/ Most Viewed

Mobile Malware Growing Exponentially, Limited Capability of Current Security Solutions Big Concern

Security analysis suggest troubling and escalating trends in the development of malware that exploits vulnerabilities on mobile devices. "From turning mobile devices into bots, to infiltration of mobile applications, driven by the use of personal devices in the workplace, cybercriminals are taking full advantage of this market," reports M86 Security Labs in its just released Threat Predictions Report. more

The Hill: FCC Response to Sen. Cruz Reveals Hidden ICANN Agenda in Net Neutrality Order

Fred Campbell reporting in The Hill writes: "It's no secret that controversy has plagued the Obama Administration's plan to surrender U.S. oversight of the Internet domain naming and numbering systems from the current U.S.-based ICANN to the 'global multistakeholder community.' But the reason the Federal Communications Commission (FCC) declined to exercise its statutory jurisdiction over Internet numbering inside the United States was indeed secret until Senator Ted Cruz forced the FCC to explain itself." more

Researchers Detail Faster Methods to Defeat Botnets Like Conficker and Kraken

Michael Cooney reporting in NetworkWorld: "Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. The detection system, called Pleiades, monitors traffic below the local DNS server and analyzes streams of unsuccessful DNS resolutions..." more

A Look at ICANN’s Creation

My story begins in ancient times when dinosaurs ruled the earth. It was a time when you could download a movie onto your desktop computer through your 56k dial-up connection if you had a few days. It was a time when more people were on the Minitel in France than on the Internet globally and when the Republic of Korea could fit all of its internet users into one small hotel room. I know because I met them all in that room. more

U.S. Senate Voted to Eliminate Broadband Privacy Rules

"The US Senate today voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies," Jon Brodkin reporting in Ars Technica. more

Gaza Plunges into Near-Total Internet and Cellular Blackout Amid Intensified Israeli Strikes

The Gaza Strip is experiencing an almost complete blackout of internet and cellphone services. A communication blackout isolates Gaza's residents, impeding emergency responses and potentially escalating humanitarian crises. more

Community New gTLD Applications: The Wrong Choice

Community new gTLD applications were one of the three options offered by version one of ICANN new gTLD applicant guidebook. It was also possible to submit a "generic" or a "geographic application." I dug the ICANN website and found out that, in the end - and according to me only - it was a bad choice to submit such application...
I went through the 52 delegated applications to investigate which ones have lots of domain name registrations and which ones don't. more

ccTLD Market Share Catching Up to gTLDs, CENTR Reports

Council of European National Top level Domain Registries (CENTR) has released its latest quarterly Domain Name Stat Report stating that ccTLDs have continued increasing their market share against gTLDs -- this quarter rising from 44% to 45%. ccTLD IDNs continue to grow although at a slightly lower rate. more

How to Place Top-Level Domain Trust Anchors in the Root

The project to sign the DNS root zone with DNSSEC took an additional step toward completion yesterday with the last of the "root server" hosts switching to serving signed DNSSEC data. Now every DNS query to a root server can return DNSSEC-signed data, albeit the "deliberately unvalidatable" data prior to the final launch. Another key piece for a working signed root is the acceptance of trust anchors in the form of DS records from top-level domain operators. These trust anchors are used to form the chain of trust from the root zone to the TLD. more

ICANN’s Two Decades of Evolution

In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more

Speaking up for the Internet

For most of this year governments from outside the G8 have not wavered from their essential themes on the Internet: they regard it as a shared resource that works in part as a result of their own investment in infrastructure, they want to be included in its governance through a decision-making process that is transparent, accessible and, in broad character, multilateral, and they want to be able to trust it and know that as much as it is a tool of growth for others, it can also be for them. more

2.7 Billion Using the Internet by Year End, Estimates UN

UN's Millenium Development Goals Report released this week estimates that by the end of this year, 2.7 billion people (39 percent of the world's population) would be using the Internet. more

Obama Administration Announces $400 Million Advanced Wireless Research Initiative

Obama Administration announced today a $400 million Advanced Wireless Research Initiative led by the National Science Foundation (NSF). more

ICANN Publishes gTLD Statistics and Trends Report, Asks for Community Feedback

The gTLD Marketplace Health Index presents statistics and trends related to generic top-level domains. ICANN intends to publish these statistics biannually to track progress against its goal of supporting the evolution of the domain name marketplace to be robust, stable, and trusted. more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more