/ Most Viewed

Phishing: A Look Into the E-Crime Landscape

At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more

The Real Face of Cyberwar?

Anyone who reads the papers sees stories -- or hype -- about cyberwarfare. Can it happen? Has it already happened, in Estonia or Georgia? There has even been a Rand Corporation study on cyberwarfare and cyberdeterrence. I wonder, though, if real cyberwarfare might be more subtle -- perhaps a "cyber cold war"? more

Google Energy - Are You Surprised?

Just when you thought Nexus One was the biggest thing coming out of Google this week, we now get word about Google Energy. Well, Nexus One is a big deal, but I say that wearing my telecom analyst hat. Switching to my smart grid hat, Google Energy is something else altogether... As big as that is -- and will be -- Google Energy has all kinds of implications for smart grid. For starters, more

How Spam Has Damaged Mail Forwarding - And Ways to Get Around It

Courtesy forwards have been a standard feature of e-mail systems about as long as there have been e-mail systems. A user moves or changes jobs or something, and rather than just closing the account, the mail system forwards all the mail to the user's new address. Or a user with multiple addresses forwards them all to one place to be able to read all the mail together. Since forwarding is very cheap, it's quite common for forwards to persist for many years. Unfortunately, forwarding is yet another thing that spam has screwed up. more

What’s Next for Dot-Org

When I began writing about the dot-org sale, it was out of concern for the loss of what I felt strongly was long understood to be a unique place in the Internet's landscape. Like a national park, dot-org deserved special protection. It turns out lots of people and organizations agreed. On April 30th, 2020, The ICANN Board upheld these values. They unanimously withheld consent for a change of control of the Public Interest Registry to a private equity firm. more

Facebook Announces Global Digital Currency, Financial Infrastructure Built on Blockchain Technology

Facebook today announced a newly formed subsidiary, named Calibra, to provide financial services. The first product Calibra will introduce, according to the company, is a digital wallet for Libra. more

IPv6 Floating on the Ethernet

Remarkable how Ethernet has evolved and been widely adopted over this quarter of a century period extending its reach from LAN to MAN to WAN and from 10meg to 10gigE. One has to credit the IEEE for quite an efficient job as a standards body. Over in the IP world, this month of March will see IETF 74 meet in San Francisco and continue to ponder transitions, address translations, double translations, even carrier grade translations... more

Important New Jersey Supreme Court Decision in Internet Privacy

The New Jersey Supreme Court has issued an important decision on Internet users' right to privacy. The case involves a dispute about whether an ISP violated a user's privacy rights by turning over subscriber information (name, address, billing details) associated with a particular IP address. It ends up that the subpoena served on the ISP was invalid for a variety of reasons. As the user had a 'reasonable expectation of privacy' in her Internet activities and identifying information, and because the subpoena served on the ISP was invalid, the New Jersey court determined that the ISP should not have turned over the personal data... more

Microsoft Announces $5 Billion Investment in IoT Over the Next Four Years

Microsoft will invest $5 billion in the Internet of Things over the next four years, said Julia White, Corporate Vice President, via a blog post today. more

Corporate Espionage in the News: Hilton and the Oil Industry

Is anyone calling espionage by means of computers cyber-espionage yet? I hope not. At least they shouldn't call it cyber war. Two news stories of computerized espionage reached me today. The first, regarding the Oil industry, was sent by Marc Sachs to a SCADA security mailing list we both read. The second, about the hotel industry, was sent by Deb Geisler to science fiction convention runners (SMOFS) mailing list we both read. more

China to Require Face Scan for Internet Access and New Phone Numbers Starting December

Chinese citizens will be required to let telecommunications carriers to scan their faces in order to sign up for internet access or to get a new phone number. more

Additional .COM Domain Name Transfer Requirement by October 28

Registrars who support .com domain names will use the Extensible Provisioning Protocol (EPP) system by October 28. ...There will be an additional step when trying to transfer a .com domain name among registrars. Specifically, a piece of information called an EPP code (aka auth code, EPP key, transfer secret) must be obtained from the current registrar and submitted to the gaining one prior to approving with the latter. more

Still Think .brands Might Be a Waste of Time? Google Doesn’t!

The new Top-Level Domain (TLD) program was designed from the outset to enhance competition and foster innovation. It was a great result for the wider industry to see approximately one-third of the applications received by ICANN submitted by some of the world's largest companies seeking to own and operate their own .brand TLD. Even with organisations such as Apple, Citibank and IBM applying for their respective TLDs, scepticism remained on the potential for .brands to succeed. more

ICANN Doubles Down on Technical Internet Governance Label: What Are the Implications?

Back in September of 2020, ICANN CEO Göran Marby wrote a blog post discussing the implementation of "a common strategy for Internet governance (IG) and technical Internet governance (TIG)", raising the question of whether the ICANN org. intended to pursue this distinction moving forward, as debated in a previous article. This was proven to be the case during the 2020 IGF's Open Forum #44: "ICANN Open Forum - Technical Internet Governance", organized by ICANN itself... more

Old Cloud vs. New Cloud

Images of clouds have been used when discussing networks for quite some time. When traditional telecoms companies were selling point-to-point circuits a drawing of a cloud was sometimes used. The cloud symbol helped indicate the provider?s domain of responsibility, effectively hid the internal complexity of the network and focused on the end user. This was all fine when the product offered was an end-to-end circuit. more