/ Most Viewed

Time for Auction?

Today, Innovative Auctions announced the resolution of eight Top Level Domains in the second private auction commencing on August 13th for a total of $9,651,000. With the first and second auctions successfully completed and the third auction scheduled for September 10th is now a good time to resolve your contention set and jump on the next auction bus? more

Canadian Telcos Fast Tracking FttH to Combat Cable Operators

There are a number of stimuli which are pushing Canada's burgeoning FttH market, and the government and telcos alike have made significant steps to improve the reach and capacity of broadband infrastructure. These measures will show real benefits for consumers in recent years. From the government's side, its Economic Action Plan, launched in 2009 as a response to the global financial crisis, included a pledge to provide $225 million over three years towards its Broadband Canada Program, geared to extending broadband coverage to underserved communities. more

Google Reveals Top 10 Malware Sites From Its Index

While scanning its index, Google in the last two months reports to have found more than 4,000 different websites suspected of distributing malware by massively compromising popular websites. "Of these domains more than 1,400 were hosted in the .cn TLD. Several contained plays on the name of Google such as goooogleadsence.biz, etc.," says Google's security team member, Niels Provos, in a blog post today. more

M2M Hype and Reality

There are many predictions that the next big wave in telecoms is M2M and that this will be the next growth market for the telecoms industry. There is no doubt that M2M is a revolutionary development, but we need to separate the hype from the reality. In order to do this it is best to divide the major developments into two main areas, although there is no doubt that others will emerge over time. One area is the sensors that are being installed in networks such as electricity, the environment, roads and other infrastructure. more

Researchers Warn Buried Internet Cables at Risk as Sea Levels Rise

The results of a study presented today at a meeting of internet network researchers depicts critical communications infrastructure could be submerged by rising seas in as soon as 15 years. more

Content is Everything: How to Regulate the USA

As countries begin to fully understand the implications of universal broadband, a mind-shift is taking place in the minds of the people involved in the decision-making processes, and the split between infrastructure and content is becoming more apparent. Futile regulations from the past are making this crystal clear. more

Over 50 Internet Shutdowns Reported in 2016

"Governments around the world shut down the internet more than 50 times in 2016 -- suppressing elections, slowing economies and limiting free speech," Lyndal Rowlands reporting in IPS. more

The Rapidly Changing Governance Environment of International Telecoms

Late last year I participated in the World Conference on International Telecommunications (WCIT-2012) in Dubai, organised by the UN agency the ITU. I reported extensively on that event, which was aimed at updating the International Telecommunications Regulations... From the outset there were several reasons WCIT might fail, not the least of which was the fact that the various technological, political and regulatory issues facing the new much broader telecoms environment were not sufficiently separated and so could not be addressed in a rational and systematic manner. more

Registry Lock - or EPP With Two Factor Authentication

For the last couple of years, the most common attack vector against the DNS system is the attack against the registrar. Either the attack is on the software itself using weaknesses in the code that could inject DNS changes into the TLD registry, or social engineering the registrar support systems and the attacker receives credentials that in turn allows the attacker to perform malicious changes in DNS. DNSSEC is the common security mechanism that protects the DNS protocol, but by using the registrar attack, any changes will result in a proper working DNS delegation. more

Over 100 gTLD Applications Committed in Aug. 13 Applicant Auction

In early June, the first Applicant Auction resolved contention for 6 contested gTLDs. The successful outcome of that auction has generated a great deal of interest from other applicants, and Innovative Auctions is expecting a big turnout in our next auction, to be held on August 13th. For more than half of the contested applications, at least one applicant is ready to resolve contention via our auction. more

Failing to Act on Accountability

More than a year has passed since the first organizational review team delivered its final report on ICANN's accountability and transparency. Disappointingly, ICANN has done precious little to act on a key recommendation in that report. Its failure to act threatens to damage ICANN's credibility, just as it enters one of the most critical periods in its history. more

Amazon Web Services to Charge for IPv4 Addresses Amidst Rising Costs and Scarcity; Urges Shift to IPv6

Amazon Web Services (AWS) will charge customers for public IPv4 addresses effective February 1, 2024. The charge will be $0.005 per IP per hour for all public IPv4 addresses, irrespective of whether they're attached to a service. more

Russia Attempts Large Scale Experiment to Isolate Country from Global Internet

In a large scale experiments, Russia has attempted to test the feasibility of cutting the country off the World Wide Web, according to reports. "The tests, which come amid mounting concern about a Kremlin campaign to clamp down on internet freedoms, have been described by experts as preparations for an information blackout in the event of a domestic political crisis." more

Policy Beyond the Potholes

I cringe whenever I hear the arguments that we can't have community owned infrastructure for connectivity because local governments can't fix potholes. I wouldn't mind it so much if that argument wasn't used to shut off further discussion. We should be asking why we are denied the "dumb-pipes" that provide vital infrastructure and why we allow phone (and TV) companies to horde vital infrastructure. Instead we accept the "pothole" argument as a reason we can't be trusted to communicate on our own. more

Phishing Attack: An Open Letter to the Anti-Spam and Mailbox Operator Community

I'm sure many of you are familiar with the targeted ESP phishing attack that has been ongoing for almost a year now and has led to multiple known ESP system breaches. Return Path was recently a victim of this same attack... In short, a relatively small list of our clients' email addresses was taken from us, meaning those addresses are now the targets of the phishing campaign that are intended to compromise those client systems. more