/ Most Viewed

Verisign Expands MANRS Relationship to Strengthen Global Routing Security

Verisign has been involved with an initiative known as Mutually Agreed Norms for Routing Security, or MANRS, since its inception. MANRS, which is coordinated by the Internet Society, focuses on strengthening the security and resiliency of IP networks throughout the world by identifying and providing best practices for mitigating common routing security threats. MANRS began as a collaboration among network operators and internet exchange providers, with Verisign formally becoming a participant in its Network Operator Program in 2017. more

Protecting Brands from Phishers No Easy Task

Just in case you've been out of the country for the last 12 months, a new scourge is hitting the Internet and the world of email and it's called phishing. The Anti-Phishing Working Group defines phishing as identity theft "attacks using 'spoofed' e-mails and fraudulent Websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords..." According to various experts, the incidents of phishing are rising at an alarming rate: there were 13,000 unique phishing attacks in January alone - that's a 42 percent surge over the previous month. The real problem is that phishing works. more

Holomaxx v. Yahoo and MS: The Hearing

I visited Judge Fogel's courtroom this morning to listen to the oral motions in the Holomaxx cases. This is a general impression, based on my notes. Nothing here is to be taken as direct quotes from any participant. Any errors are solely my own. With that disclaimer in mind, let's go. more

Comcast Sneaks in Another Billing Line Item and “Earns” an Additional $1 Billion

My Comcast bill arrived today with a sneaky new $2.68 charge, $2.50 for leasing one (and only one) set-top box and $0.18 for the remote. This new billing line item, like the many others Comcast has introduced, adds to its bottom line with no additional capital expenditure. It shows how resisting the obligation to return to accepting set-top box free, "cable ready" sets was a smart strategy. more

China Shuts Down Thousands of Websites for ‘Harmful’, Obscene Content

China has shut down or 'dealt with' thousands of websites for sharing 'harmful' erotic or obscene content since April, the state's office for combating pornography and illegal publications announced on Thursday. more

From Loon to Taara: Google’s Moonshot Delivering Wireless Backhaul

You may recall a number of years ago when Google experimented with delivering broadband from balloons in an effort labeled Project Loon. The project was eventually dropped, but a remnant of the project has now resurfaced as Taara - broadband delivered terrestrially by lasers. more

Watch Live - What Does “Success” For IPv6 Look Like? (Briefing Panel on Nov 5)

Now that IPv6 deployment is happening in major networks around the world, the question becomes -- what does "success" look like for IPv6? How much IPv6 traffic is "enough"? What are major milestones we should be tracking in IPv6 deployment? What is next for IPv6? more

International Internet Governance: A Field Guide to 2011

If an important debate of our age is going on right now but you don't know where, no one can blame you. Part of the intrigue surrounding discussion of how the Internet will be governed is deliberate; the current process and forums were conceived by parties who want to make sure that if their agenda fails in one place that they can claw back ground in another. Part of that plan is the byzantine "commitology" of the UN system, which is now frighteningly relevant to the broadband industry and civil society. What follows is an effort to make this clear what, where, when, and how it all will happen in 2011. more

ACPA Dilemma: Federal Court Denies Injunction in Landmark Case - Cybersquatting Loophole or Legal Oversight?

This case had a bit of a weird result -- even though the brand owner had a mark that was 20 years old, and the alleged cybersquatter, in the meantime, acquired a domain name on the open market identical to that mark, because the domain name was first registered (by an unrelated party) before the brand owner's trademark rights arose, there was no relief under federal trademark law. more

Fighting for Smaller New gTLD Applicants

Will new gTLDs just be more of the same, or will they bring real diversity and innovation to the Internet's namespace? For Hong Kong based Stable Tone, applicant for two Chinese character IDN TLDs (?? or "Dot WORLD" and ?? or "Dot HEALTHY"), it's the smaller applicants that give the new gTLD program its soul. more

Israeli Officials Dispute Claims of Stuxnet’s Joint US/Israel Effort

A few weeks ago, the New York Times published an article saying that the Stuxnet worm, which infected a large number of Iran's nuclear power plants, was a joint effort between the United States and Israel. The program began under former president George W. Bush and continued under President Obama. Last month, the Washington Post ran an article saying that the US and Israel collaborated in a joint effort to develop Flame and that work included Stuxnet. more

Africa Infrastructure Growth Supporting ccTLDs and New gTLD Growth

This month, France Telecom's Lower Indian Ocean Network 2 "LION2" fiber optic cable has been put in service, bringing the total number of cables in East Africa to four. In South Africa it is expecting West Africa Cable System to go live next month. This huge growth in fiber optic cables connecting Africa means that bandwidth costs can go further down but there are many questions for internet service providers, regulators and policy makers... more

DDOS Attackers - Who and Why?

Bruce Schneier's recent blog post, "Someone is Learning How to Take Down the Internet", reported that the incidence of DDOS attacks is on the rise. And by this he means that these attacks are on the rise both in the number of attacks and the intensity of each attack. A similar observation was made in the Versign DDOS Trends report for the second quarter of 2015, reporting that DDOS attacks are becoming more sophisticated and persistent in the second quarter of 2016. more

The ISP Industry and the Financial Sector - Amazing Similarities

In the last RIPE Labs article on this subject How Does the Internet Industry Compare?, we looked at ways to compare our industry with other industrial sectors, and identified a number of characteristics that an industry must have in order to be comparable to the Internet industry. It seems the financial sector or monetary credit industry shares many of these characteristics and in fact behaves much like the Internet industry. more

ICANN’s Governance Conundrum

After reading Steve Delbianco's recent CircleID article entitled The Tale of Two Governance Models I was torn. On one hand I agreed and supported Steve's comments about the strength of the bottom-up consensus driven model upon which ICANN was originally founded. As I am about to begin my thirty fifth ICANN regional meeting over the last eleven years, it is a model which I still believe in and fiercely fight to defend. However, on the other hand I look back over the last eleven years... more