Do you have an idea for a new way to use DNSSEC or DANE to make the Internet more secure? Have you recently installed DNSSEC and have a great case study you can share of lessons learned? Do you have a new tool or service that makes DNSSEC or DANE easier to use or deploy? Do you have suggestions for how to improve DNSSEC? Or new ways to automate or simplify the user experience? If you do, and if you will be attending ICANN 55 in Marrakech, Morocco (or can get there), we are now seeking proposals for the ICANN 55 DNSSEC Workshop that will take place on Wednesday, 9 March 2016. more
At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. more
As it's coming down to brass tacks and companies are now seriously considering applying for their own .Brand Top-Level Domain (TLD), questions about whether to also apply for a truly generic TLD keep popping up. Many large corporations want to know whether it's even possible to apply for something like .Shoes AND to restrict registrations so that only a single specified registrant is allowed. After all, for the right company it seems that something like .Shoes could be a valuable namespace -- short, easy to remember, and easy to spell. more
The Internet Corporation for Assigned Names and Numbers (ICANN) and the United States Department of Commerce (DoC) today announced that they agreed to extend their joint Memorandum of Understanding (MoU) for three additional years until September 30, 2006. more
As widely reported, and not surprising, the internet is swimming in COVID-19 online scams. Criminals, accustomed to rapidly grabbing online territory during times of crisis and profiting from public fear, are working overtime in the face of the coronavirus. Unfortunately, ICANN's failure to enforce its minimal WHOIS and DNS abuse requirements has resulted in delayed mitigation efforts at a time when swift responses are needed to protect the public from COVID-19 scams. more
For quite a while, it looked like my prediction – one to two articles per day – was overly optimistic. By summer, there were only four new sites: Reed College, University of Oklahoma (at least, I think that that's what uucp node uok is), vax135, another Bell Labs machine – and, cruciallyy, U.C. Berkeley, which had a uucp connection to Bell Labs Research and was on the ARPANET. more
There are only a few occasions in any of our lifetimes where what we know and have grown used to is turned on its head. We have now lost the generation that heard radio for the first time; there are only a few who can recall the first television pictures; but many, many more saw color appear on their screens for the first time. more
Federal officials have confirmed that a cyberattack caused a nearly day-long outage of the United States's 988 mental health helpline on December 1st, 2020. The Substance Abuse and Mental Health Services Administration (SAMHSA) revealed that the attack occurred on the network of Intrado, the company that provides telecommunications services for the helpline. more
Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. more
I recently read an interesting blog post over at Word to the Wise, about Delivery Emergencies. Laura Atkins makes the point that many email emergencies are a result of poor planning, or an error on the part of the sender... Fortunately, most people grow out of their college fraternity phase, and the same applies to most email senders. As folks become aware of industry standards and best common practices, they adapt their mailing paradigms to what is expected of them by receivers, and recipients. more
Researchers at Certfa Lab provide a review of the latest wave of organized phishing attacks by Iranian state-backed hackers which succeeded by compromising 2-factor authentication. more
A Russian ship, suspected by intelligence and military officials to be capable of cutting undersea Internet cables, is spotted near the coast of Syria. more
In partnership with Momentum event group, CircleID will be updating this page to provide up to date information for the Digital Marketing & gTLD Strategy Congress taking place in London, September 26 - 27, 2013. more
We've just published the 2024 edition of the DOTZON study "Digital City Brands." After introducing the study in early 2017, DOTZON has mapped how successful cities are using their Digital City Brands for the seventh year in a row. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was why Digital City Brands came into being in the first place. more
The EU has been pushing for the development of DNS4EU, a public European DNS resolver with built-in filtering capabilities, as a way to strengthen the "digital sovereignty" of the EU and protect citizens, companies, and public institutions from phishing attacks and malware. In December 2021, a consortium of 13 public and private companies from ten European countries were granted the project to build a public DNS resolution service tailored for the EU. more