Imagine a scenario. Your website analysis shows that your page has stopped receiving visitors, yet there are no complaints that your domain is unreachable. Strange, isn't it? You are certainly wondering: What's going on? Where are my customers? You see, what happened is that you are facing the consequences of the lack of domain name system (DNS) security. more
In a blog post, Stewart Baker proposed restricting access to sophisticated anti-virus software as a way to limit the development of sophisticated malware. It won't work, for many different and independent reasons. To understand why, though, it's necessary to understand how AV programs work. The most important technology used today is the "signature" - a set of patterns of bytes - of each virus. Every commercial AV program on the market operates on a subscription model... more
At the recent RIPE Meeting we presented some IPv6 address distribution statistics that we would like to share with a wider audience. In the article below, you can find recent statistics on IPv6 allocations and assignments. The first image shows the number of IPv6 allocations the RIPE NCC made to LIRs in each quarter, starting in 2008... Each year is depicted in a different colour, the last one showing the number of allocations made in Q3 2012. more
Josh Baer, former VP of Datran Media and current CEO of OtherInBox has been floating an idea at the DMA's Email Experience Council and a few other places, and recently got some traction in Ken Magill's Magill Report. What Josh is proposing is to create the technical means by which a Sender can decide when email 'expires' and is automatically removed from a recipient's inbox, either by deletion, or perhaps archiving (in the case of Gmail). This would supposedly help the end-user, by removing marketing offers that are no longer available. Why this idea shouldn't happen... more
Do you know someone who has played a major role in the development and advancement of the Internet? Now is the time to recognize their contribution. Nominate them for the 2019 Internet Hall of Fame. With more than 100 inductees, the Internet Hall of Fame celebrates Internet pioneers and innovators who have pushed the boundaries to bring the Internet to life and make it an essential resource for billions of people today. more
As noted in my first article of this series (see part one, two and three), security and reliability encompass holistic network assessments, vulnerability assessments and penetration testing. This month I'd like to go deeper into penetration testing; however, first, let's go back for a quick refresh before getting started. more
The broadband industry has falsely sold its customers on "speed", so unsurprisingly "speed tests" have become an insane and destructive benchmark... marketing departments at ISPs refuse to define what experience that actually intends to deliver (and what is unreasonable to expect), the network engineers are left with a single and simple marketing requirement: "make it better than it was". more
ICANN's board of directors has voted to put a March deadline on discussions concerning .amazon top-level domain. more
What's a domain name? What business function do they serve? Can a domain name generate ROI? I imagine these were the questions the Board of Racing Victoria asked before signing off on the purchase of racing.com to support a Victorian racing industry joint initiative to establish a digital media and content platform similar to that of the AFL. more
It is not surprising that the phase 1 review of domain name rights protection mechanisms is delayed, but it is a bit of a surprise that in responding to a question posed in 2020, business executives and their lawyers replied with answers first offered and rejected five years earlier. In that time before COVID-19, the launch of the Vox Populi Registry and its dotSucks domain names drew quite a lot of attention. more
I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more
The highest court in Germany has ruled against telephone and email data retention used to track criminal networks. Melissa Eddy of the Global and Mail reports: "A law ordering data on calls made from mobile or landline telephones and e-mail exchanges be retained for six months for possible use by criminal authorities violated Germans' constitutional right to private correspondence, the Federal Constitutional Court ruled. In its ruling, the court said the law failed to sufficiently balance the need for personal privacy against that for providing security."
more
ICANN is finalising a policy to curb DNS abuse, aiming to preserve internet stability while defending freedom of expression. With regulatory pressure mounting, the multistakeholder model faces a critical test. more
Over the past few days, Microsoft made two major announcements. One was a "playbook [for] providing a carrier-grade platform for edge and cloud computing to help network operators realize the full potential of 5G technology" using its it Azure cloud data centres. The second announcement was a new platform that enables satellite-based access to those same cloud data centres designated Azure Orbital. Coupled with these announcements was another one by Samsung... more
In a joint statement released today by Eric Schmidt, Chairman and CEO of Google, and Lowell McAdam, President and CEO of Verizon Wireless, the two companies have expressed their support for making existing 'net neutrality' principles enforceable. The joint statement was published as a blog post late Wednesday on both Google and Verizon policy blogs. more