/ Most Viewed

Malware Increasingly Uses DNS As Command and Control Channel to Avoid Detection

Number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. While most malware-generated traffic passing through most channels used for communicating with botnets (such as TCP, IRC, HTTP or Twitter feeds and Facebook walls) can be detected and blocked, it's not the case for DNS (Domain Name System) and attackers are taking advantage of that, said Ed Skoudis, founder of Counter Hack Challenges and SANS fellow. more

First Four TLDs Pass Pre-Delegation Testing

The first four new Top Level Domains (TLDs) have passed pre-delegation testing. Historically, it has taken most companies about 9 months after the Registry Agreement is signed before domain names go on sale to the general public. The four TLDs signed Registry agreements in April 2013. These TLDs may begin to sell domain names to the public as early as December 2013 or January 2014. more

Meta Lawsuit Leads to Significant Decline in Phishing Domains Tied to Freenom

A lawsuit filed by Meta has led to a significant decrease in phishing websites tied to the domain name registrar Freenom. Cybersecurity expert Brian Krebs in a report on Friday said that Freenom, which provides free domain name registration services, was a favored resource for cybercriminals due to its policy of protecting customer identities. more

ICANN 56 in Helsinki - Schedule of DNSSEC Activities

The ICANN 56 meeting takes place in Helsinki, Finland, from June 27-30 and while it is a smaller "policy forum" style of meeting, there will still be some activities related to DNSSEC, DANE and DNS security in general. DNSSEC Workshop The DNSSEC Workshop will take place on the morning of Monday, 27 June 2016. All times are Eastern European Summer Time (EEST), which is UTC+3. more

Will Microsoft Be Able to Make the Jump?

In marketing terminology this is called 'jumping the S-curve'. Microsoft, however, has left its jump rather late. One could argue that we are well and truly at the top of the S at the moment, so it will be interesting to see if Microsoft can still take the leap towards the enormous growth that is currently taking place in the group of digital media companies such as Google and Apple. more

A Brief Primer on Anti-Satellite Warfare Tactics

Satellites make it possible for governments to provide essential services, such as national defense, navigation, and weather forecasting. Private ventures use satellites to offer highly desired services that include video program distribution, telecommunications, and Internet access. The Russian launch of a satellite, with nuclear power and the likely ability to disable satellites, underscores how satellites are quite vulnerable to both natural and manmade ruin. more

We Can Have Forever URLs

A Forever URL is one that never expires. You own it and needn't worry about forgetting to renew it. The term itself is inspired by the US Forever Stamps, which you can use even if the postal rate goes up. This article looks at the underlying mechanisms for linking such information and is aimed at a technical audience. The DNS isn't just about websites; it is fundamental to how we connect endpoints, be they websites, devices, documents etc. more

ICANN Passes on Israel as Possible 2020 Meeting Venue Due to Escalating Iran/Israel Conflict

Tel-Aviv, Israel was rejected as a possible venue for one of ICANN's 2020 public meetings due to its proximity to the Gaza strip and the escalation of an Iran/Israel conflict. more

GDPR Your Domains For Sale? How to Keep Your Domain Name Lottery Ticket Alive

Have you ever sold a domain name that was just sitting in your registrar account? Maybe it was for that idea you had, but never found the time to develop. Perhaps it was for a business or website you once ran and then let go by the wayside. Then one day, out of the blue, that dormant domain turned into a winning lottery ticket. You got a random call or email from an interested party and the next thing you know that domain (which you've forgotten why you even renew it each year) is sold for $3,000 or $30,000 or more. more

New Standard for Reverse Domain Name Hijacking

Uniform Domain-Name Dispute-Resolution Policy (UDRP) Rule 1 defines Reverse Domain Name Hijacking (RDNH) as "using the Policy in bad faith to attempt to deprive a registered domain name holder of a domain name"... There has been a mixed history in granting and denying this remedy for overreaching rights. Some Panels consider RDNH regardless whether it has been requested (even if respondent defaults in responding to the complaint); others will only consider the issue if requested. more

The Continuing WHOIS Disappearing Act

WHOIS is about to become even harder to find. ICANN has recently concluded long-delayed contract negotiations with industry meant to accommodate the technical migration from the WHOIS protocol to the Registration Data Access Protocol (RDAP). Instead of limiting the changes to what's necessary to implement the new technical protocol, the proposals effectively gut WHOIS, making it virtually impossible to find by eliminating web-based WHOIS access... more

A Proposal for Creation of “Community Veto” Process on ICANN Board’s Key Decisions

Below is the text of a proposal made today to ICANN's Cross Community Working Group on Accountability (CCWG-ACCT) to create a community veto process over certain key decisions of ICANN's board of directors. This community veto process could be created by amending ICANN's existing corporate bylaws, which should also be amended to provide the means to recall nonperforming board members in certain situations. more

Success Factors for New gTLDs Program

The success of the new gTLDs program depends on the actions of the winning registries and on ICANN's allocation policies for the second round of applications. A successful landscape would be dominated by only a few registries but would be less confusing for users. The major players: businesses and Internet users who drive the demand for the gTLDs; the registries who own and run the gTLDs; and ICANN, which sets the rules for determining a winner for each new gTLD. more

Likely Timeline to New gTLD Delegation With Batching

Today, the team at ARI Registry Services decided to tread where no-one has tread before and map out the likely timeline to new gTLD delegation with batching. The exercise took some time, given that the information provided in the Applicant Guidebook is limited and there hasn't been any specific public data made available. However, we have presented what we believe to be the likely scenario should ICANN proceed under the current batching model, assuming a first batch of 500 applications. more

Reported Risk of Undersea Communication Cable Sabotage Are Exaggerated

Responding to a recent New York Times article which warned the possibility of Russian submarines possessing the ability to sabotage undersea communication cables, Doug Madory, Director of Internet Analysis at Dyn, calls them exaggerated scenarios. more