American Bible Society" and that they "believe that the Bible is the Word of God which brings salvation through Christ." The DotBible Community Dispute Resolution Policy appears to be the first domain name dispute policy that requires panelists to take a religious oath - or, for that matter, an oath other than anything related to maintaining neutrality. more

“ICANN Urged to Rule on .LLP ‘Breach’”

There is probably no worldwide community without at least one member located in the US. But does this qualify the closing of a community to only US based members and, by extension, to exclude all other eligible entities from around the world solely because of arbitrary geographical circumstances based upon company whims? more

Spamhaus Motion to Reconsider

A few weeks ago, Spamhaus filed a motion to have the judge reconsider his recent $27,002 award to e360. Their brief hangs on three arguments. ... it's clear Spamhaus is prepared to take this to the Court of Appeals (again) if the judge doesn't reconsider. In my lay reading of the law, and the memo in support of motion to alter judgement I don't think Spamhaus is out of line in asking for the judge to reconsider. I expect that if the judge doesn't reconsider, then we'll see an even more aggressive filing taking it up to the Court of Appeals. more

OTT Threat to Telco’s Middleware Opportunities

I recently participated in two Comverse events, and once again the message was driven home to me about the enormous opportunities that lie ahead of the industry in the field of new telecoms applications. The middleware and cloud applications that are now appearing at the edge of the network will of course, be further developed once high-speed broadband becomes available, but already they are having an enormous impact on the telecoms market. The new user experiences that can be obtainable through these applications will enrich fast broadband networks beyond recognition. What we now have is, on the one hand, the Over-The-Top (OTT) applications that have conquered the world... more

What’s Wrong With the FCC’s Consumer Broadband Test?

The FCC recently published some tools to let consumers measure some internet characteristics. The context is the FCC's "National Broadband Plan". I guess the FCC wants to gather data about the kind of internet users receive today so that the National Broadband Plan, whatever it may turn out to be, actually improves on the status quo. The motivation is nice but the FCC's methodology is technically weak. more

Is It Time to Create a Market for IPv4 Addresses?

It's fascinating to watch the Internet technical community grapple with policy economics as they face the problems creating by the growing scarcity of IPv4 addresses. The Internet Governance Project (IGP) is analyzing the innovative policies that ARIN, RIPE and APNIC are considering as a response to the depletion of IPv4 addresses. more

ISC Assesses DNS Flag Day

Everyone who participated in supporting DNS Flag Day initiative should feel they have accomplished something worth-while, says ISC's Vicky Risk. more

Proactive Cybersecurity: What Small Businesses Can Actually Do

In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more

Deja Vu All Over Again: Cables Cut in the Mediterranean

The end of the year is approaching which seems to be a harbinger of Internet disasters. Four years ago (on 24 Dec. 2004), TTNet significantly disrupted Internet traffic by leaking over 100,000 networks that were globally routed for about an hour. Two years ago (on 26 Dec. 2006), large earthquakes hit the Luzon Strait, south of Taiwan, severing several underwater cables and wreaking havoc on communications in the region. Last year there was a small delay. On 30 Jan. 2008, more underwater cables were severed in the Mediterranean, severely disrupting communications in the Middle East, Africa, and the Indian subcontinent. Calamity returned to its customary end-of-year schedule this year, when early today (19 Dec. 2008) several communications cables were severed, affecting traffic in the Middle East and Indian subcontinent. more